SlideShare a Scribd company logo
2
Most read
5
Most read
18
Most read
Fog Computing
--Cloud near end user
Submitted by
Ayush Chaurasia
2014021017
Table of contents
1. Introduction
2. Why fog?
3. Architecture
4. Working
5. Fog computing framework
6. Load balancing mechanism
7. Security issues
8. MITM(men in the middle attack)
9. Privacy issue
10. Future of fog computing
11. conclusion
Fog computing
Introduction
• Also known as fogging
• introduced by CISCO in 2014.
• Offers decentralised resources like
• Computing
• Networking
• storage resources.
• Extension of cloud computing at the edge of the network
Fog is nothing but cloud near
end user
Why fog ?
• Fog computing saves lots of bandwidth.
• Privacy concerns.
• Maximum use of available resources
• use of user’s resources
• less number of idle resources
• Low network traffic.
• Less network latency.
Architecture
Architecture( contd..)
Fog nodes:
They are the physical devices at the edge of the network, one of the building
block of fog environment
Uses Data link layer and Network layer to transfer packets.
Examples:
• Smart router
• Smart switches
• Set top box
• Smart meters etc.
Architecture( contd..)
 Fog data services:
 Data reduction
 Control response
 Data virtualization
 Cloud:
 Centralized resources
 Data is sent here for
 historic/predictive analysis
 Machine learning
Working
 Data and information is gathered from the end users and sensors.
 Computing is performed at the Fog nodes which are at the edge of the
network near the end user.
 Some data may sent to the cloud server for purpose of analytic and
machine learning.
Fog computing system framework
 Hierarchal framework
 Divided into four parts
 Physical resource layer
 Resource Layer of Cloud Atomization
 Service Management
 Platform Management:
Physical resource layer
Consist of
 centre of cyberspace.
 computing and storage resources of the edge node
 network resources among them.
Resource Layer of Cloud Atomization
 Core component of fog computing system
 It carries the cloud atomization on the resources of physical layer
 Atomises the physical node with high computing and storage resources
forming multi-virtual node.
 Node with the limited resource is atomised into a single virtual machine node.
Service Management
 cloud atomization management
 resources monitoring
 Load Balancing
 fault processing
 Some other functions, to achieve monitoring, Management and scheduling of
the resources of cloud atomization.
Platform Management
 Provides the interface services to users
 achieving security
 service
 management of resources
Fog computing system load balance
mechanisms
 Because of the dynamic nature of the fog computing load balancing is
required.
 Steps
 Define elements of the system
 Carry out cloud atomization process on the physical node
 Abstract physical node model into virtual machine node model.
 To achieve load balancing we perform graph portioning.
Security and privacy Issue
Main security issues are
 Authentication
 Intrusion
Other threats
 MITM (Men in the middle attack)
Authentication
 To prevent spoofing and tempering.
 Solutions
 Multicast authentication
 Diffe-Hellman key exchange
Intrusion detection
Methods for detection of Intrusion
• Signature based method
• Anomaly based methods
MITM (Men in the middle attack)
 Gateway services are compromised
 Deceptive SSID
 They can be stealthy
 Consumes very small amount of CPU
 Encryption don’t work
Privacy issue
 It deals with
 Hiding details about devices used and their time
 Allowing correct summary information.
 Privacy issue can be solved using encryption
 Batch verification technique is used instead of authentication
Future of fog computing
 New industries are coming out in the field of fog computing
 Fog-as-a-Servicea (FaaS).
 Municipality
 Telecom network provides
 Web scale company
 fog can also create business model like cloud
 Opportunities for creating new applications and services
Conclusion
 Fog computing is still in its new born state
 Advantages in several domains like smart grid IoT, IoE
 It is making smart devices smarter
 Plays crucial role in IoT.
 Complementary of cloud computing.
 Security issues still needs solution

More Related Content

PPTX
Fog Computing
PPTX
Fog computing technology
PPTX
Fog Computing
PPTX
Fog computing 000
PPTX
FOG COMPUTING- Presentation
PPTX
Fog ppt
PPTX
Fog computing
PPTX
FOG COMPUTING
Fog Computing
Fog computing technology
Fog Computing
Fog computing 000
FOG COMPUTING- Presentation
Fog ppt
Fog computing
FOG COMPUTING

What's hot (20)

PDF
Fog computing
PPTX
Seminar ppt fog comp
PPTX
fog computing ppt
PPTX
Fog computing
PPTX
Introduction to Fog Computing
PPTX
Fog computing
PPT
Fog computing
PPTX
Fog computing
PPTX
Cloud computing
PPTX
Edge and Fog computing, a use-case prespective
PPTX
cloud computing 5.pptx
PDF
Fog Computing
PPTX
Fog computing
PPTX
Cloud computing
PPTX
Fog computing ( foggy cloud)
PPTX
Fog Computing and the Internet of Things
PPTX
COMPUTER CLOTHING
PPSX
Cloud computing information management
PDF
Fog computing in IoT
PPTX
Edge computing
Fog computing
Seminar ppt fog comp
fog computing ppt
Fog computing
Introduction to Fog Computing
Fog computing
Fog computing
Fog computing
Cloud computing
Edge and Fog computing, a use-case prespective
cloud computing 5.pptx
Fog Computing
Fog computing
Cloud computing
Fog computing ( foggy cloud)
Fog Computing and the Internet of Things
COMPUTER CLOTHING
Cloud computing information management
Fog computing in IoT
Edge computing
Ad

Viewers also liked (20)

PDF
From Cloud Computing to Edge Computing
PDF
The data streaming paradigm and its use in Fog architectures
PPTX
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
PDF
Cutting through the fog of cloud
PDF
"Blending Cloud and Edge Machine Learning to Deliver Real-time Video Monitori...
PDF
Security Issues of IoT with Fog
PPTX
Azure IoT Edge, the hybrid cloud answer for IoT (Glenn Colpaert @IoTFest NMCT...
PDF
How Industry 4.0 Drives the Requirement for a Hybrid Cloud and Edge Architecture
PDF
IoT Systems: Technology, Architecture & Performance
PPTX
IBM IoT Architecture and Capabilities at the Edge and Cloud
PDF
E3: Edge and Cloud Connectivity (Predix Transform 2016)
PDF
Towards the extinction of mega data centres? To which extent should the Clou...
PDF
Fog Computing is the Future of the Industrial Internet of Things
PPTX
Edge-Fog Cloud: Scaling IoT computations on the edge
PDF
Fluid IoT Architectures
PDF
Big data caching for networking : Moving from cloud to edge
PPTX
Edge-Fog Cloud
PDF
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
PPTX
IoT Analytics from Edge to Cloud - using IBM Informix
PDF
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
From Cloud Computing to Edge Computing
The data streaming paradigm and its use in Fog architectures
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
Cutting through the fog of cloud
"Blending Cloud and Edge Machine Learning to Deliver Real-time Video Monitori...
Security Issues of IoT with Fog
Azure IoT Edge, the hybrid cloud answer for IoT (Glenn Colpaert @IoTFest NMCT...
How Industry 4.0 Drives the Requirement for a Hybrid Cloud and Edge Architecture
IoT Systems: Technology, Architecture & Performance
IBM IoT Architecture and Capabilities at the Edge and Cloud
E3: Edge and Cloud Connectivity (Predix Transform 2016)
Towards the extinction of mega data centres? To which extent should the Clou...
Fog Computing is the Future of the Industrial Internet of Things
Edge-Fog Cloud: Scaling IoT computations on the edge
Fluid IoT Architectures
Big data caching for networking : Moving from cloud to edge
Edge-Fog Cloud
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
IoT Analytics from Edge to Cloud - using IBM Informix
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Ad

Similar to Fog computing (20)

PDF
FOG COMPUTING is and excitement development
PDF
' 'FOG COMPUTING.pdf and it is useful for ucha
PPTX
Fog comuting
PPT
FG2.ppt
PPTX
PPTX
semppt.pptx
PDF
Brief Introduction to Fog computing.pdf
PDF
Fog Computing: Issues, Challenges and Future Directions
PPTX
Fog computing : The new age Technology
PDF
Computing_Paradigms_An_Overview.pdf
PDF
Security and privacy issues of fog
PDF
Security and Privacy Issues of Fog Computing: A Survey
PPTX
seminarpptfogcomp-170420185314.pptx
PPTX
fog computing is an IBM Convept of foundation of computer science.pptx
PDF
76 s201913
PDF
FOG COMPUTING, what and why a fog computing
PPTX
seminar ppt fogcomputing-170420185314 (1).pptx
PDF
fog&Edge computing
PDF
fog computing related to cyber securityf
PDF
Fog Computing
FOG COMPUTING is and excitement development
' 'FOG COMPUTING.pdf and it is useful for ucha
Fog comuting
FG2.ppt
semppt.pptx
Brief Introduction to Fog computing.pdf
Fog Computing: Issues, Challenges and Future Directions
Fog computing : The new age Technology
Computing_Paradigms_An_Overview.pdf
Security and privacy issues of fog
Security and Privacy Issues of Fog Computing: A Survey
seminarpptfogcomp-170420185314.pptx
fog computing is an IBM Convept of foundation of computer science.pptx
76 s201913
FOG COMPUTING, what and why a fog computing
seminar ppt fogcomputing-170420185314 (1).pptx
fog&Edge computing
fog computing related to cyber securityf
Fog Computing

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Empathic Computing: Creating Shared Understanding
PDF
Modernizing your data center with Dell and AMD
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
DOCX
The AUB Centre for AI in Media Proposal.docx
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
NewMind AI Monthly Chronicles - July 2025
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
NewMind AI Weekly Chronicles - August'25 Week I
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Empathic Computing: Creating Shared Understanding
Modernizing your data center with Dell and AMD
Reach Out and Touch Someone: Haptics and Empathic Computing
Advanced Soft Computing BINUS July 2025.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The AUB Centre for AI in Media Proposal.docx

Fog computing

  • 1. Fog Computing --Cloud near end user Submitted by Ayush Chaurasia 2014021017
  • 2. Table of contents 1. Introduction 2. Why fog? 3. Architecture 4. Working 5. Fog computing framework 6. Load balancing mechanism 7. Security issues 8. MITM(men in the middle attack) 9. Privacy issue 10. Future of fog computing 11. conclusion
  • 4. Introduction • Also known as fogging • introduced by CISCO in 2014. • Offers decentralised resources like • Computing • Networking • storage resources. • Extension of cloud computing at the edge of the network
  • 5. Fog is nothing but cloud near end user
  • 6. Why fog ? • Fog computing saves lots of bandwidth. • Privacy concerns. • Maximum use of available resources • use of user’s resources • less number of idle resources • Low network traffic. • Less network latency.
  • 8. Architecture( contd..) Fog nodes: They are the physical devices at the edge of the network, one of the building block of fog environment Uses Data link layer and Network layer to transfer packets. Examples: • Smart router • Smart switches • Set top box • Smart meters etc.
  • 9. Architecture( contd..)  Fog data services:  Data reduction  Control response  Data virtualization  Cloud:  Centralized resources  Data is sent here for  historic/predictive analysis  Machine learning
  • 10. Working  Data and information is gathered from the end users and sensors.  Computing is performed at the Fog nodes which are at the edge of the network near the end user.  Some data may sent to the cloud server for purpose of analytic and machine learning.
  • 11. Fog computing system framework  Hierarchal framework  Divided into four parts  Physical resource layer  Resource Layer of Cloud Atomization  Service Management  Platform Management:
  • 12. Physical resource layer Consist of  centre of cyberspace.  computing and storage resources of the edge node  network resources among them.
  • 13. Resource Layer of Cloud Atomization  Core component of fog computing system  It carries the cloud atomization on the resources of physical layer  Atomises the physical node with high computing and storage resources forming multi-virtual node.  Node with the limited resource is atomised into a single virtual machine node.
  • 14. Service Management  cloud atomization management  resources monitoring  Load Balancing  fault processing  Some other functions, to achieve monitoring, Management and scheduling of the resources of cloud atomization.
  • 15. Platform Management  Provides the interface services to users  achieving security  service  management of resources
  • 16. Fog computing system load balance mechanisms  Because of the dynamic nature of the fog computing load balancing is required.  Steps  Define elements of the system  Carry out cloud atomization process on the physical node  Abstract physical node model into virtual machine node model.  To achieve load balancing we perform graph portioning.
  • 17. Security and privacy Issue Main security issues are  Authentication  Intrusion Other threats  MITM (Men in the middle attack)
  • 18. Authentication  To prevent spoofing and tempering.  Solutions  Multicast authentication  Diffe-Hellman key exchange Intrusion detection Methods for detection of Intrusion • Signature based method • Anomaly based methods
  • 19. MITM (Men in the middle attack)  Gateway services are compromised  Deceptive SSID  They can be stealthy  Consumes very small amount of CPU  Encryption don’t work
  • 20. Privacy issue  It deals with  Hiding details about devices used and their time  Allowing correct summary information.  Privacy issue can be solved using encryption  Batch verification technique is used instead of authentication
  • 21. Future of fog computing  New industries are coming out in the field of fog computing  Fog-as-a-Servicea (FaaS).  Municipality  Telecom network provides  Web scale company  fog can also create business model like cloud  Opportunities for creating new applications and services
  • 22. Conclusion  Fog computing is still in its new born state  Advantages in several domains like smart grid IoT, IoE  It is making smart devices smarter  Plays crucial role in IoT.  Complementary of cloud computing.  Security issues still needs solution