The Fog computing is basically an architecture that use the
edge devices for the computation, local communication, storage and route over
backbone of internet. The fog computing can be used in the big data structure
and larger systems of cloud computing. The fog computing involves data plane
and control plane. The fog computing highlight immediacy to client objectives and
end-users, local resource pooling and dense geographical distribution, reduction
of latency and spine bandwidth investments to accomplish goods service
quality and mining of analytics of edge, result in better user-experience and
failure redundancy while it can be used in Assisted Living scenarios.
The Fog computing is idea of network fabric that draw out from outer edges
where data is fashioned to the storage stored of data, whether that is in the cloud
or in a customer data center (Butler, 2018).
In the cloud computing the fog is said to be another coating
of a dispersed network environment and it is also intimately connected with the
internet of things and cloud computing. The Public infrastructure as service
vendors of cloud can be thought of like a global, high-level data endpoint; the
network edge is where data from internet of things devices is shaped. On the
other hand, the fog
computing characteristics arise innovative privacy and
security challenges. The accessible privacy
and security dimensions
for the cloud computing
cannot be simply
implement to fog computing
because of the features, for example
, geo-distribution, mobility and heterogeneity of large-scale
. This report also offer
an general idea of
existing privacy and authorization concern,
mainly for fog
computing. Subsequently,
this research study also highlights
the continuing effort of research ,
open challenges, and the
study tendency in authorization and privacy
subject for the fog
computing. The fog Computing also likely to lengthen a considerable data amount storage,
communication, computing and cloud computing networking
close to end devices.
Because of the close incorporation
with the front-end aptitude allow devices, the fog computing also improve
the competence of the system ,
after improvement in performance of significant systems of cyber-physical . A significant
dissimilarity is the cloud
computing attempt to make better all of the resource in
a worldwide vision,
while fog computing systematize
and administer the cluster that is virtual (Ismail, 2018).
Fog computing terms
are worn in industry
and academia .
Although the major goals
of fog computing
and edge computing
are identical, for example to decrease
holdup and congestion of network , on
the other hand, they fluctuate
how they handle and
process the information
and where power of computing and
are intelligence positioned.
The edge computing is the major idea
of is to shove capability
of computation towards sources of data , for instance, actuators, devices and
sensors of mobile . In the
edge computing, all edge constituent perform
its part to data
process locally before
transport them to
cloud, while, fog node make
a decision to process
data from many sources
of data by using its own supply or transfer to
the cloud computing. In addition, more than a few services
as Software Service ,
Infrastructure Service , Platform Service and some
services related to cloud are not sustain in fog
computing, nevertheless, services
can become more extensive with the
fog computing (DeMuro, 2018).
Problems Statement of Fog
Computing
There is no doubt that the fog computing is highly virtual
plateform for the networking but still there are some of the privacy and
authorization issues while exchanging data.
In case of fog computing network security and authorization of the users
over the network are main issues. All of the uncertainties of the fog computing
related to security can result in user dissatisfaction and cyber issues.
Significance of Study of Fog
Computing
The present study regarding the network security and
authorization of fog computing is significant in the number of ways. The study
is an important addition to the literature on the network security and
authorization issues of the users that have to transfer data through fog
computing. Although, research has been conducted on this issue, however, the
present study has focused on the overall network computing including cloud
computing and fog computing. The study will investigate how the network
security and authorization issues can be resolve to have a good user experience
. Therefore, this study will enhance the existing literature on the relevant
topic of fog computing.
Moreover,
the present study is first of its kind to the best knowledge of the researcher
which investigates the impact of the network security and authorization on the user
experience and their data security. The study will provide the important analysis
regarding the improvement in network security and authorization of fog
computing. Therefore, these are the important implications for the study which
is being conducted.
In addition to that,
the research study will be a good and productive source of learning for the
research community. The solution of the problems and the research direction is
a good source for furthering the research. Thus, the academicians and the
practitioners both will get benefit from this research. Therefore, the present
research is quite significant on its own. The following research objectives
will be developed for the study.
Research Objectives of Fog
Computing
Some of the research objectives of this study are the
following:
To understand the reason behind the network security and
authorization issues in the fog computing.
To study the impact of the network security and
authorization on the user experience over the fog computing network.
To analyze the potential solution to overcome the fog
computing network security and authorization problems
To understand the challenges that fog computing is facing as
far as security of data and privacy is concern.
Research Questions of Fog
Computing
Some of the research objectives of this study are the
following:
What are the reasons behind the network security and authorization
issues in the fog computing.
What is the impact of the network security and authorization
on the user experience over the fog computing network?
What is the potential solution to overcome the fog computing
network security and authorization problems
What are the challenges that fog computing is facing as far
as security of data and privacy is concern.
Literature Review of Fog
Computing
According to the research conducted by MUKHERJEE, et al., (2017)
it is reviewed that on the distributed nodes’ computational power, it is
demonstrated that Fog computing relies on it for decreasing the data center’s
total pressure. When it comes to fog computing, preservation of privacy is
quite difficult which are in EUs’ vicinity as they might gather the data which
is sensitive concerning the location, smart grid, use of utilities, and
identity compared to the cloud server which is remote and fall in the stigma or
core network. Considering the scattering of fog nodes over large areas, toughness
of centralized control increases. The mere possibility of a weak edge node
might offer access to an intruder. With the entrance of intruder, chances of
stealing shared data between entities rise. Privacy leakages can also be led by
the high communication within the trio of layers which compromise the
architecture. As per the discussion, location privacy is the most important
model when it comes to privacy as the location of device can be connected to
the owner. The clients of fog delegate
its responsibilities to next-door nodes of fog
, trajectory, position and
still habits mobility
can become exposed
of a challenger. The habits
of user can be exposed from opposition by examining
fog services habits usage , for example smart grid. It revealed in readings
of smart
meters’ can reveal information concerning
time that TV
programs or empty house that
EU have a preference to
watch (MUKHERJEE, et al., 2017).
According to the research conducted by Alrawais, Alhothaily,
Hu, & Xiuzhe, (2017) it is analyzed that the fog computing is
a technology that
bridges the gap among Internet
of Things devices and
remote data centers
. It enable an extensive range
of reimbursement, that include
decreased bandwidth, enhanced
security and latency reduction ,
fog is a suitable model
for many internet
of Things services. On the other hand, fog devices
(situated at Internet edge
) clearly face a
lot of privacy and security threats. At this time,
the authors talk about
the privacy and security concern in
internet of Things background and suggest a
mechanism that employ
fog to develop
the distribution of
certificate revocation information
between internet of
Things devices for enhancement of security (Alrawais, Alhothaily, Hu, & Xiuzhe,
2017).
According to the research conducted by (Yi & Li, 2015)it is reviewed that with
the cloud computing increasing usage, there are some of the issues unsettled because
of the intrinsic cloud computing problem for example be short of of mobility maintain,
unreliable latency and consciousness of location. Fog computing, that is known
as edge computing, that deal with the troubles by offering expandable services and
resources to users at network edge, at the same time as cloud computing offering
distributed possessions in network core. In this review there is a discussion about meaning of fog computing
alike conception, ambassador state of application affairs, and identifies a
range of issues might come across implementing and designing systems of fog
computing. It is focus on some challenges and opportunities, as possible future
direction of work, in associated method that require to be measured in fog
computing context (Yi & Li, 2015).
According to the research conducted by (Stojmenovic & Wen, 2014) it is reviewed that
the fog Computing is a model that expand the Cloud computing and services to network
edge. Similar to Cloud, Fog offer data, storage, compute and services of application
to the end-users. In this article, there is an elaboration of the incentive and
rewards of Fog computing, and analyze its application in real scenarios series,
for example vehicular networks smart traffic lights, Smart Grid and networks
defined by software. There is also discussion about the Fog computing state-of-the-art
and same work underneath the same umbrella. The issues related to Security and authorizations
are reveal according to present paradigm of Fog computing. As an instance, there
is an analysis of man-in-the-middle attack, typical attack for argument of authorization
and security in Fog computing. The furtive aspects of attack are investigative by
memory consumption and CPU on Fog device, the lass of internet of Things and
CPSs. Depending on the customary information carrier as well as telecommunication
network and internet of Things is a system
that can intersect regular physical matter with identified addresses. The
feature of CPSs a stretched combination of the system’s physical and computational
fundamentals. The CPSs also organize integration of computer and information oriented
engineered and physical systems. The internet
of Things and CPSs assure to change
our world with new affairs between communication systems and control based on the
engineered systems and physical reality (Stojmenovic & Wen, 2014).
According to the research conducted by (Luan∗, Gao, Li, Xiang, We, & Sun,
2016)
it is reviewed that with particular smartphones, smart devices, becoming the daily
companions, the ever-present computing applications and mobile Internet
encompass daily lives of people. With the surge command on high-class mobile
services anywhere, how to deal with ever-present user needs and accommodate the
unstable mobile traffics growth are the main problems of next mobile networks
of generation. The Fog computing is a main solution towards objective. The Fog
computing expand the cloud computing by offering virtualized capital and occupied
services based on location to the mobile networks edge to better serve up traffics
on mobile. Consequently, the Fog computing is a good combination of mobile
applications and cloud computing. In this article, the main Fog computing features
are described with all of their architecture, concept and design objective. There
is also discussion about some issues of future research from the perspective of
networking (Luan∗, Gao, Li, Xiang, We, & Sun,
2016).
Fog computing is a said
to be a lack of a homogeneous definition. This article offers a Fog computing
view from perspective of networking with the objective to form the Fog computing
key features and recognizes its main open research and design goals issues to well-organized
system of mobile networking. In this part of article, there is an analysis of
the unfold journey of the fog computing by first recitation the Fog computing system
architecture and showcase scenarios of the exemplary function. After that fundamental
incentive following the Fog computing and the assessment with accessible
related paradigms of networking (Luan∗, Gao, Li, Xiang, We, & Sun,
2016).
According to the research conducted (Stolfo, Salem, & Keromytis, 2012) by it is reviewed
that Cloud computing guarantee to considerably modify the approach that is used
in computers to entrance and accumulate business and individual information.
With all of the paradigms of communications and computing raise new challenges
of security of data. Existing mechanisms of data protection for example
encryption have unsuccessful in data theft attacks prevention, particularly
those carry out by a cloud provider insider. In this article different approach
is used for data securing in cloud by using distasteful decoy technology. It is
also monitored that data access in cloud and perceive irregular patterns of data
access. When the unauthorized right of entry is supposed and then confirmed
using confront questions, there is disinformation attack launch by recurring
large quantity of attacker decoy information. This is also likely to protect alongside
the users real data misuse. All of the experiments carry out in a local setting
of file that provide proof about this approach might offer unparalleled data
security levels of user in a Cloud setting (Stolfo, Salem, & Keromytis, 2012).
According to the research conducted by (Yi, Hao, Qin, & Li, 2015) it is reviewed that
Fog computing is typically lend a hand with the cloud computing. As an effect
fog, end users and cloud mutually form a 3 layer model of service delivery. In
terms of characterization Fog computing also demonstrates a well-built association
towards the cloud computing. For instance, elastic possessions (storage, computation
and networking) are building blocks, demonstrating that the majority of
technologies in cloud computing can be openly functional to fog computing. on
the other hand, fog computing has more than a few unique possessions that differentiate
it from other accessible architectures of computing. The most significant is
its close up end users distance. It is very important to maintain computing supply
at the network edge to hold up latency-sensitive services and applications.
Another property is awareness of location-; fog node geo-distributed is able to
deduce its position and follow end user devices to hold up mobility (Yi, Hao, Qin, & Li, 2015).
According to the research conducted by (Dsouza, Gail-Joon,
& Taguinod, 2014)it
is reviewed that with the growing demand of user for elastic resources provisioning
attached with ever-present and data on-demand access, the cloud computing documented
as an promising technology to convene such demands of dynamic user. In adding
up, increasing mobile use devices, the Internet of Things has in recent times use
substantial concentration since the Internet of Things has bring physical
devices and associated them to Internet, that also enable each device to contribute
to data with nearby devices and virtualized real-time technologies. As a result,
the data usage exploding requires an innovative, new platform of computing that
offer vigorous real-time analytics of data and provisioning resource to the clients.
As a effect, the fog computing has newly introduced to offer storage, computation
and networking services among traditional data centers of cloud computing and end-users.
This article also propose resources of policy-based management in the fog computing, increasing
the present platform of fog computing to hold up secure interoperability and association
amongst resources requested by user in the fog computing (Dsouza, Gail-Joon, & Taguinod, 2014).
According to the research conducted by Kerr (2003), it is
reviewed that the computer hacker hack the Internet commerce company servers
for credit card numbers to duplicate and put up for sale. The companies find
out attack and for support contact the FBI. The FBI unlock an examination and focal
point its hard work on effort to outline the confirmation of attack from the sufferer
back to hacker. The strategy of government will be to go after the follow the
"electronic bread crumbs" that might left behind, for example stored
files and logs of connection, until they can identify the wrongdoer and outline
back attack. This procedure is extremely synchronized by centralized electronic
observation statutes that necessitate the management to get hold of orders in court
practically every step of system; the court orders induce the ISPs owners and some
of the servers that have records attack to reveal the information to the
government. Visualize that all of these method prove flourishing, and offer
information that point towards the hacker. At this position, the FBI obtains an
investigation authorizing enforcement of law to look for the hacker's residence
and grab his computer. The agents of FBI carry out the demand, and look for of the computer discover the credit
card numbers that were stolen inside it. The agents FBI can by doing this arrest
the hacker (Kerr, 2003).
Research Methodology of Fog
Computing
Research Design of Fog Computing
This research paper uses the qualitative and quantitative
method of research. The primary and the secondary research techniques were used
in the present research. For the primary research the Journal and peer reviewed
articles were used and for the secondary research questionnaires method is used
to get the response from the user of fog computing and some of the IT professionals. This
research study is the complete analysis of all methods to know about the user
perspective about the usage of fog computing. In this research, statistical
method is used for the selection of the sample. The questionnaire method is
used in the research to know about the perspective of people about using the fog
computing services and how secure they feel to use all of these services.
Sampling Technique and Sampling Size
of Fog Computing
The simple random sampling technique will be employed. The
simple random sampling technique is the probability sampling technique. The
probability sampling technique has more level of generalization and its results
are considered more authentic. The simple random sample will be used with the
help of the lists which will be obtained. Once, the numbering will be assigned
the subjects will be selected with the simple random tables. Therefore, this is
the most important and essential way to collect the sample. For conducting the
research the sample of 300 individuals was collected from which 200 were the
users of fog computing and 100 were the networking experts in the IT field to
know about their point of view regarding the use of fog computing (Singh, 2018).
Data Collection Procedures of Fog
Computing
The
researchers will personally administer the data. For that purpose, the prior
approval will be given by the concerned authorities. The covering letter and
the letter of approval will also be used in order to make the respondents aware
of the purpose of the data collection. Moreover, the instruction to fill the
questionnaire will also be provided in on the questionnaire. These are the
arrangements which are necessary to undertake and quite important for the sake
of the appropriate selection and collection of the data. The covering letter
will explicitly indicate that the purpose of the research is noncommercial and
it is not going to be conducted for the sake of the commercial activity (abs.gov.au, 2018).
Moreover, the participation of the respondents would be
subject to the voluntary. The researcher personally will not force them to
participate and the participants have the right to quit the survey at any stage
of the research. Therefore, this will be the procedure of the research which
will be going to be conducted in that context. No incentive will be given to
the participants and the participants would be subject to the personal decision
of the participants. Thus, these are the important considerations which will be
given priority.
Data Analysis Technique of
Fog Computing
Selection
of the appropriate statistical technique is the most important factor.
Therefore, the data analysis techniques for the present research study are
based on both the descriptive and inferential data analysis. For the sake of
the analysis of the demographic variables, the descriptive data analysis
technique will be employed. These techniques involve percentages, graphs and
central tendencies. These are quite important techniques which are essentially used
in such kind of the analysis.
However,
the inferential data analysis techniques will also be employed. These
techniques include correlation and the regression. The correlation and the
regression both will be utilized in order to assess the nature of the direction
and the impact of the one variable over other. Similarly, the regression
investigates the magnitude of the impact of the independent variable over a
dependent variable. Thus, both the correlation and the regression analysis will
be used by using SPSS software in order to investigate the impact of the
employee task accomplishment and goal achievement on the organizational
performance. The importance of both the descriptive and the inferential data
analysis is thus quite important. Both data analysis tools will be thus
employed to assess the impact of the independent variables over other.
Data Analysis of Fog Computing
From the research study it is analyzed that the Fog
computing is a main solution towards objective. The Fog computing expand the
cloud computing by offering virtualized capital and occupied services based on
location to the mobile networks edge to better serve up traffics on mobile.
When the unauthorized right of entry is supposed and then confirmed using
confront questions, there is disinformation attack launch by recurring large
quantity of attacker decoy information. The main Fog computing features are
described with all of their architecture, concept and design objective.
Depending on the customary information carrier as well as telecommunication
network and internet of Things is a system that can intersect regular physical
matter with identified addresses. Fog computing view from perspective of
networking with the objective to form the Fog computing key features and
recognizes its main open research and design goals issues to well-organized
system of mobile networking. With all of the computing and communications
paradigms raise new challenges of data security. The most significant is its
close up end users distance. It is very important to maintain computing supply
at the network edge to hold up latency-sensitive services and applications (Westbase.io, 2016).
Conclusion of Fog Computing
Summing up the discussion it can be said that the fog
computing can be used in the big data structure and larger systems of cloud
computing. The fog computing involves data plane and control plane. Fog
computing is idea of fabric network that draw out from the outer edges to design
data to the storage stored of data, whether that's in cloud or in a data center
of customer. The fog Computing also likely to lengthen a
considerable data amount
storage, communication, computing and
cloud computing networking close to
end devices. The edge
computing is the major idea of
is to force
computation capability to sources
of data , for example., actuators, sensors,
and devices of mobile. Considering the scattering of fog nodes over
large areas, toughness of centralized control increases. Fog computing, that is
also known as edge computing, that deal with the troubles by offering flexible
services and resources to the users of the network edge, at the same time as
cloud computing is related to offering distributed possessions in network core.
References of Fog Computing
abs.gov.au. (2018, August 30). DATA COLLECTION METHODS.
Retrieved from
http://www.abs.gov.au/websitedbs/D3310114.nsf/home/Basic+Survey+Design+-+Data+Collection+Methods
Alrawais, A., Alhothaily, A., Hu, C., & Xiuzhe. (2017).
Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE
Internet Computing .
Butler, B. (2018, January 17). What is fog computing?
Connecting the cloud to things. Retrieved from
https://www.networkworld.com/article/3243111/internet-of-things/what-is-fog-computing-connecting-the-cloud-to-things.html
DeMuro, J. (2018, August 13). What is fog computing?
Retrieved from https://www.techradar.com/news/what-is-fog-computing
Dsouza, C., Gail-Joon, & Taguinod, A. M. (2014).
Policy-Driven Security Management for Fog Computing:Preliminary Framework and A
Case Study. IEEE , 13-15.
Ismail, K. (2018, August 14). Edge Computing vs. Fog
Computing: What's the Difference? Retrieved from
https://www.cmswire.com/information-management/edge-computing-vs-fog-computing-whats-the-difference/
Kerr, O. S. (2003). Lifting the Fog of Internet
Surveillance: How a Suppression Remedy Would Change Computer Crime Law. Hasting
law Journal .
Luan∗, T. H., Gao, L., Li, Z., Xiang,
Y., We, G., & Sun, L. (2016). Fog Computing: Focusing on Mobile Users at
the Edge .
MUKHERJEE, M., MATAM, R., SHU, L., MAGLARAS, E., FERRAG, M.
A., CHOUDHURY, N., et al. (2017). Security and Privacy in FogComputing:
Challenges. IEEE .
Singh, S. (2018, July 26). Sampling Techniques. Retrieved
from https://towardsdatascience.com/sampling-techniques-a4e34111d808
Stojmenovic, I., & Wen, S. (2014). The Fog Computing
Paradigm: Scenarios and Security Issues. IEEE , 2, 1-8.
Stolfo, S. J., Salem, M. B., & Keromytis, A. D. (2012).
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. IEEE .
Westbase.io. (2016, May 5). Fog Computing vs Cloud
Computing: What’s the difference? Retrieved from https://www.westbase.io/fog-computing-vs-cloud-computing-whats-the-difference/
Yi, S., & Li, Q. (2015). A Survey of Fog Computing:
Concepts, Applications, and Issues.
Yi, S., Hao, Z., Qin, Z., & Li, Q. (2015). Fog
Computing: Platform and Applications. IEEE .