SlideShare une entreprise Scribd logo
1  sur  22
Jain College of Engineering
T.S Nagar, Machhe, Belagavi-590014
Seminar on
“FOG COMPUTING”
Submitted By
MAHANTESH HIREMATH
(2JI13CS024)
Under the Guidance of
PROF. VIJAYALAXMI S. NAGANUR
Department of Computer science and Engineering
2016-2017
FOG COMPUTING
CONTENTS:
 Introduction.
 Existing System.
 Proposed System.
 Securing Clouds With Fog
 Security Issues.
 Example.
 Privacy Issues.
 Conclusion.
 References.
What Is FOG Computing.
 Fog Computing is a technology that extends cloud computing and services
to the edge of the network.
 It provides data, compute, storage and application services to the users like
cloud.
 Fog computing is an emerging technology that is basically used for Internet
of Things.
Fog
Cloud
Locations
Edge
Core
Simple Three Level Hierarchy
Asimple three level hierarchy as shown in above Figure.
 In this framework, each smart thing is attached to one of Fog devices.
Fog devices could be interconnected and each of them is linked to the
Cloud.
 As Fog computing is implemented at the edge of the network, it
provides low latency, location awareness, and improves quality-of-
services (QoS) for streaming and real time applications.
EXISTING SYSTEM
 Cloud computing has provided many opportunities for enterprises by
offering their customers a range of computing services. Current “pay-as-
you-go” Cloud computing model becomes an efficient alternative to owning
and managing private data centers for customers facing Web applications
DISADVANTAGES
 Existing data protection mechanisms such as encryption was failed in
securing the data from the attackers.
 It does not verify whether the user was authorized or not.
 Cloud computing security does not focus on ways of secure the data from
unauthorized access.
PROPOSED SYSTEM
 Unlike traditional data centers, Fog
are geographically
over heterogeneous
devices
distributed
platforms,
management
interested in
spanning
domains.
innovative
multiple
Cisco is
proposals
that facilitate service mobility across
platforms, and technologies that
preserve end-user and content
security and privacy across domains.
ADVANTAGES
 Fog can be distinguished from Cloud by its proximity to end-users.
 The dense geographical distribution and its support for mobility.
 It provides low latency, location awareness, and improves quality-of-
services (QoS) and real time applications.
SECURING CLOUDS WITH FOG
User behavior profiling
• User profiling is a well-known technique that can be applied here to model
how, when, and how much a user accesses their information in the Cloud.
• Simple user specific features can serve to detect abnormal Cloud access based
partially upon the scale and scope of data transferred.
• Behaviour based security: a ‘normal user’ behaviour can be continuously
checked to determine whether abnormal access to a user’s information is
occurring.
Ex: Fraud detection applications.
Decoy system
 Decoy data, such as decoy documents, honey
pots and other bogus information can be
generated on demand and used for detecting
unauthorized access to information and to
poison the thief’s ex-filtrated information.
 Serving decoys will confuse an attacker into
believing they have ex-filtrated useful
information, when they have actually not.
Fog computing architecture
ADMIN
ADMIN
OPERATIONS
ANSWER TO
QUESTIONS
LOGIN
USER
LOGIN
SIGN UP
ANSWER TO
QUESTIONS
ENTER
USERNAME
ENTER
PASSWORD
VIEW MY
FILES
SEND
MAIL
DOWNLOAD
FILES
UPLOAD
FILES
ORIGINAL
DOCUMENT
DECOY
DOCUMENT
FOG COMPUTING
APPLICATIONS OF FOG
• Connected cars: Fog computing is ideal for Connected Vehicles (CV)
because real-time interactions will make communications between cars,
access points and traffic lights as safe and efficient as possible
• Smart grids: Fog computing allows fast, machine-to-machine (M2M)
handshakes and human to machine interactions (HMI), which would work
in cooperation with the cloud
Fig. Fog computing in smart grid
SECURITY ISSUES
The main security issues are authentication at different
levels of gateways as well as (in case of smart grids) at the smart meters
installed in the consumer’s home. Each smart meter and smart appliance
has an IP address. A malicious user can either tamper with its own smart
meter, report false readings, or spoof IP addresses.
EXAMPLE : MAN-IN –MIDDLE-ATTACK
In this subsection, we take man- in-the-middle attack as
an example to expose the security problems in Fog computing. In this
attack, gateways serving as Fog devices may be compromised or replaced by
fake ones .
PRIVACY ISSUES
In smart grids, privacy issues deal with hiding details, such as what
appliance was used at what time, while allowing correct summary
information for accurate charging.
CONCLUSION
With the increase of data theft attacks the security of user data is becoming
a serious issue for cloud service providers for which Fog Computing is a
paradigm which helps in monitoring the behavior of the user and providing
security to the user’s data. By using decoy technique in Fog can minimize
insider attacks in cloud. Fog provides unprecedented levels of security in the
Cloud and in social networks. The usage of fog computing can accelerate
the innovation process in ways that has never been seen before.
REFERENCES
1F. Bonomi, “Connected vehicles, the internet of things, and fog com- puting,”
in The Eighth ACM International Workshop on Vehicular Inter- Networking
(VANET), Las Vegas, USA, 2011.
2F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role
in the internet of things,” in Proceedings of the First Edition of the MCC
Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16.
Thank You

Contenu connexe

Similaire à seminarpptfogcomp-170420185314.pptx

Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fogRezgar Mohammad
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computingeSAT Publishing House
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingShivangi Bali
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age TechnologyPrankit Mishra
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 

Similaire à seminarpptfogcomp-170420185314.pptx (20)

Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
76 s201913
76 s20191376 s201913
76 s201913
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computing
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Fog security
Fog securityFog security
Fog security
 

Plus de PrasannaKumarpanda2

neuralinterfacing-130331081952-phpapp01.pdf
neuralinterfacing-130331081952-phpapp01.pdfneuralinterfacing-130331081952-phpapp01.pdf
neuralinterfacing-130331081952-phpapp01.pdfPrasannaKumarpanda2
 
sky-xpranav-140418121657-phpapp01.pptx
sky-xpranav-140418121657-phpapp01.pptxsky-xpranav-140418121657-phpapp01.pptx
sky-xpranav-140418121657-phpapp01.pptxPrasannaKumarpanda2
 
cyborgs-150208232058-conversion-gate01.pdf
cyborgs-150208232058-conversion-gate01.pdfcyborgs-150208232058-conversion-gate01.pdf
cyborgs-150208232058-conversion-gate01.pdfPrasannaKumarpanda2
 
cyberforensicsv2-191113184409.pptx
cyberforensicsv2-191113184409.pptxcyberforensicsv2-191113184409.pptx
cyberforensicsv2-191113184409.pptxPrasannaKumarpanda2
 
Future Challenges in Computer Science.pptx
Future Challenges in Computer Science.pptxFuture Challenges in Computer Science.pptx
Future Challenges in Computer Science.pptxPrasannaKumarpanda2
 
facebookthrift-151001153400-lva1-app6891.pptx
facebookthrift-151001153400-lva1-app6891.pptxfacebookthrift-151001153400-lva1-app6891.pptx
facebookthrift-151001153400-lva1-app6891.pptxPrasannaKumarpanda2
 
PowerBIReportServer_duryan_20170919.pptx
PowerBIReportServer_duryan_20170919.pptxPowerBIReportServer_duryan_20170919.pptx
PowerBIReportServer_duryan_20170919.pptxPrasannaKumarpanda2
 
3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdfPrasannaKumarpanda2
 
Future Challenges in Computer Science.pptx
Future Challenges in Computer Science.pptxFuture Challenges in Computer Science.pptx
Future Challenges in Computer Science.pptxPrasannaKumarpanda2
 

Plus de PrasannaKumarpanda2 (13)

neuralinterfacing-130331081952-phpapp01.pdf
neuralinterfacing-130331081952-phpapp01.pdfneuralinterfacing-130331081952-phpapp01.pdf
neuralinterfacing-130331081952-phpapp01.pdf
 
Blue Eyes Technology RAMA.pptx
Blue Eyes Technology RAMA.pptxBlue Eyes Technology RAMA.pptx
Blue Eyes Technology RAMA.pptx
 
sky-xpranav-140418121657-phpapp01.pptx
sky-xpranav-140418121657-phpapp01.pptxsky-xpranav-140418121657-phpapp01.pptx
sky-xpranav-140418121657-phpapp01.pptx
 
nikhilvyas-130904132740-.pptx
nikhilvyas-130904132740-.pptxnikhilvyas-130904132740-.pptx
nikhilvyas-130904132740-.pptx
 
cyborgs-150208232058-conversion-gate01.pdf
cyborgs-150208232058-conversion-gate01.pdfcyborgs-150208232058-conversion-gate01.pdf
cyborgs-150208232058-conversion-gate01.pdf
 
nikhilvyas-130904132740-.pdf
nikhilvyas-130904132740-.pdfnikhilvyas-130904132740-.pdf
nikhilvyas-130904132740-.pdf
 
cyberforensicsv2-191113184409.pptx
cyberforensicsv2-191113184409.pptxcyberforensicsv2-191113184409.pptx
cyberforensicsv2-191113184409.pptx
 
Future Challenges in Computer Science.pptx
Future Challenges in Computer Science.pptxFuture Challenges in Computer Science.pptx
Future Challenges in Computer Science.pptx
 
facebookthrift-151001153400-lva1-app6891.pptx
facebookthrift-151001153400-lva1-app6891.pptxfacebookthrift-151001153400-lva1-app6891.pptx
facebookthrift-151001153400-lva1-app6891.pptx
 
TCS.pptx
TCS.pptxTCS.pptx
TCS.pptx
 
PowerBIReportServer_duryan_20170919.pptx
PowerBIReportServer_duryan_20170919.pptxPowerBIReportServer_duryan_20170919.pptx
PowerBIReportServer_duryan_20170919.pptx
 
3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf
 
Future Challenges in Computer Science.pptx
Future Challenges in Computer Science.pptxFuture Challenges in Computer Science.pptx
Future Challenges in Computer Science.pptx
 

Dernier

Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024CollectiveMining1
 
Editing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxxEditing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxxMollyBrown86
 
✂️ 👅 Independent Goregaon Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Goregaon Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Goregaon Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Goregaon Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024CollectiveMining1
 
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceanilsa9823
 
B2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxcccccccccccccccB2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxcccccccccccccccMollyBrown86
 
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our EscortsVIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
Diligence Checklist for Early Stage Startups
Diligence Checklist for Early Stage StartupsDiligence Checklist for Early Stage Startups
Diligence Checklist for Early Stage StartupsTILDEN
 
slideshare Call girls Noida Escorts 9999965857 henakhan
slideshare Call girls Noida Escorts 9999965857 henakhanslideshare Call girls Noida Escorts 9999965857 henakhan
slideshare Call girls Noida Escorts 9999965857 henakhanhanshkumar9870
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024CollectiveMining1
 
Enjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...aditipandeya
 
Q3 FY24 Earnings Conference Call Presentation
Q3 FY24 Earnings Conference Call PresentationQ3 FY24 Earnings Conference Call Presentation
Q3 FY24 Earnings Conference Call PresentationSysco_Investors
 
Nicola Mining Inc. Corporate Presentation May 2024
Nicola Mining Inc. Corporate Presentation May 2024Nicola Mining Inc. Corporate Presentation May 2024
Nicola Mining Inc. Corporate Presentation May 2024nicola_mining
 

Dernier (20)

Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024
 
Editing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxxEditing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxx
 
✂️ 👅 Independent Goregaon Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Goregaon Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Goregaon Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Goregaon Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Girls 🫤 East Of Kailash ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ...
Call Girls 🫤 East Of Kailash ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ...Call Girls 🫤 East Of Kailash ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ...
Call Girls 🫤 East Of Kailash ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ...
 
Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024
 
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
 
B2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxcccccccccccccccB2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxccccccccccccccc
 
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our EscortsVIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
 
Diligence Checklist for Early Stage Startups
Diligence Checklist for Early Stage StartupsDiligence Checklist for Early Stage Startups
Diligence Checklist for Early Stage Startups
 
slideshare Call girls Noida Escorts 9999965857 henakhan
slideshare Call girls Noida Escorts 9999965857 henakhanslideshare Call girls Noida Escorts 9999965857 henakhan
slideshare Call girls Noida Escorts 9999965857 henakhan
 
(‿ˠ‿) Independent Call Girls Laxmi Nagar 👉 9999965857 👈 Delhi : 9999 Cash Pa...
(‿ˠ‿) Independent Call Girls Laxmi Nagar 👉 9999965857 👈 Delhi  : 9999 Cash Pa...(‿ˠ‿) Independent Call Girls Laxmi Nagar 👉 9999965857 👈 Delhi  : 9999 Cash Pa...
(‿ˠ‿) Independent Call Girls Laxmi Nagar 👉 9999965857 👈 Delhi : 9999 Cash Pa...
 
Vip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Vasant Kunj ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
@9999965857 🫦 Sexy Desi Call Girls Karol Bagh 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Karol Bagh 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Karol Bagh 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Karol Bagh 💓 High Profile Escorts Delhi 🫶
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024
 
Enjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort Service
 
(👉゚9999965857 ゚)👉 VIP Call Girls Friends Colony 👉 Delhi 👈 : 9999 Cash Payment...
(👉゚9999965857 ゚)👉 VIP Call Girls Friends Colony 👉 Delhi 👈 : 9999 Cash Payment...(👉゚9999965857 ゚)👉 VIP Call Girls Friends Colony 👉 Delhi 👈 : 9999 Cash Payment...
(👉゚9999965857 ゚)👉 VIP Call Girls Friends Colony 👉 Delhi 👈 : 9999 Cash Payment...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Shamshabad high-profile Call ...
 
Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
 
Q3 FY24 Earnings Conference Call Presentation
Q3 FY24 Earnings Conference Call PresentationQ3 FY24 Earnings Conference Call Presentation
Q3 FY24 Earnings Conference Call Presentation
 
Nicola Mining Inc. Corporate Presentation May 2024
Nicola Mining Inc. Corporate Presentation May 2024Nicola Mining Inc. Corporate Presentation May 2024
Nicola Mining Inc. Corporate Presentation May 2024
 

seminarpptfogcomp-170420185314.pptx

  • 1. Jain College of Engineering T.S Nagar, Machhe, Belagavi-590014 Seminar on “FOG COMPUTING” Submitted By MAHANTESH HIREMATH (2JI13CS024) Under the Guidance of PROF. VIJAYALAXMI S. NAGANUR Department of Computer science and Engineering 2016-2017
  • 3. CONTENTS:  Introduction.  Existing System.  Proposed System.  Securing Clouds With Fog  Security Issues.  Example.  Privacy Issues.  Conclusion.  References.
  • 4. What Is FOG Computing.  Fog Computing is a technology that extends cloud computing and services to the edge of the network.  It provides data, compute, storage and application services to the users like cloud.  Fog computing is an emerging technology that is basically used for Internet of Things.
  • 6. Asimple three level hierarchy as shown in above Figure.  In this framework, each smart thing is attached to one of Fog devices. Fog devices could be interconnected and each of them is linked to the Cloud.  As Fog computing is implemented at the edge of the network, it provides low latency, location awareness, and improves quality-of- services (QoS) for streaming and real time applications.
  • 7. EXISTING SYSTEM  Cloud computing has provided many opportunities for enterprises by offering their customers a range of computing services. Current “pay-as- you-go” Cloud computing model becomes an efficient alternative to owning and managing private data centers for customers facing Web applications
  • 8. DISADVANTAGES  Existing data protection mechanisms such as encryption was failed in securing the data from the attackers.  It does not verify whether the user was authorized or not.  Cloud computing security does not focus on ways of secure the data from unauthorized access.
  • 9. PROPOSED SYSTEM  Unlike traditional data centers, Fog are geographically over heterogeneous devices distributed platforms, management interested in spanning domains. innovative multiple Cisco is proposals that facilitate service mobility across platforms, and technologies that preserve end-user and content security and privacy across domains.
  • 10. ADVANTAGES  Fog can be distinguished from Cloud by its proximity to end-users.  The dense geographical distribution and its support for mobility.  It provides low latency, location awareness, and improves quality-of- services (QoS) and real time applications.
  • 12. User behavior profiling • User profiling is a well-known technique that can be applied here to model how, when, and how much a user accesses their information in the Cloud. • Simple user specific features can serve to detect abnormal Cloud access based partially upon the scale and scope of data transferred. • Behaviour based security: a ‘normal user’ behaviour can be continuously checked to determine whether abnormal access to a user’s information is occurring. Ex: Fraud detection applications.
  • 13. Decoy system  Decoy data, such as decoy documents, honey pots and other bogus information can be generated on demand and used for detecting unauthorized access to information and to poison the thief’s ex-filtrated information.  Serving decoys will confuse an attacker into believing they have ex-filtrated useful information, when they have actually not.
  • 14. Fog computing architecture ADMIN ADMIN OPERATIONS ANSWER TO QUESTIONS LOGIN USER LOGIN SIGN UP ANSWER TO QUESTIONS ENTER USERNAME ENTER PASSWORD VIEW MY FILES SEND MAIL DOWNLOAD FILES UPLOAD FILES ORIGINAL DOCUMENT DECOY DOCUMENT FOG COMPUTING
  • 15. APPLICATIONS OF FOG • Connected cars: Fog computing is ideal for Connected Vehicles (CV) because real-time interactions will make communications between cars, access points and traffic lights as safe and efficient as possible
  • 16. • Smart grids: Fog computing allows fast, machine-to-machine (M2M) handshakes and human to machine interactions (HMI), which would work in cooperation with the cloud Fig. Fog computing in smart grid
  • 17. SECURITY ISSUES The main security issues are authentication at different levels of gateways as well as (in case of smart grids) at the smart meters installed in the consumer’s home. Each smart meter and smart appliance has an IP address. A malicious user can either tamper with its own smart meter, report false readings, or spoof IP addresses.
  • 18. EXAMPLE : MAN-IN –MIDDLE-ATTACK In this subsection, we take man- in-the-middle attack as an example to expose the security problems in Fog computing. In this attack, gateways serving as Fog devices may be compromised or replaced by fake ones .
  • 19. PRIVACY ISSUES In smart grids, privacy issues deal with hiding details, such as what appliance was used at what time, while allowing correct summary information for accurate charging.
  • 20. CONCLUSION With the increase of data theft attacks the security of user data is becoming a serious issue for cloud service providers for which Fog Computing is a paradigm which helps in monitoring the behavior of the user and providing security to the user’s data. By using decoy technique in Fog can minimize insider attacks in cloud. Fog provides unprecedented levels of security in the Cloud and in social networks. The usage of fog computing can accelerate the innovation process in ways that has never been seen before.
  • 21. REFERENCES 1F. Bonomi, “Connected vehicles, the internet of things, and fog com- puting,” in The Eighth ACM International Workshop on Vehicular Inter- Networking (VANET), Las Vegas, USA, 2011. 2F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16.