Seminar Report on Fog Computing Submitted in partial fulfilment of the requirements for the award of medical-site.info Degree in Information Technology Of University of. In this pdf seminar report, we discuss the basic introduction of fog computing, its architecture, the role of fog computing in IoT, and working of. ABSTRACT. Fog Computing is a paradigm that extends Cloud computing advantages of Fog computing, and analyses its applications in .. this seminar.
|Language:||English, Spanish, French|
|Genre:||Science & Research|
|Distribution:||Free* [*Register to download]|
Fog Computing - Free download as PDF File .pdf), Text File .txt) or read online for free. Fog computing seminar report. Seminar report. 1. FROM CLOUD TO FOG AND IoT 1 TOPIC: FROM CLOUD COMPUTING TO FOG COMPUTING AND INTERNET OF THINGS. Fog Computing is a paradigm that extends Cloud computing and Hello,I need this ppt and the seminar report of medical-site.info u please mail me this. A malicious user can either tamper with its own smart meter, report false.
Examples of the devices include toys, cars, medical devices and machinery. The goal is to integrate the abstractions and precision of software and networking with the dynamics, uncertainty and noise in the physical environment. The Internet of Things IoT represents a new world of information and communication technologies ICTs from anytime, anyplace connectivity for anyone.
All Things in Internet of things or IoT are uniquely addressable and are connected using standard communication protocols. It will consist of connections that will multiply and create entirely new dynamic network of networks.
In this, objects or things are made as smart so that they will become knowledgeable and their properties such as transformation, interactions will allow them to actively interact in environment. Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications M2M and covers a variety of protocols, domains, and applications.
The interconnection of these embedded devices including smart objects , is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid, and expanding to the areas such as Smart city.
FROM CLOUD TO FOG AND IoT 8 The characteristics of fog computing like mobility, proximity to end-users, low latency, location awareness, heterogeneity, and due to its support for yielding better and more real-time applications fog computing platform is considered as the appropriate platform for Internet of Things applications and services which include and not restricted to connected vehicles, smart grid and smart cities.
It is estimated that by , there will be 50 billion connected devices. The data these devices will generate is going to be really huge. The speed with which data can be collected and processed has to definitely increase. By using the concepts of fog computing, if the same device can be used for these kind of processing, data generated can be put to immediate use and deliver a much better user experience.
Thus fog computing is going to play a big role in internet of things applications.
Cisco in Jan unveiled a fog computing platform for internet of things called IOx. Cisco extended their network device software with a parallel Linux stack. This enables device makers to create their device interfaces and create and host applications on the network device. There are various ways to use cloud services to save or store files, documents and media in remote services that can be accessed whenever user connect to the Internet.
The issue of providing security to confidential information is core security problem, that it does not provide level of assurance most people desire. There are various methods to secure remote data in cloud using standard access control and encryption methods.
It is good to say that all the standard approaches used for providing security have been demonstrated to fail from time to time for a variety of reasons, including faulty implementations, buggy code, insider attacks, misconfigured services, and the creative construction of effective and sophisticated attacks not envisioned by the implementers of security procedures. Building a secure and trustworthy cloud computing environment is not enough, because attacks on data continue to happen, and when they do, and information gets lost, there is no way to get it back.
There is a need to get solutions to such accidents. We can secure Cloud services by implementing given additional security features. Decoy System: Serving decoys will confuse an attacker into believing they have ex-filtrated useful information, when they have not. Whenever abnormal and unauthorized access to a cloud service is noticed, decoy information may be returned by the Cloud and delivered in such a way that it appear completely normal and legitimate.
Validating whether data access is authorized when abnormal information access is detected 2. Confusing the attacker with bogus information that is by providing decoy documents. Our experimental results in a local file system setting show that combining both techniques can yield better detection results. This results suggest that this approach may work in a Cloud environment, to make cloud system more transparent to the user as a local file system. Instead of housing information at data center sites far from the end-point, the Fog aims to place the data close to the end-user.
First of all, big data and analytics can be done faster with better results. Second, administrators are able to support location-based mobility demands and not have to traverse the entire network.
Third, these edge Fog systems would be created in such a way that real-time data analytics become a reality on a truly massive scale. By controlling data at various edge points, Fog computing integrates core cloud services with those of a truly distributed data center platform.
As more services are created to benefit the end-user, edge and Fog networks will become more prevalent. Many organizations are already adopting the concept of the Fog. Many different types of services aim to deliver rich content to the end-user. This spans IT shops, vendors, and entertainment companies as well. From there, administrators are able to tie-in analytics, security, or other services directly into their cloud model. This means bringing information closer to the end-user, reducing latency and being prepared for the Internet of Everything.
More users are utilizing mobility as their means to conduct business and their personal lives. We compare it with HMAC embedded within the document.
If the two HMACs match, the document is deemed a decoy and an alert is issued. Decoy System 3. Combining the Two Techniques: The correlation of search behavior anomaly detection with trap-based decoy files should provide stronger evidence of malfeasance, and therefore improve a detectors accuracy.
We hypothesize that detecting abnormal search operations performed prior to an unsuspecting user opening a decoy file will corroborate the suspicion that the user is indeed impersonating another victim user.
This scenario covers the threat model of illegitimate access to Cloud data. Furthermore, an accidental opening of a decoy file by a legitimate user might be recognized as an accident if the search behavior is not deemed abnormal. In other words, detecting abnormal search and decoy traps together may make a very effective masquerade detection system. Combining the two techniques improves detection accuracy. Architecture of Fog Computing Fig4. In two ways login is done in system that are admin login and user login.
When admin login to the system there are again two steps to follow: step1:Enter username step2:Enter the password. After successful login of admin he can perform all admin related tasks, but while downloading any file from fog he have to answer the security Question if he answer it correctly then only original file can be download.
B Anil for his constant support and encouragement in preparation of this report and for making available library and laboratory facilities needed to prepare this report. I would like to thank Prof. Anjana K R, our Head Of the Department, for her valuable suggestions and guidance throughout the period of this report.
I would also like to express my sincere gratitude to the seminar co-ordinators Prof. Sanju Place: Trivandrum Date: What we can do with FOG…………………….. Security in FOG Computing…………………. Cloud computing promises to significantly change the way of use computers and store our personal and business information. With these new computing and communication paradigms arise new data security challenges.
Existing data protection mechanisms such as Encryption have failed to protect the data in the cloud from unauthorized access. We proposed a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker.
Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.
Customers can develop, manage and run software applications on Cisco IOx framework of networked devices, including hardened routers, switches and IP video cameras.
Cisco IOx brings the open source Linux and Cisco IOS network operating system together in a single networked device initially in routers. The open application environment encourages more developers to bring their own applications and connectivity interfaces at the edge of the network. Cloud computing has become the buzz word during the recent years.
But it largely depends on servers which are available in a remote location, resulting in slow response time and also scalability issues. Response time and scalability plays a crucial role in machine to machine communication and services.
Cloud computing refers to the practice of transitioning computer services such as computation or data storage to multiple redundant offsite locations available on the Internet, which allows application software to be operated using internet-enabled devices. In Existing data protection mechanisms such as encryption was failed in securing the data from the attacker.
It does not verify whether the user was authorized or not. Cloud computing security does not focus on ways of secure the data from unauthorized access. In we have our own confidential documents in the cloud.
This file does not have much security. Twitter incident is one example of a data theft attack in the Cloud. Bandwidth Transmitting and processing data requires bandwidth. Fog computing is a paradigm which extends cloud computing paradigm to the edge of the network. Terms Edge Computing and Fog Computing are often used interchangeably.
Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. This enables new breed of applications and services. Fog reduces service latency, and improves QoS Quality of Service , resulting in superior user-experience.
Fog paradigm is well positioned for real time Big Data and real time analytics, it supports densely distributed data collection points, hence adding a fourth axis to the often mentioned Big Data dimensions volume, variety, and velocity.
Unlike traditional data centers, Fog devices are geographically distributed over heterogeneous platforms, spanning multiple management domains.
In the past few years, Cloud computing has provided many opportunities for enterprises by offering their customers a range of computing services. However, this bliss becomes a problem for latency-sensitive applications, which require nodes in the vicinity to meet their delay requirements.