Академический Документы
Профессиональный Документы
Культура Документы
Name:
Sreya Roy
2nd Year
Prepared By:
S,.K. Mathur, Chairman, Datamatics Global Services Limited
Date: 27.02.2016
Prepared for:
VS Ruia, Co-Chairman of the Management Board, Impetus Technologies
ABSTRACT :
2
LETTER OF AUTHORISATION :
3
Sir,
Subject - Report on Fog Computing
I,, Co-President Pritech, Bengaluru, Karnataka, India, Piritech Park (SEZ), Phase 1, Campus 5B,
1st Floor, Bellandur, Bengaluru, Karnataka, am writing to request permission to conduct a
research study on Fog Computing. The study will include detailed insight into the field and study
of Fog Computing, the challenges faced by the developments, and future prospects of Fog
Computing..
If approval is granted, documentation of the report would take no longer than 2 months, and to
be done on your convenience. The details/results of the study will remain absolutely confidential.
Your approval to conduct this research will be greatly appreciated.
Yours Faithfully,
VS Ruia , Co-President
Pritech, Bengaluru, Karnataka, India, Piritech Park (SEZ), Phase 1, Campus 5B, 1st Floor,
Bellandur, Bengaluru, Karnataka
LETTER OF TRANSMITTAL :
S,.K. Mathur, Chairman
4
Sir,
Subject - Report on Fog Computing
As agreed in our January 21 contract, we are submitting the attached report on the subject of
"Fog Computing".
This report ecamines the history and subseuent developments in the field of Cloud Computing
and the limtations that are overcome by Fog Computing. Various applications of Fog Computing
have been discussed, alongwith the scope and challenges faced in the development of this field.
I hope yo ufind this report satisfactory.
Yours Faithfully,
VS Ruia , Co-President
Pritech, Bengaluru, Karnataka, India, Piritech Park (SEZ), Phase 1, Campus 5B, 1st Floor,
Bellandur, Bengaluru, Karnataka
TABLE OF CONTENTS :
CONTENTS:
PAGE NO.:
5
1. List of Illustrations
2.
Executive Smmary
3. Actual Report
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
Introduction
Existing System: Cloud Computing
Limitation Of Cloud Computing
Why advancement needed?
Proposed System: Fog Computing
What is Fog Computing?
What is the need for fog computing?
Characteristics of fog computing
Fog computing service cover
Security and privacy in fog computing
Limitations overcomes in fog computing
9
10
11
11
12
12
14
14
15
15
17
18
18
19
20
5. Conclusion
LIST OF ILLUSTRATION:
FIGURES
PAGE NO.
1. Cloud Computing
10
13
3. Fog vs Cloud
16
22
EXECUTIVE SUMMARY:
Fog computing or fog networking, also known as fogging,is an architecture that uses one or
a collaborative multitude of end-user clients or near-user edge devices to carry out a
substantial amount of storage (rather than stored primarily in cloud data centers),
communication (rather than routed over the internet backbone), and control,
configuration, measurement and management (rather than controlled primarily by
network gateways such as those in the LTE (telecommunication) core).
Fog computing can be perceived both in large cloud systems and big data structures,
making reference to the growing difficulties in accessing information objectively. This
results in a lack of quality of the obtained content. The effects of fog computing on cloud
computing and big data systems may vary; yet, a common aspect that can be extracted is a
limitation in accurate content distribution, an issue that has been tackled with the creation
of metrics that attempt to improve accuracy.[4]
3. ACTUAL REPORT:
INTRODUCTION:
In today's worlds the small as well as big -big organizations are using cloud computing
technology to protect their data and to use the cloud resources as and when they need .
Cloud is a subscription based service .Cloud computing is a shared pool of resources.
The way of use computers and store our personal and business information can arises
new data security challenges. Encryption mechanisms not protect the data in the cloud
from unauthorized access. As we know that the traditional database system are usually
deployed in closed environment where user can access the system only through a
restricted network or internet. With the fast growth of W.W.W user can access virtually
any database for which they have proper access right from anywhere in the world . By
registering into cloud the users are ready to get the resources from cloud providers and
the organization can access their data from anywhere and at any time when they need.
But this comfortness comes with certain type of risk like security and privacy. To
overcome by this problem we are using a new technique called as fog computing. Fog
computing provides security in cloud environment in a greater extend to get the benefit
of this technique a user need to get registered with the fog. once the user is ready by
filling up the sign up form he will get the msg or email that he is ready to take the
services from fog computing. CISCO recently delivered the vision of fog computing to
enable applications on billions of connected device to run directly at the network edge .
Customers can develop, manage and run software applications on Cisco framework of
networked devices including hardened routers and switches. Cisco brings the open
source Linux and network operating system together in a single networked device.
10
Cloud computing has so amny advantages, italso suffers certain shortcomings too.
High latency.
Security.
Resiliency impractical.
12
stemming from the reason fog computing was developed : to addresss applications and
service that do not fit the paradigm of cloud.
Security
Progammability
FOG vs CLOUD :
15
16
4. APPLICATIONS OF FOG
COMPUTING :
17
CONNECTED CARS :
Fog computing is ideal for Connected Vehicles (CV) because real-time interactions will
make communications between cars, access points and traffic lights as safe and efficient
as possible. Autonomous vehicle is the new trend taking place on the road. Tesla is
working on software to add automatic steering, enabling literal "hands free" operations
of the vehicle. Starting out with testing and releasing self-parking features that don't
require a person behind the wheel. Within 2017 all new cars on the road will have the
capability to connect to cars nearby and internet. Fog computing will be the best option
for all internet connected vehicles why because fog computing gives real time
interaction. Cars, access point and traffic lights will be able to interact with each other
and so it makes safe for all. At some point in time, the connected car will start saving
lives by reducing automobile accidents.
SMART GRID :
Fog computing allows fast, machine-to-machine (M2M) handshakes and human to
machine interactions (HMI),which would work in cooperation with the cloud. Smart
grid is another application where fog computing is been used. Based on demand for
18
energy, its obtainability and low cost, these smart devices can switch to other energies
like solar and winds. The edge process the data collected by fog collectors and generate
control command to the actuators. The filtered data are consumed locally and the
balance to the higher tiers for visualization, real-time reports and transactional
analytics. Fog supports semi-permanent storage at the highest tier and momentary
storage at the lowest tier.
SMART CITIES :
Fog computng would be able to obtain sensor data on all levels, and integrate all the
mutually independent network entities within. Fog enables traffic signals to open lanes
on sensing flashing lights of the ambulance. It detects presence of pedestrian and bikers,
19
and measures the distance and speed of the close by vehicles. Sensor lighting turns on,
on indentifying movements and vice-versa. Smart lights serves as fog devices
synchronize to send warning signals to the approaching vehicles. The interactions
between vehicle and access points are enhanced with WiFi, 3G, road side units and
smart traffic lights.
20
The cloud computing market for healthcare is expected to reach $5.4 billion by 2017,
and fog computing would allow this on a more localised level.
Tech giant CISCO and IBM are the driving forces behind fog computing, and link
their concept to the emerging Internet of Things (IoT).
Most of the buzz around fog has a direct correlation with the emergence of the
Internet of Things (IoT).
Wearables with virtual interfaces need to process their environment locally to aid
the user. Fog computing allows for that processing to happen almost immediately,
improving the user experience.
21
22
CONCLUSION :
The system was developed only with email provision but we have also implemented the
SMS technique. In Fog Computing we presenting a new approach for solving the
problem of insider data theft attacks in a cloud using dynamically generated decoy files
and also saving storage required for maintaining decoy files in the cloud. So by using
decoy technique in Fog can minimize insider attacks in cloud.
Also,
BIBLIOGRAPHY :
23
a.
https://www.cs.columbia.edu/~angelos/Papers/2012/Fog_Computing_Position_Paper
_WRIT_2012.pdf
b.
http://www.dataversity.net/the-future-of-cloud-computing-fog-computing-and-theinternet-of-things/
c.
https://www.researchgate.net/post/Which_are_the_differences_between_Fog_Comput
ing_and_Mobile_Cloud_Computing
d.
https://en.wikipedia.org/wiki/Fog_computing
24