SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
BELAGAVI-590018
A
Seminar Report
On
“FOG COMPUTING”
Submitted in Partial Fulfillment for the award of the
Degree of Bachelor of Engineering
In
COMPUTER SCIENCE AND ENGINEERING
Submitted By
MR.MAHANTESH HIREMATH
(USN: 2JI13CS024)
Under the Guidance of
PROF. VIJAYALAXMI S. NAGANUR
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
JAIN COLLEGE OF ENGINEERING
BELAGAVI– 590 014
2016-2017
JAIN COLLEGE OF ENGINEERING, BELAGAVI
DEPARTMENT
OF
COMPUTER SCIENCE AND ENGINEERING
Certificate
This is to certify that the seminar title Fog Computing presented by Mr.Mahantesh
Hiremath bearing USN:2JI13CS024 in partial fulfilment of the requirement for the award
of Bachelor Of Engineering in Computer Science and Engineering of Visvesvaraya
Technological University, Belagavi during the year 2016-17. It is certified that all
corrections/suggestions indicated by guide have been presented in the report. The seminar
report has been approved as it satisfies the academic requirements in the report of seminar
prescribed for the said degree.
Signature of the guide H.O.D
PROF. VIJAYALAXMI S. NAGANUR PROF.PRAVEEN CHITTI
Name of the examiners: Signature of the examiners
1. 1.
2. 2.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access
and store our personal and business information. With these new computing and communications
paradigms arise new data security challenges. Existing data protection mechanisms such as
encryption have failed in preventing data theft attacks, especially those perpetrated by an insider
to the cloud provider. For securing user data from such attacks a new paradigm called fog
computing can be used. Fog Computing is a paradigm that extends Cloud computing and
services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage,
and application services to end-users. The motivation of Fog computing lies in a series of real
scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined
network .This technique can monitor the user activity to identify the legitimacy and prevent from
any unauthorized user access. Here we have discussed this paradigm for preventing misuse of
user data and securing information.
TABLE OF CONTENTS
1. Introduction……………………………………………………………………1
1.1 Introduction to fog computing....................................................................... 1
1.2 Cloud Computing...........................................................................................1
1.3 Disadvantages.................................................................................................2
1.4 Concept of fog computing..............................................................................2
1.5 Characteristics of the fog................................................................................3
1.6 Existing System..............................................................................................4
1.7 Proposed System............................................................................................4
2. Literature Survey……………………………………………………………...5
3. Methodology…………………………………………………………………...7
4. Securing Clouds With Fog……………………………………………………8
4.1Implementing Security Features…………………………………………….8
5. Applications..………………………………………………………………….13
Conclusion…………………………………………………………………….16
References…………………………………………………………………….17
LIST OF FIGURES
Fig1.1 Fog between edge and cloud…………………………………...………2
Fig1.2 Represents the edge network in Fog computing……………………….3
Fig4.1 Decoy System………………………………………………………...10
Fig4.2 Architecture of Fog Computing………………………………………11
Fig5.1 Fog computing in smart grid………………………………………….13
Fig5.2 Fog computing in smart traffic lights and connected vehicles..............14
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 1
Chapter 1
INTRODUCTION
1.1 Introduction to fog computing
In this era, Cloud computing is achieving popularity every day. The ease of use and
storage which is provided to users for personal and business purposes is increasing its
demand.
Although, cloud computing provides an environment through which managing and
accessing of data becomes easier but it have consequences such as data leakage, data theft,
insider attacks etc. Very common risks now days are data theft attacks. The Twitter incident
is one example of a data theft attack from the Cloud. Several Twitter corporate and personal
documents were ex-filtrated to technological website Tech Crunch and customers’ accounts,
including the account of U.S. President Barack Obama, were illegally accessed. The attacker
used a Twitter administrator’s password to gain access to Twitter’s corporate documents,
hosted on Google’s infrastructure as Google Docs. The damage was significant both for
Twitter and for its customers.
Van Dijk and Juels have shown that fully homomorphic encryption, often acclaimed
as the solution to such threats, is not a sufficient data protection mechanism when used alone.
To resolve these issues a mechanism which can detect such malicious activities is required.
For this, Fog computing is paradigm which monitors the data and helps in detecting an
unauthorized access.
1.2 Cloud Computing
Cloud computing is a delivery platform which promises a new way of accessing and
storing personal as well as business information. Cloud computing refers to the practice of
transitioning computer services such as computation or data storage to multiple redundant
offsite locations available on the Internet, which allows application software to be operated
using internet-enabled devices.
In existing data protection mechanisms such as encryption was failed in securing the
data from the attacker. It does not verify whether the user was authorized or not.
Cloud computing security does not focus on ways of secure the data from
unauthorized access.
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 2
In 2009 we have our own confidential documents in the cloud. This file does not have
much security. So, hacker gains access the documents. Twitter incident is one example of a
data theft attack in the Cloud.
1.3 Disadvantages
 Nobody is identified when the attack is happen.
 It is complex to detect which user is attack.
 We cannot detect which file was hacking.
 Cloud Computing Issue: Bandwidth
Transmitting and processing data requires bandwidth. The more data, the more
bandwidth is needed. Current cloud computing models can’t keep up with the amount of
bandwidth that will be needed.
1.4 Concept of fog computing
Fog Computing is an extension of Cloud Computing. As in a Cloud, Fog computing
also provides data, compute, storage, and application services to end-users. The difference is
Fog provides proximity to its end users through dense geographical distribution and it also
supports mobility. Fog computing improves the Quality of service and also reduces latency.
We adopt a simple three level hierarchy as in Figure 1.1
Fig1.1 Fog between edge and cloud
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 3
In this framework, each smart thing is attached to one of Fog devices. Fog devices
could be interconnected and each of them is linked to the Cloud. As Fog computing is
implemented at the edge of the network, it provides low latency, location awareness, and
improves quality-of-services (QoS) for streaming and real time applications. Typical
examples include industrial automation, transportation and networks of sensors and actuators.
The Fog paradigm is well positioned for real time big data analytics, supports densely
distributed data collection points, and provides advantages in entertainment, advertising,
personal computing and other applications.
1.5 Characteristics of the fog are
a) Low latency and location awareness.
b) Wide-spread geographical distribution.
c) Mobility.
d) Very large number of nodes.
e) Predominant role of wireless access.
f) Strong presence of streaming and real time application.
g) Heterogeneity.
Fig1.2 Represents the edge network in Fog computing
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 4
The main Feature of Fog Computing is its ability to support applications that require
low latency, location awareness and mobility. This ability made possible by fact that fog
computing systems are developed closer to the End users in a widely disturbed manner.
1.6 Existing System
Existing data protection mechanisms such as encryption was failed in securing the
data from the attackers. It does not verify whether the user was authorized or not. Cloud
computing security does not focus on ways of secure the data from unauthorized access.
Encryption does not provide much security to our data. In 2009 we have our own confidential
documents in the cloud. This files does not have much security. So, hacker gains access the
documents. Twitter incident is one example of a data theft attack in the Cloud. Difficult to
find the attacker. In 2010 and 2011 Cloud computing security was developed against
attackers. Finding of hackers in the cloud. Additionally, it shows that recent research results
that might be useful to protect data in the cloud.
1.7 Proposed System
We proposed a completely new technique to secure user’s data in cloud using user
behavior and decoy information technology called as Fog Computing. We use this techniques
to provide data security in the cloud. A different approach for securing data in the cloud using
offensive decoy technology. We monitor data access in the cloud and detect abnormal data
access patterns. In this technique when the unauthorized person try to access the data of the
real user the system generates the fake documents in such a way that the unauthorized person
was also not able to identify that the data is fake or real .It is identified thought a question
which is entered by the real user at the time of filling the sign up form. If the answer of the
question is wrong it means the user is not the real user and the system provide the fake
document else original documents will be provided by the system to the real user.
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 5
Chapter 2
LITERATURE REVIEW
Madsen.H and Albeanu [1]. G presented the challenges faced by current computing
paradigms and discussed how Fog computing platforms are feasible with cloud and are
reliable for real life projects. Fog computing is mainly done for the need of the geographical
distribution of resources instead of having a centralized one. A multi-tier architecture is
followed in Fog computing platforms. In first tire there is machine to machine
communication and the higher tiers deal with visualization and reporting. The higher tier is
represented by the Cloud. They said that building Fog computing projects are challenging.
Z. Jiang et al. [2] Discussed Fog computing architecture and further used it for
improving Web site's performance with the help of edge servers. They said that the emerging
architecture of Fog Computing is highly virtualized. They presented that their idea that the
Fog servers monitor the requests made by the users and keep a record of each request by
using the user’s IP address or MAC address.
Sabahi, F. [3] mentioned threats and response of cloud computing. He presented a
comparison of the benefits and risks of compromised security and privacy. In this paper he
has summarized reliability and availability related issues of cloud resources provided by the
trusted third party. He discussed about the most common attacks nowadays are Distributed
Denial of Service attacks. The solution to these attacks can be, cloud technology offering the
benefit of flexibility, with the ability to provide resources almost instantaneously as necessary
to avoid site shutdown . Considering all these requirements, this prototype is created which
includes two main steps: first is to create users and generate patterns of their different access
behaviors, next step is monitoring the user access patterns.
Salvatore J. Stoflio et al. [4] introduced a new technology known as Fog computing.
They implemented security by utilizing decoy information technology. They explained two
methods i.e. User behaviour profiling and Decoy. In User behaviour profiling they examined
how, when and how much amount of information a subscriber is accessing. They scanned
their subscriber’s activity to examine for any abnormality in the data access nature of the
subscriber. The second technique is decoy in which information which is bogus or we can say
fraud i.e., honey pots, honey files, etc. are utilized to confuse the intruder or malicious
intruder by representing the information in such a way that it appears real.
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 6
Madsen.H and Albeanu. G [5] showed the challenges faced by current computing
paradigms and explained how Fog computing platforms are viable with cloud and flexible for
real life projects. Fog computing is primarily performed for the requirement of the
geographical distribution of resources rather than having a centralized one. A multi-tier
architecture is adopted in Fog computing platforms. In first tire there is machine to machine
communication and the higher tiers handle visualization and reporting. The higher tier is
shown by the Cloud. They said that making Fog computing projects are challenging [5] but
there are algorithms and techniques exist that handle reliability and assure fault tolerance.
With their support such real life projects are possible.
Claycomb, W. R. (2012) [8] has featured a hierarchy of administrators within cloud
service suppliers and also provide examples of attacks from real insider attack cases. They
talked about how cloud architecture let intruders to breach the security. They have also
shown two extra cloud related insider risks: the insider who exploits a cloud-related
susceptibility to steal information from a cloud system, and the insider who utilizes cloud
systems to carry out an attack on user’s local resource. They specified the key challenges
faced by cloud suppliers and clients for protected their highly confidential data.
Park, Y. Et al. (2012) [9] formulated a method that was a software decoy for
protecting cloud data utilizing software. They introduced a software-based decoy system that
purposes to deceive insiders, to determine the ex-filtration of proprietary source code. The
system makes a Java code which seems as valuable information to the intruder. Further static
obfuscation method is utilized to create and transform original software. Bogus programs are
combined by software that is automatically transformed from actual source code, but
designed to be dissimilar to the original[9].This deception method confuses the insider and
also obfuscation supports the secure data by hiding it and making bogus information for
insider. Beacons are also inserted into the bogus software to determine the ex-filtration and to
build an alert if the decoy software is touched, compiled or executed.
Ivan Stojmenovic & Sheng Wen (2014)[10], showed Fog Computing is a paradigm
that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog
provides data, compute, storage, and application services to end-users and elaborate the
motivation and advantages of Fog computing, and analyse its applications in a series of real
scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined
networks. Investigate the stealthy features of this attack by examining its CPU and memory
consumption on Fog device.
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 7
Chapter 3
METHEDOLOGY
In Fog computing, services can be hosted at end devices such as set-top-boxes or
access points. The infrastructure of this new distributed computing allows applications to run
as close as possible to sensed actionable and massive data, coming out of people, processes
and things. Such Fog computing concept, actually a Cloud computing close to the ground,
creates automated response that drives the value. Both Cloud and Fog provide data,
computation, storage and application services to end-users. However, Fog can be
distinguished from Cloud by its proximity to end-users, the dense geographical distribution
and its support for mobility. We adopt a simple three level hierarchy as in Figure 1.2 In this
framework, each smart thing is attached to one or more of Fog nodes. Fog devices could be
interconnected and each of them is linked to the Cloud. While Fog and Cloud use the same
resources (networking, compute, and storage), and share many of the same mechanisms and
attributes (virtualization, multi-tenancy) the extension is a non-trivial one in that there exist
some fundamental differences. The Fog vision was conceived to address applications and
services that do not fit well the paradigm of the Cloud. They include:
 Applications that require very low and predictable latency— the Cloud frees the user
from many implementation details, including the precise knowledge of where the
computation or storage takes place. This freedom from choice, welcome in many
circumstances becomes a liability when latency is at premium (gaming, video
conferencing).
 Geo-distributed applications (pipeline monitoring, sensor networks to monitor the
environment).
 Fast mobile applications (smart connected vehicle, connected rail).
 Large-scale distributed control systems (smart grid, connected rail, smart traffic light
systems).
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 8
Chapter 4
SECURING CLOUDS WITH FOG
There are various ways to use cloud services to save or store files, documents and
media in remote services that can be accessed whenever user connect to the Internet. The
main problem in cloud is to maintain security for users data in way that guarantees only
authenticated users and no one else gain access to that data. The issue of providing security to
confidential information is core security problem, that it does not provide level of assurance
most people desire. There are various methods to secure remote data in cloud using standard
access control and encryption methods. It is good to say that all the standard approaches used
for providing security have been demonstrated to fail from time to time for a variety of
reasons, including faulty implementations, buggy code, insider attacks, mis-configured
services, and the creative construction of effective and sophisticated attacks not envisioned
by the implementers of security procedures. Building a secure and trustworthy cloud
computing environment is not enough, because attacks on data continue to happen, and when
they do, and information gets lost, there is no way to get it back. There is a need to get
solutions to such accidents. The basic idea is that we can limit the damage of stolen data if we
decrease the value of that stolen data to the attacker. We can achieve this through a
preventive decoy (disinformation) attack. We can secure Cloud services by implementing
given additional security features.
4.1 Implementing Security Features
1. User Behavior Profiling:
It is expected that access to a user’s information in the Cloud will exhibit a normal
means of access. User profiling is a well known technique that can be applied here to
model how, when, and how much a user accesses their information in the Cloud. Such
‘normal user’ behavior can be continuously checked to determine whether abnormal
access to a user’s information is occurring. This method of behavior-based security is
commonly used in fraud detection applications. Such profiles would naturally include
volumetric information, how many documents are typically read and how often. These
simple user specific features can serve to detect abnormal Cloud access based partially
upon the scale and scope of data transferred.
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 9
2. Decoy System:
Decoy data, such as decoy documents, honeypots and other bogus information can
be generated on demand and used for detecting unauthorized access to information and to
“poison” the thief’s ex-filtrated information. Serving decoys will confuse an attacker into
believing they have ex-filtrated useful information, when they have not. This technology
may be integrated with user behavior profiling technology to secure a user’s data in the
Cloud. Whenever abnormal and unauthorized access to a cloud service is noticed, decoy
information may be returned by the Cloud and delivered in such a way that it appear
completely normal and legitimate. The legitimate user, who is the owner of the
information, would readily identify when decoy information is being returned by the
Cloud, and hence could alter the Cloud’s responses through a variety of means, such as
challenge questions, to inform the Cloud security system that it has incorrectly detected
an unauthorized access. In the case where the access is correctly identified as an
unauthorized access, the Cloud security system would deliver unbounded amounts of
bogus information to the attacker, thus securing the user’s true data from can be
implemented by given two additional security features:
1) validating whether data access is authorized when abnormal information access is
detected, and
2) Confusing the attacker with bogus information that is by providing decoy documents.
The decoy documents carry a keyed-Hash Message Authentication Code (HMAC),
which is hidden in the header section of the document. The HMAC is computed over the
file’s contents using a key unique to each user. When a decoy document is loaded into
memory, we verify whether the document is a decoy document by computing a HMAC based
on all the contents of that document. We compare it with HMAC embedded within the
document. If the two HMACs match, the document is deemed a decoy and an alert is issued.
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 10
Fig4.1 Decoy System
3. Combining the Two Techniques:
The correlation of search behavior anomaly detection with trap-based decoy files
should provide stronger evidence of malfeasance, and therefore improve a detector’s
accuracy. We hypothesize that detecting abnormal search operations performed prior to
an unsuspecting user opening a decoy file will corroborate the suspicion that the user is
indeed impersonating another victim user. This scenario covers the threat model of
illegitimate access to Cloud data. Furthermore, an accidental opening of a decoy file by a
legitimate user might be recognized as an accident if the search behavior is not deemed
abnormal. In other words, detecting abnormal search and decoy traps together may make
a very effective masquerade detection system. Combining the two techniques improves
detection accuracy.
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 11
Fig4.2 Architecture of Fog Computing
Fig4. states the actual working of the fog computing .In two ways login is done in
system that are admin login and user login .When admin login to the system there are again
two steps to follow: step1:Enter username step2:Enter the password . After successful login
of admin he can perform all admin related tasks, but while downloading any file from fog he
have to answer the security Question if he answer it correctly then only original file can be
download. In other case, when admin or user answer incorrectly to the security question then
decoy document (fake document) is provided to the fake user. Decoy technology work in the
given manner if you have any word ,suppose “MADAM” in the document then some
alphabets are replaced as M->A then the given word become “AADAA” which have no
meaning. In some Case, if attacker getting to know that “M” is replaced by “A” in the given
document and by applying reverse engineering he get result as “MMDMM”. In any case he
can’t judge content of document.
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 12
When user login to the system he also have to follow the same procedure as admin.
Operations like upload files/documents, download files/documents, view alerts, send
message, read message, broadcast any message all these can be perform by the user. ALERT
this stream provide the detail knowledge of attack done on their personal file/document with
details like date, time, number of times the attacker trying to hack that file/document .Best
thing of fog Computing is after each successful login the user get SMS on the mobile that
“login successful”. From this the user get alert when other else trying to gain access to his/her
personal fog account and when attacker trying to download some files/documents then user
also get SMS that contain attacker ip-address, attacker’s server name, date, time details on
his/her mobile so that become easy to catch attacker by tracing all these things.
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 13
Chapter 5
APPLICATIONS
Connected car: Autonomous vehicle is the new trend taking place on the road. Tesla is
working on software to add automatic steering, enabling literal "hands free" operations of the
vehicle. Starting out with testing and releasing self-parking features that don't require a
person behind the wheel. Within 2017 all new cars on the road will have the capability to
connect to cars nearby and internet. Fog computing will be the best option for all internet
connected vehicles why because fog computing gives real time interaction. Cars, access point
and traffic lights will be able to interact with each other and so it makes safe for all. At some
point in time, the connected car will start saving lives by reducing automobile accidents.
Smart Grids: Smart grid is another application where fog computing is been used. Based on
demand for energy, its obtainability and low cost, these smart devices can switch to other
energies like solar and winds. As shown in Figure 5.1,The edge process the data collected by
fog collectors and generate control command to the actuators. The filtered data are consumed
locally and the balance to the higher tiers for visualization, real-time reports and transactional
analytics. Fog supports semi-permanent storage at the highest tier and momentary storage at
the lowest tier.
Fig5.1 Fog computing in smart grid
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 14
Smart Traffic lights: Fog enables traffic signals to open lanes on sensing flashing lights of
the ambulance. It detects presence of pedestrian and bikers, and measures the distance and
speed of the close by vehicles. As shown in Figure 5.2,Sensor lighting turns on, on
indentifying movements and vice-versa. Smart lights serves as fog devices synchronize to
send warning signals to the approaching vehicles. The interactions between vehicle and
access points are enhanced with WiFi, 3G, road side units and smart traffic lights.
Fig 5.2 Fog computing in smart traffic lights and connected vehicles
Wireless Sensor and Actuator Networks: Traditional wireless sensor networks fall short in
applications that go beyond sensing and tracking, but require actuators to exert physical
actions like opening, closing or even carrying sensors [2]. In this scenario, actuators serving
as Fog devices can control the measurement process itself, the stability and the oscillatory
behaviors by creating a closed-loop system.
Self Maintaining Train: Another application of fog computing is self maintaining trains. A
train ball-bearing monitoring sensor will sense the changes in the temperature level and any
disorder will automatically alert the train operator and make maintenance according to. Thus
we can avoid major disasters.
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 15
Smart Traffic Lights and Connected Vehicles: Video camera that senses an ambulance
flashing lights can automatically change street lights to open lanes for the vehicle to pass
through traffic. Smart street lights interact locally with sensors and detect presence of
pedestrian and bikers, and measure the distance and speed of approaching vehicles.
IoT and Cyber-physical systems (CPSs): Fog computing based systems are becoming an
important class of IoT and CPSs. Based on the traditional information carriers including
Internet and telecommunication network, IoT is a network that can interconnect ordinary
physical objects with identified address. CPSs feature a tight combination of the system’s
computational and physical elements. CPSs also coordinate the integration of computer and
information centric physical and engineered systems.
IoT and CPSs promise to transform our world with new relationships between
computer-based control and communication systems, engineered systems and physical
reality. Fog computing in this scenario is built on the concepts of embedded systems in which
software programs and computers are embedded in devices for reasons other than
computation alone. Examples of the devices include toys, cars, medical devices and
machinery. The goal is to integrate the abstractions and precision of software and networking
with the dynamics, uncertainty and noise in the physical environment. Using the emerging
knowledge, principles and methods of CPSs, we will be able to develop new generations of
intelligent medical devices and systems, ‘smart’ highways, buildings, factories, agricultural
and robotic systems
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 16
CONCLUSION
This proposal of monitoring data access patterns by profiling user behavior to
determine if and when a malicious insider illegitimately accesses someone’s documents in a
Cloud service. Decoy documents stored in the Cloud alongside the user’s real data also serve
as sensors to detect illegitimate access. Once unauthorized data access or exposure is
suspected, and later verified, with challenge questions for instance, this inundate the
malicious insider with bogus information in order to dilute the user’s real data. Such
preventive attacks that rely on disinformation technology could provide unprecedented levels
of security in the Cloud and in social networks.
FOG COMPUTING
Department of Computer Science & Engineering, JCE, Belagavi Page 17
REFERENCES
[1] Madsen, Henrik, et al. "Reliability in the utility computing era: Towards reliable Fog
computing." Systems, Signals and Image Processing (IWSSIP), 2013 20th International
Conference on. IEEE, 2013.
[2] Zhu, Jiang,“Improving Web Sites Performance Using Edge Servers in Fog Computing
Architecture”, Service Oriented System Engineering (SOSE), IEEE. 2013.
[3] Sabahi, F. “Cloud computing security threats and responses”, In Communication Software
and Networks (ICCSN), 2011 IEEE 3rd International Conference on 2011,pp. 245-249.
[4] Stolfo, Salvatore J., Malek Ben Salem, and Angelos D. Keromytis. "Fog computing:
Mitigating insider data theft attacks in the cloud." Security and Privacy Workshops (SPW),
2012 IEEE Symposium on. IEEE, 2012
[5] Madsen, Henrik, et al. "Reliability in the utility computing era: Towards reliable Fog
computing." Systems, Signals and Image Processing (IWSSIP), 2013 20th International
Conference on. IEEE, 2013
[6] C. Wei, Z. Fadlullah, N. Kato, and I. Stojmenovic, “On optimally reducing power loss in
micro-grids with power storage devices,” IEEE Journal of Selected Areas in
Communications, 2014 to appear.
[7] Bonomi, Flavio, et al. "Fog computing and its role in the internet of things." Proceedings
of the first edition of the MCC workshop on Mobile cloud computing. ACM, 2012, pp. 13-
16.
[8] Claycomb, W. R., & Nicoll, A. “Insider Threats to Cloud Computing: Directions for New
Research Challenges”, In Computer Software and Applications Conference (COMPSAC),
IEEE 36th Annual, July, pp. 387-394, 2012
[9] Park, Y., & Stolfo, S. J. “Software decoys for insider threat”, In Proceedings of the 7th
ACM Symposium on Information, Computer and Communications Security, May, pp. 93-94,
2013.
[10] Ivan Stojmenovic & Sheng Wen ,” The Fog Computing Paradigm: Scenarios and
Security Issues” In Proceedings of the 2014 Federated Conference on Computer Science and
Information Systems pp. 1–8.

Contenu connexe

Tendances

Tendances (20)

Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
SMART NOTE TAKER
SMART NOTE TAKERSMART NOTE TAKER
SMART NOTE TAKER
 
Rain technology
Rain technologyRain technology
Rain technology
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Cluster Computing Seminar.
Cluster Computing Seminar.Cluster Computing Seminar.
Cluster Computing Seminar.
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 
wireless usb ppt
wireless usb pptwireless usb ppt
wireless usb ppt
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
 
SMART NOTE TAKER REPORT
SMART NOTE TAKER REPORTSMART NOTE TAKER REPORT
SMART NOTE TAKER REPORT
 

Similaire à Fog computing

seminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxseminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxPrasannaKumarpanda2
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection SystemIJMTST Journal
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 

Similaire à Fog computing (20)

seminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxseminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptx
 
76 s201913
76 s20191376 s201913
76 s201913
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 

Dernier

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 

Dernier (20)

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 

Fog computing

  • 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY BELAGAVI-590018 A Seminar Report On “FOG COMPUTING” Submitted in Partial Fulfillment for the award of the Degree of Bachelor of Engineering In COMPUTER SCIENCE AND ENGINEERING Submitted By MR.MAHANTESH HIREMATH (USN: 2JI13CS024) Under the Guidance of PROF. VIJAYALAXMI S. NAGANUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING JAIN COLLEGE OF ENGINEERING BELAGAVI– 590 014 2016-2017
  • 2. JAIN COLLEGE OF ENGINEERING, BELAGAVI DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Certificate This is to certify that the seminar title Fog Computing presented by Mr.Mahantesh Hiremath bearing USN:2JI13CS024 in partial fulfilment of the requirement for the award of Bachelor Of Engineering in Computer Science and Engineering of Visvesvaraya Technological University, Belagavi during the year 2016-17. It is certified that all corrections/suggestions indicated by guide have been presented in the report. The seminar report has been approved as it satisfies the academic requirements in the report of seminar prescribed for the said degree. Signature of the guide H.O.D PROF. VIJAYALAXMI S. NAGANUR PROF.PRAVEEN CHITTI Name of the examiners: Signature of the examiners 1. 1. 2. 2.
  • 3. ABSTRACT Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
  • 4. TABLE OF CONTENTS 1. Introduction……………………………………………………………………1 1.1 Introduction to fog computing....................................................................... 1 1.2 Cloud Computing...........................................................................................1 1.3 Disadvantages.................................................................................................2 1.4 Concept of fog computing..............................................................................2 1.5 Characteristics of the fog................................................................................3 1.6 Existing System..............................................................................................4 1.7 Proposed System............................................................................................4 2. Literature Survey……………………………………………………………...5 3. Methodology…………………………………………………………………...7 4. Securing Clouds With Fog……………………………………………………8 4.1Implementing Security Features…………………………………………….8 5. Applications..………………………………………………………………….13 Conclusion…………………………………………………………………….16 References…………………………………………………………………….17
  • 5. LIST OF FIGURES Fig1.1 Fog between edge and cloud…………………………………...………2 Fig1.2 Represents the edge network in Fog computing……………………….3 Fig4.1 Decoy System………………………………………………………...10 Fig4.2 Architecture of Fog Computing………………………………………11 Fig5.1 Fog computing in smart grid………………………………………….13 Fig5.2 Fog computing in smart traffic lights and connected vehicles..............14
  • 6. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 1 Chapter 1 INTRODUCTION 1.1 Introduction to fog computing In this era, Cloud computing is achieving popularity every day. The ease of use and storage which is provided to users for personal and business purposes is increasing its demand. Although, cloud computing provides an environment through which managing and accessing of data becomes easier but it have consequences such as data leakage, data theft, insider attacks etc. Very common risks now days are data theft attacks. The Twitter incident is one example of a data theft attack from the Cloud. Several Twitter corporate and personal documents were ex-filtrated to technological website Tech Crunch and customers’ accounts, including the account of U.S. President Barack Obama, were illegally accessed. The attacker used a Twitter administrator’s password to gain access to Twitter’s corporate documents, hosted on Google’s infrastructure as Google Docs. The damage was significant both for Twitter and for its customers. Van Dijk and Juels have shown that fully homomorphic encryption, often acclaimed as the solution to such threats, is not a sufficient data protection mechanism when used alone. To resolve these issues a mechanism which can detect such malicious activities is required. For this, Fog computing is paradigm which monitors the data and helps in detecting an unauthorized access. 1.2 Cloud Computing Cloud computing is a delivery platform which promises a new way of accessing and storing personal as well as business information. Cloud computing refers to the practice of transitioning computer services such as computation or data storage to multiple redundant offsite locations available on the Internet, which allows application software to be operated using internet-enabled devices. In existing data protection mechanisms such as encryption was failed in securing the data from the attacker. It does not verify whether the user was authorized or not. Cloud computing security does not focus on ways of secure the data from unauthorized access.
  • 7. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 2 In 2009 we have our own confidential documents in the cloud. This file does not have much security. So, hacker gains access the documents. Twitter incident is one example of a data theft attack in the Cloud. 1.3 Disadvantages  Nobody is identified when the attack is happen.  It is complex to detect which user is attack.  We cannot detect which file was hacking.  Cloud Computing Issue: Bandwidth Transmitting and processing data requires bandwidth. The more data, the more bandwidth is needed. Current cloud computing models can’t keep up with the amount of bandwidth that will be needed. 1.4 Concept of fog computing Fog Computing is an extension of Cloud Computing. As in a Cloud, Fog computing also provides data, compute, storage, and application services to end-users. The difference is Fog provides proximity to its end users through dense geographical distribution and it also supports mobility. Fog computing improves the Quality of service and also reduces latency. We adopt a simple three level hierarchy as in Figure 1.1 Fig1.1 Fog between edge and cloud
  • 8. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 3 In this framework, each smart thing is attached to one of Fog devices. Fog devices could be interconnected and each of them is linked to the Cloud. As Fog computing is implemented at the edge of the network, it provides low latency, location awareness, and improves quality-of-services (QoS) for streaming and real time applications. Typical examples include industrial automation, transportation and networks of sensors and actuators. The Fog paradigm is well positioned for real time big data analytics, supports densely distributed data collection points, and provides advantages in entertainment, advertising, personal computing and other applications. 1.5 Characteristics of the fog are a) Low latency and location awareness. b) Wide-spread geographical distribution. c) Mobility. d) Very large number of nodes. e) Predominant role of wireless access. f) Strong presence of streaming and real time application. g) Heterogeneity. Fig1.2 Represents the edge network in Fog computing
  • 9. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 4 The main Feature of Fog Computing is its ability to support applications that require low latency, location awareness and mobility. This ability made possible by fact that fog computing systems are developed closer to the End users in a widely disturbed manner. 1.6 Existing System Existing data protection mechanisms such as encryption was failed in securing the data from the attackers. It does not verify whether the user was authorized or not. Cloud computing security does not focus on ways of secure the data from unauthorized access. Encryption does not provide much security to our data. In 2009 we have our own confidential documents in the cloud. This files does not have much security. So, hacker gains access the documents. Twitter incident is one example of a data theft attack in the Cloud. Difficult to find the attacker. In 2010 and 2011 Cloud computing security was developed against attackers. Finding of hackers in the cloud. Additionally, it shows that recent research results that might be useful to protect data in the cloud. 1.7 Proposed System We proposed a completely new technique to secure user’s data in cloud using user behavior and decoy information technology called as Fog Computing. We use this techniques to provide data security in the cloud. A different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. In this technique when the unauthorized person try to access the data of the real user the system generates the fake documents in such a way that the unauthorized person was also not able to identify that the data is fake or real .It is identified thought a question which is entered by the real user at the time of filling the sign up form. If the answer of the question is wrong it means the user is not the real user and the system provide the fake document else original documents will be provided by the system to the real user.
  • 10. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 5 Chapter 2 LITERATURE REVIEW Madsen.H and Albeanu [1]. G presented the challenges faced by current computing paradigms and discussed how Fog computing platforms are feasible with cloud and are reliable for real life projects. Fog computing is mainly done for the need of the geographical distribution of resources instead of having a centralized one. A multi-tier architecture is followed in Fog computing platforms. In first tire there is machine to machine communication and the higher tiers deal with visualization and reporting. The higher tier is represented by the Cloud. They said that building Fog computing projects are challenging. Z. Jiang et al. [2] Discussed Fog computing architecture and further used it for improving Web site's performance with the help of edge servers. They said that the emerging architecture of Fog Computing is highly virtualized. They presented that their idea that the Fog servers monitor the requests made by the users and keep a record of each request by using the user’s IP address or MAC address. Sabahi, F. [3] mentioned threats and response of cloud computing. He presented a comparison of the benefits and risks of compromised security and privacy. In this paper he has summarized reliability and availability related issues of cloud resources provided by the trusted third party. He discussed about the most common attacks nowadays are Distributed Denial of Service attacks. The solution to these attacks can be, cloud technology offering the benefit of flexibility, with the ability to provide resources almost instantaneously as necessary to avoid site shutdown . Considering all these requirements, this prototype is created which includes two main steps: first is to create users and generate patterns of their different access behaviors, next step is monitoring the user access patterns. Salvatore J. Stoflio et al. [4] introduced a new technology known as Fog computing. They implemented security by utilizing decoy information technology. They explained two methods i.e. User behaviour profiling and Decoy. In User behaviour profiling they examined how, when and how much amount of information a subscriber is accessing. They scanned their subscriber’s activity to examine for any abnormality in the data access nature of the subscriber. The second technique is decoy in which information which is bogus or we can say fraud i.e., honey pots, honey files, etc. are utilized to confuse the intruder or malicious intruder by representing the information in such a way that it appears real.
  • 11. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 6 Madsen.H and Albeanu. G [5] showed the challenges faced by current computing paradigms and explained how Fog computing platforms are viable with cloud and flexible for real life projects. Fog computing is primarily performed for the requirement of the geographical distribution of resources rather than having a centralized one. A multi-tier architecture is adopted in Fog computing platforms. In first tire there is machine to machine communication and the higher tiers handle visualization and reporting. The higher tier is shown by the Cloud. They said that making Fog computing projects are challenging [5] but there are algorithms and techniques exist that handle reliability and assure fault tolerance. With their support such real life projects are possible. Claycomb, W. R. (2012) [8] has featured a hierarchy of administrators within cloud service suppliers and also provide examples of attacks from real insider attack cases. They talked about how cloud architecture let intruders to breach the security. They have also shown two extra cloud related insider risks: the insider who exploits a cloud-related susceptibility to steal information from a cloud system, and the insider who utilizes cloud systems to carry out an attack on user’s local resource. They specified the key challenges faced by cloud suppliers and clients for protected their highly confidential data. Park, Y. Et al. (2012) [9] formulated a method that was a software decoy for protecting cloud data utilizing software. They introduced a software-based decoy system that purposes to deceive insiders, to determine the ex-filtration of proprietary source code. The system makes a Java code which seems as valuable information to the intruder. Further static obfuscation method is utilized to create and transform original software. Bogus programs are combined by software that is automatically transformed from actual source code, but designed to be dissimilar to the original[9].This deception method confuses the insider and also obfuscation supports the secure data by hiding it and making bogus information for insider. Beacons are also inserted into the bogus software to determine the ex-filtration and to build an alert if the decoy software is touched, compiled or executed. Ivan Stojmenovic & Sheng Wen (2014)[10], showed Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users and elaborate the motivation and advantages of Fog computing, and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. Investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device.
  • 12. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 7 Chapter 3 METHEDOLOGY In Fog computing, services can be hosted at end devices such as set-top-boxes or access points. The infrastructure of this new distributed computing allows applications to run as close as possible to sensed actionable and massive data, coming out of people, processes and things. Such Fog computing concept, actually a Cloud computing close to the ground, creates automated response that drives the value. Both Cloud and Fog provide data, computation, storage and application services to end-users. However, Fog can be distinguished from Cloud by its proximity to end-users, the dense geographical distribution and its support for mobility. We adopt a simple three level hierarchy as in Figure 1.2 In this framework, each smart thing is attached to one or more of Fog nodes. Fog devices could be interconnected and each of them is linked to the Cloud. While Fog and Cloud use the same resources (networking, compute, and storage), and share many of the same mechanisms and attributes (virtualization, multi-tenancy) the extension is a non-trivial one in that there exist some fundamental differences. The Fog vision was conceived to address applications and services that do not fit well the paradigm of the Cloud. They include:  Applications that require very low and predictable latency— the Cloud frees the user from many implementation details, including the precise knowledge of where the computation or storage takes place. This freedom from choice, welcome in many circumstances becomes a liability when latency is at premium (gaming, video conferencing).  Geo-distributed applications (pipeline monitoring, sensor networks to monitor the environment).  Fast mobile applications (smart connected vehicle, connected rail).  Large-scale distributed control systems (smart grid, connected rail, smart traffic light systems).
  • 13. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 8 Chapter 4 SECURING CLOUDS WITH FOG There are various ways to use cloud services to save or store files, documents and media in remote services that can be accessed whenever user connect to the Internet. The main problem in cloud is to maintain security for users data in way that guarantees only authenticated users and no one else gain access to that data. The issue of providing security to confidential information is core security problem, that it does not provide level of assurance most people desire. There are various methods to secure remote data in cloud using standard access control and encryption methods. It is good to say that all the standard approaches used for providing security have been demonstrated to fail from time to time for a variety of reasons, including faulty implementations, buggy code, insider attacks, mis-configured services, and the creative construction of effective and sophisticated attacks not envisioned by the implementers of security procedures. Building a secure and trustworthy cloud computing environment is not enough, because attacks on data continue to happen, and when they do, and information gets lost, there is no way to get it back. There is a need to get solutions to such accidents. The basic idea is that we can limit the damage of stolen data if we decrease the value of that stolen data to the attacker. We can achieve this through a preventive decoy (disinformation) attack. We can secure Cloud services by implementing given additional security features. 4.1 Implementing Security Features 1. User Behavior Profiling: It is expected that access to a user’s information in the Cloud will exhibit a normal means of access. User profiling is a well known technique that can be applied here to model how, when, and how much a user accesses their information in the Cloud. Such ‘normal user’ behavior can be continuously checked to determine whether abnormal access to a user’s information is occurring. This method of behavior-based security is commonly used in fraud detection applications. Such profiles would naturally include volumetric information, how many documents are typically read and how often. These simple user specific features can serve to detect abnormal Cloud access based partially upon the scale and scope of data transferred.
  • 14. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 9 2. Decoy System: Decoy data, such as decoy documents, honeypots and other bogus information can be generated on demand and used for detecting unauthorized access to information and to “poison” the thief’s ex-filtrated information. Serving decoys will confuse an attacker into believing they have ex-filtrated useful information, when they have not. This technology may be integrated with user behavior profiling technology to secure a user’s data in the Cloud. Whenever abnormal and unauthorized access to a cloud service is noticed, decoy information may be returned by the Cloud and delivered in such a way that it appear completely normal and legitimate. The legitimate user, who is the owner of the information, would readily identify when decoy information is being returned by the Cloud, and hence could alter the Cloud’s responses through a variety of means, such as challenge questions, to inform the Cloud security system that it has incorrectly detected an unauthorized access. In the case where the access is correctly identified as an unauthorized access, the Cloud security system would deliver unbounded amounts of bogus information to the attacker, thus securing the user’s true data from can be implemented by given two additional security features: 1) validating whether data access is authorized when abnormal information access is detected, and 2) Confusing the attacker with bogus information that is by providing decoy documents. The decoy documents carry a keyed-Hash Message Authentication Code (HMAC), which is hidden in the header section of the document. The HMAC is computed over the file’s contents using a key unique to each user. When a decoy document is loaded into memory, we verify whether the document is a decoy document by computing a HMAC based on all the contents of that document. We compare it with HMAC embedded within the document. If the two HMACs match, the document is deemed a decoy and an alert is issued.
  • 15. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 10 Fig4.1 Decoy System 3. Combining the Two Techniques: The correlation of search behavior anomaly detection with trap-based decoy files should provide stronger evidence of malfeasance, and therefore improve a detector’s accuracy. We hypothesize that detecting abnormal search operations performed prior to an unsuspecting user opening a decoy file will corroborate the suspicion that the user is indeed impersonating another victim user. This scenario covers the threat model of illegitimate access to Cloud data. Furthermore, an accidental opening of a decoy file by a legitimate user might be recognized as an accident if the search behavior is not deemed abnormal. In other words, detecting abnormal search and decoy traps together may make a very effective masquerade detection system. Combining the two techniques improves detection accuracy.
  • 16. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 11 Fig4.2 Architecture of Fog Computing Fig4. states the actual working of the fog computing .In two ways login is done in system that are admin login and user login .When admin login to the system there are again two steps to follow: step1:Enter username step2:Enter the password . After successful login of admin he can perform all admin related tasks, but while downloading any file from fog he have to answer the security Question if he answer it correctly then only original file can be download. In other case, when admin or user answer incorrectly to the security question then decoy document (fake document) is provided to the fake user. Decoy technology work in the given manner if you have any word ,suppose “MADAM” in the document then some alphabets are replaced as M->A then the given word become “AADAA” which have no meaning. In some Case, if attacker getting to know that “M” is replaced by “A” in the given document and by applying reverse engineering he get result as “MMDMM”. In any case he can’t judge content of document.
  • 17. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 12 When user login to the system he also have to follow the same procedure as admin. Operations like upload files/documents, download files/documents, view alerts, send message, read message, broadcast any message all these can be perform by the user. ALERT this stream provide the detail knowledge of attack done on their personal file/document with details like date, time, number of times the attacker trying to hack that file/document .Best thing of fog Computing is after each successful login the user get SMS on the mobile that “login successful”. From this the user get alert when other else trying to gain access to his/her personal fog account and when attacker trying to download some files/documents then user also get SMS that contain attacker ip-address, attacker’s server name, date, time details on his/her mobile so that become easy to catch attacker by tracing all these things.
  • 18. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 13 Chapter 5 APPLICATIONS Connected car: Autonomous vehicle is the new trend taking place on the road. Tesla is working on software to add automatic steering, enabling literal "hands free" operations of the vehicle. Starting out with testing and releasing self-parking features that don't require a person behind the wheel. Within 2017 all new cars on the road will have the capability to connect to cars nearby and internet. Fog computing will be the best option for all internet connected vehicles why because fog computing gives real time interaction. Cars, access point and traffic lights will be able to interact with each other and so it makes safe for all. At some point in time, the connected car will start saving lives by reducing automobile accidents. Smart Grids: Smart grid is another application where fog computing is been used. Based on demand for energy, its obtainability and low cost, these smart devices can switch to other energies like solar and winds. As shown in Figure 5.1,The edge process the data collected by fog collectors and generate control command to the actuators. The filtered data are consumed locally and the balance to the higher tiers for visualization, real-time reports and transactional analytics. Fog supports semi-permanent storage at the highest tier and momentary storage at the lowest tier. Fig5.1 Fog computing in smart grid
  • 19. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 14 Smart Traffic lights: Fog enables traffic signals to open lanes on sensing flashing lights of the ambulance. It detects presence of pedestrian and bikers, and measures the distance and speed of the close by vehicles. As shown in Figure 5.2,Sensor lighting turns on, on indentifying movements and vice-versa. Smart lights serves as fog devices synchronize to send warning signals to the approaching vehicles. The interactions between vehicle and access points are enhanced with WiFi, 3G, road side units and smart traffic lights. Fig 5.2 Fog computing in smart traffic lights and connected vehicles Wireless Sensor and Actuator Networks: Traditional wireless sensor networks fall short in applications that go beyond sensing and tracking, but require actuators to exert physical actions like opening, closing or even carrying sensors [2]. In this scenario, actuators serving as Fog devices can control the measurement process itself, the stability and the oscillatory behaviors by creating a closed-loop system. Self Maintaining Train: Another application of fog computing is self maintaining trains. A train ball-bearing monitoring sensor will sense the changes in the temperature level and any disorder will automatically alert the train operator and make maintenance according to. Thus we can avoid major disasters.
  • 20. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 15 Smart Traffic Lights and Connected Vehicles: Video camera that senses an ambulance flashing lights can automatically change street lights to open lanes for the vehicle to pass through traffic. Smart street lights interact locally with sensors and detect presence of pedestrian and bikers, and measure the distance and speed of approaching vehicles. IoT and Cyber-physical systems (CPSs): Fog computing based systems are becoming an important class of IoT and CPSs. Based on the traditional information carriers including Internet and telecommunication network, IoT is a network that can interconnect ordinary physical objects with identified address. CPSs feature a tight combination of the system’s computational and physical elements. CPSs also coordinate the integration of computer and information centric physical and engineered systems. IoT and CPSs promise to transform our world with new relationships between computer-based control and communication systems, engineered systems and physical reality. Fog computing in this scenario is built on the concepts of embedded systems in which software programs and computers are embedded in devices for reasons other than computation alone. Examples of the devices include toys, cars, medical devices and machinery. The goal is to integrate the abstractions and precision of software and networking with the dynamics, uncertainty and noise in the physical environment. Using the emerging knowledge, principles and methods of CPSs, we will be able to develop new generations of intelligent medical devices and systems, ‘smart’ highways, buildings, factories, agricultural and robotic systems
  • 21. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 16 CONCLUSION This proposal of monitoring data access patterns by profiling user behavior to determine if and when a malicious insider illegitimately accesses someone’s documents in a Cloud service. Decoy documents stored in the Cloud alongside the user’s real data also serve as sensors to detect illegitimate access. Once unauthorized data access or exposure is suspected, and later verified, with challenge questions for instance, this inundate the malicious insider with bogus information in order to dilute the user’s real data. Such preventive attacks that rely on disinformation technology could provide unprecedented levels of security in the Cloud and in social networks.
  • 22. FOG COMPUTING Department of Computer Science & Engineering, JCE, Belagavi Page 17 REFERENCES [1] Madsen, Henrik, et al. "Reliability in the utility computing era: Towards reliable Fog computing." Systems, Signals and Image Processing (IWSSIP), 2013 20th International Conference on. IEEE, 2013. [2] Zhu, Jiang,“Improving Web Sites Performance Using Edge Servers in Fog Computing Architecture”, Service Oriented System Engineering (SOSE), IEEE. 2013. [3] Sabahi, F. “Cloud computing security threats and responses”, In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on 2011,pp. 245-249. [4] Stolfo, Salvatore J., Malek Ben Salem, and Angelos D. Keromytis. "Fog computing: Mitigating insider data theft attacks in the cloud." Security and Privacy Workshops (SPW), 2012 IEEE Symposium on. IEEE, 2012 [5] Madsen, Henrik, et al. "Reliability in the utility computing era: Towards reliable Fog computing." Systems, Signals and Image Processing (IWSSIP), 2013 20th International Conference on. IEEE, 2013 [6] C. Wei, Z. Fadlullah, N. Kato, and I. Stojmenovic, “On optimally reducing power loss in micro-grids with power storage devices,” IEEE Journal of Selected Areas in Communications, 2014 to appear. [7] Bonomi, Flavio, et al. "Fog computing and its role in the internet of things." Proceedings of the first edition of the MCC workshop on Mobile cloud computing. ACM, 2012, pp. 13- 16. [8] Claycomb, W. R., & Nicoll, A. “Insider Threats to Cloud Computing: Directions for New Research Challenges”, In Computer Software and Applications Conference (COMPSAC), IEEE 36th Annual, July, pp. 387-394, 2012 [9] Park, Y., & Stolfo, S. J. “Software decoys for insider threat”, In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, May, pp. 93-94, 2013. [10] Ivan Stojmenovic & Sheng Wen ,” The Fog Computing Paradigm: Scenarios and Security Issues” In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 1–8.