You are on page 1of 17

Amreen Saba

Under the Guidance of


Nagarathna mam, Associate Professor,
PES College of Engineering, Mandya

1
1. Prior to FOG
2. FOG V/S Cloud
3. Introduction to FOG Computing
4. FOG with IOT
5. FOG Framework
6. Pillars of FOG architecture
7. FOG Networking
8. Decoy Systems for security
9. Applications of FOG
10. Conclusion

2
• Cloud computing is a type of Internet-based computing
that provides shared computer processing resources and
data to computers and other devices on demand

• Cloud computing is a model for enabling convenient , on


demand network access to a shared pool of configurable
computing resources that can be rapidly provisioned and
released with minimal management effort

3
4
• Fog computing is a model in which data, processing and
applications are concentrated in devices at the network
edge rather than existing almost entirely in the cloud.
• Fog computing is a paradigm which extends cloud
computing paradigm to the edge of the network.
• Fog computing is not a replacement of cloud it just
extends the cloud computing by providing security in the
cloud environment.
• Similar to Cloud, Fog provides data, compute, storage,
and application services to end-users.

5
• Fog sits in between the devices and the cloud
• Fog serves as an embedded software platform designed to
be installed on network switches, devices, sensors and
machines
• It allows machines to communicate directly with each
other without going through the cloud
• By doing so, Fog enables real time decisions to be made
without transmitting vast amounts of data through the
cloud

6
7
8
OpenFog architecture should:
• Include lower latency storage at or near the end-user and business
deployment.
• Perform the required computation near the end-user and data to
avoid latency, network and other migration costs (including
bandwidth).
• Use low latency communication at or near the end-user rather than
requiring all communications to be routed and synchronized through
the backbone network.
• Implement elements of management, including network
measurement, control and configuration, at or near the endpoint
rather than being controlled primarily by gateways such as those in
the LTE Core.
• Allow telemetry and locally computed analytics results to be copied
to the backend cloud in a secured manner for further analytics and9
orchestration.
Fog control plane such as the inference, control, configuration
and management of networks:

• Crowd-sensing LTE states (in commercial deployment):

Through a combination of passive measurement (e.g., RSRQ),


active probing (e.g., packet train), application throughput
correlation and historical data mining, a collection of client
devices may be able to, in real-time and useful accuracy, infer the
states such as the number of Resource Blocks used.

10
OTT network provisioning and content management (in
commercial deployment):

The traditional approach to innovating networks is to introduce


another box inside the network, possibly a virtualized box but a
box nonetheless. Fog networking directly leverages the “things”
and phones instead, and removes the dependence on boxes-in-
the-network altogether. With SDKs sitting behind apps on client
devices, through tasks such as URL wrapping, content tagging,
location tracking, behavior monitoring, network services can be
innovated much faster.

11
Client-based HetNets control (in 3GPP standards):

Coexistence of heterogeneous networks (e.g., LTE, femto, WiFi)


coexistence is a key feature in cellular networks today. Rather
than through network operator control, each client can observe its
local conditions and make decision on which network to join.
Through randomization and hysteresis, such local actions may
emerge globally to converge to a desirable configuration

12
Real-time stream mining:

Consider virtual reality tasks associated with Google Glass. Some


of the information retrieval and computation tasks may be carried
out on the Glass (a “wearable thing”), some on the associated
phone (a client device), some on the home storage (an edge
device), and the rest in the Cloud

13
 Decoy data, such as decoy documents, honey pots and other bogus
information can be generated on demand and used for detecting
unauthorized access to information and to poison the thief’s ex-
filtrated information.
 Serving decoys will confuse an attacker into believing they have ex-
filtrated useful information, when they have not. This technology
may be integrated with user behavior profiling technology
 Decoy Systems can be implemented by given two additional
security features:
1. Validating whether data access is authorized when abnormal
information access is detected
2. Confusing the attacker with bogus information that is by providing
decoy documents.

14
Smart Traffic Lights and Connected Vehicles:
Wireless access points like Wi-Fi, 3G, road-side units and smart traffic
lights are deployed along the roads. Vehicles-to Vehicle, vehicle to
access points, and access points to access points interactions enrich the
application of this scenario.
Wireless Sensor and Actuator Networks:
In this scenario, actuators serving as Fog devices can control the
measurement process itself, the stability and the oscillatory behaviours
by creating a closed-loop system. For example, in the scenario of self-
maintaining trains, sensor monitoring on a train’s ball-bearing can
detect heat levels, allowing applications to send an automatic alert to
the train operator to stop the train at next station for emergency
maintenance and avoid potential derailment

15
• Fog computing gives the cloud a companion to handle the two
exabytes of data generated daily from the Internet of Things.
Processing data closer to where it is produced and needed
solves the challenges of exploding data volume, variety, and
velocity.

• In Fog Computing we present a new approach for solving the


problem of insider data theft attacks in a cloud using
dynamically generated decoy files and also saving storage
required for maintaining decoy files in the cloud. So by using
decoy technique in Fog can minimize insider attacks in cloud.

16
17

You might also like