Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Introduction of Fog Computing

Category: Computer Sciences Paper Type: Report Writing Reference: APA Words: 4600

The Fog computing is basically an architecture that use the edge devices for the computation, local communication, storage and route over backbone of internet. The fog computing can be used in the big data structure and larger systems of cloud computing. The fog computing involves data plane and control plane. The fog computing highlight immediacy to client objectives and end-users, local resource pooling and dense geographical distribution, reduction of latency and spine bandwidth investments to accomplish goods service  quality and mining of analytics of edge, result in better user-experience and failure redundancy while it can be used in Assisted Living scenarios. The Fog computing is idea of network fabric that draw out from outer edges where data is fashioned to the storage stored of data, whether that is in the cloud or in a customer data center  (Butler, 2018).

In the cloud computing the fog is said to be another coating of a dispersed network environment and it is also intimately connected with the internet of things and cloud computing. The Public infrastructure as service vendors of cloud can be thought of like a global, high-level data endpoint; the network edge is where data from internet of things devices is shaped. On the other hand,  the  fog  computing  characteristics  arise  innovative  privacy and  security  challenges.  The  accessible  privacy  and  security  dimensions  for  the cloud  computing  cannot  be  simply  implement to  fog  computing  because of the  features,  for example  ,  geo-distribution, mobility and  heterogeneity of  large-scale  .  This report also  offer  an  general idea  of  existing  privacy  and  authorization  concern,  mainly  for  fog  computing. Subsequently,  this  research study also  highlights  the continuing  effort of research  ,  open  challenges,  and  the study  tendency  in  authorization  and  privacy subject  for  the fog  computing. The fog  Computing  also likely to lengthen  a  considerable  data  amount  storage,  communication,  computing and  cloud computing  networking  close to  end  devices.  Because of the close  incorporation with  the front-end  aptitude allow devices,  the fog computing  also improve  the  competence of the system  ,  after  improvement in performance  of significant  systems of cyber-physical  .  A  significant  dissimilarity  is  the cloud  computing attempt  to  make better all of the resource  in  a  worldwide  vision,  while  fog computing  systematize  and  administer  the cluster that is virtual   (Ismail, 2018).

Fog  computing  terms  are  worn  in  industry and  academia  .  Although  the  major goals  of  fog  computing  and  edge  computing  are  identical, for example to  decrease  holdup  and  congestion of network  ,  on the other hand,  they  fluctuate  how  they  handle and  process  the  information  and  where  power of computing  and  are  intelligence  positioned.  The  edge  computing is the major  idea  of  is  to  shove  capability  of computation  towards  sources of data  ,   for instance, actuators,  devices and  sensors  of mobile .  In  the edge  computing, all  edge  constituent  perform  its  part  to  data process  locally  before  transport  them  to  cloud,  while, fog  node  make a decision  to  process  data  from  many sources  of data by using  its  own  supply  or  transfer  to  the  cloud computing. In addition,  more than a few  services  as  Software Service , Infrastructure  Service , Platform Service  and  some services related to cloud  are  not  sustain  in  fog computing,  nevertheless,  services  can  become more extensive  with  the fog computing (DeMuro, 2018).

Problems Statement of Fog Computing

There is no doubt that the fog computing is highly virtual plateform for the networking but still there are some of the privacy and authorization issues while exchanging data.  In case of fog computing network security and authorization of the users over the network are main issues. All of the uncertainties of the fog computing related to security can result in user dissatisfaction and cyber issues.

Significance of Study of Fog Computing

The present study regarding the network security and authorization of fog computing is significant in the number of ways. The study is an important addition to the literature on the network security and authorization issues of the users that have to transfer data through fog computing. Although, research has been conducted on this issue, however, the present study has focused on the overall network computing including cloud computing and fog computing. The study will investigate how the network security and authorization issues can be resolve to have a good user experience . Therefore, this study will enhance the existing literature on the relevant topic of fog computing.

Moreover, the present study is first of its kind to the best knowledge of the researcher which investigates the impact of the network security and authorization on the user experience and their data security. The study will provide the important analysis regarding the improvement in network security and authorization of fog computing. Therefore, these are the important implications for the study which is being conducted.

 In addition to that, the research study will be a good and productive source of learning for the research community. The solution of the problems and the research direction is a good source for furthering the research. Thus, the academicians and the practitioners both will get benefit from this research. Therefore, the present research is quite significant on its own. The following research objectives will be developed for the study.

Research Objectives of Fog Computing

Some of the research objectives of this study are the following:

To understand the reason behind the network security and authorization issues in the fog computing.

To study the impact of the network security and authorization on the user experience over the fog computing network.

To analyze the potential solution to overcome the fog computing network security and authorization problems

To understand the challenges that fog computing is facing as far as security of data and privacy is concern.

Research Questions of Fog Computing

Some of the research objectives of this study are the following:

What are the reasons behind the network security and authorization issues in the fog computing.

What is the impact of the network security and authorization on the user experience over the fog computing network?

What is the potential solution to overcome the fog computing network security and authorization problems

What are the challenges that fog computing is facing as far as security of data and privacy is concern.

Literature Review of Fog Computing

According to the research conducted by MUKHERJEE, et al., (2017) it is reviewed that on the distributed nodes’ computational power, it is demonstrated that Fog computing relies on it for decreasing the data center’s total pressure. When it comes to fog computing, preservation of privacy is quite difficult which are in EUs’ vicinity as they might gather the data which is sensitive concerning the location, smart grid, use of utilities, and identity compared to the cloud server which is remote and fall in the stigma or core network. Considering the scattering of fog nodes over large areas, toughness of centralized control increases. The mere possibility of a weak edge node might offer access to an intruder. With the entrance of intruder, chances of stealing shared data between entities rise. Privacy leakages can also be led by the high communication within the trio of layers which compromise the architecture. As per the discussion, location privacy is the most important model when it comes to privacy as the location of device can be connected to the owner. The clients of  fog  delegate  its  responsibilities  to  next-door  nodes of fog  ,  trajectory,  position and  still  habits  mobility  can  become  exposed  of  a challenger.  The habits  of user  can  be  exposed  from opposition by  examining  fog  services habits  usage  ,  for example smart grid.  It  revealed  in  readings of  smart  meters’  can  reveal information  concerning  time  that  TV  programs  or  empty  house  that  EU  have a preference  to  watch (MUKHERJEE, et al., 2017).

According to the research conducted by Alrawais, Alhothaily, Hu, & Xiuzhe, (2017) it is analyzed that the fog  computing is  a  technology  that  bridges  the  gap  among  Internet  of  Things  devices and  remote  data  centers  .  It enable  an  extensive  range  of  reimbursement,  that include  decreased  bandwidth,  enhanced  security  and  latency reduction  ,  fog  is  a  suitable  model  for  many  internet  of  Things services.  On the other hand,   fog  devices  (situated  at  Internet edge  )  clearly  face  a lot of  privacy  and  security   threats.  At this time,  the  authors  talk about  the  privacy  and  security  concern in  internet  of  Things background  and  suggest  a  mechanism  that  employ  fog  to  develop  the  distribution  of  certificate  revocation  information  between  internet  of  Things devices  for  enhancement of security   (Alrawais, Alhothaily, Hu, & Xiuzhe, 2017).

According to the research conducted by (Yi & Li, 2015)it is reviewed that with the cloud computing increasing usage, there are some of the issues unsettled because of the intrinsic cloud computing problem for example be short of of mobility maintain, unreliable latency and consciousness of location. Fog computing, that is known as edge computing, that deal with the troubles by offering expandable services and resources to users at network edge, at the same time as cloud computing offering distributed possessions in network core. In this review there is a  discussion about meaning of fog computing alike conception, ambassador state of application affairs, and identifies a range of issues might come across implementing and designing systems of fog computing. It is focus on some challenges and opportunities, as possible future direction of work, in associated method that require to be measured in fog computing context  (Yi & Li, 2015).

According to the research conducted by (Stojmenovic & Wen, 2014) it is reviewed that the fog Computing is a model that expand the Cloud computing and services to network edge. Similar to Cloud, Fog offer data, storage, compute and services of application to the end-users. In this article, there is an elaboration of the incentive and rewards of Fog computing, and analyze its application in real scenarios series, for example vehicular networks smart traffic lights, Smart Grid and networks defined by software. There is also discussion about the Fog computing state-of-the-art and same work underneath the same umbrella. The issues related to Security and authorizations are reveal according to present paradigm of Fog computing. As an instance, there is an analysis of man-in-the-middle attack, typical attack for argument of authorization and security in Fog computing. The furtive aspects of attack are investigative by memory consumption and CPU on Fog device, the lass of internet of Things and CPSs. Depending on the customary information carrier as well as telecommunication network and internet of  Things is a system that can intersect regular physical matter with identified addresses. The feature of CPSs a stretched combination of the system’s physical and computational fundamentals. The CPSs also organize integration of computer and information oriented engineered and physical systems. The internet  of  Things and CPSs assure to change our world with new affairs between communication systems and control based on the engineered systems and physical reality  (Stojmenovic & Wen, 2014).

According to the research conducted by (Luan, Gao, Li, Xiang, We, & Sun, 2016) it is reviewed that with particular smartphones, smart devices, becoming the daily companions, the ever-present computing applications and mobile Internet encompass daily lives of people. With the surge command on high-class mobile services anywhere, how to deal with ever-present user needs and accommodate the unstable mobile traffics growth are the main problems of next mobile networks of generation. The Fog computing is a main solution towards objective. The Fog computing expand the cloud computing by offering virtualized capital and occupied services based on location to the mobile networks edge to better serve up traffics on mobile. Consequently, the Fog computing is a good combination of mobile applications and cloud computing. In this article, the main Fog computing features are described with all of their architecture, concept and design objective. There is also discussion about some issues of future research from the perspective of networking  (Luan, Gao, Li, Xiang, We, & Sun, 2016).

Fog computing is a said to be a lack of a homogeneous definition. This article offers a Fog computing view from perspective of networking with the objective to form the Fog computing key features and recognizes its main open research and design goals issues to well-organized system of mobile networking. In this part of article, there is an analysis of the unfold journey of the fog computing by first recitation the Fog computing system architecture and showcase scenarios of the exemplary function. After that fundamental incentive following the Fog computing and the assessment with accessible related paradigms of networking  (Luan, Gao, Li, Xiang, We, & Sun, 2016).

According to the research conducted (Stolfo, Salem, & Keromytis, 2012) by it is reviewed that Cloud computing guarantee to considerably modify the approach that is used in computers to entrance and accumulate business and individual information. With all of the paradigms of communications and computing raise new challenges of security of data. Existing mechanisms of data protection for example encryption have unsuccessful in data theft attacks prevention, particularly those carry out by a cloud provider insider. In this article different approach is used for data securing in cloud by using distasteful decoy technology. It is also monitored that data access in cloud and perceive irregular patterns of data access. When the unauthorized right of entry is supposed and then confirmed using confront questions, there is disinformation attack launch by recurring large quantity of attacker decoy information. This is also likely to protect alongside the users real data misuse. All of the experiments carry out in a local setting of file that provide proof about this approach might offer unparalleled data security levels of user in a Cloud setting (Stolfo, Salem, & Keromytis, 2012).

According to the research conducted by (Yi, Hao, Qin, & Li, 2015) it is reviewed that Fog computing is typically lend a hand with the cloud computing. As an effect fog, end users and cloud mutually form a 3 layer model of service delivery. In terms of characterization Fog computing also demonstrates a well-built association towards the cloud computing. For instance, elastic possessions (storage, computation and networking) are building blocks, demonstrating that the majority of technologies in cloud computing can be openly functional to fog computing. on the other hand, fog computing has more than a few unique possessions that differentiate it from other accessible architectures of computing. The most significant is its close up end users distance. It is very important to maintain computing supply at the network edge to hold up latency-sensitive services and applications. Another property is awareness of location-; fog node geo-distributed is able to deduce its position and follow end user devices to hold up mobility (Yi, Hao, Qin, & Li, 2015).

According to the research conducted by (Dsouza, Gail-Joon, & Taguinod, 2014)it is reviewed that with the growing demand of user for elastic resources provisioning attached with ever-present and data on-demand access, the cloud computing documented as an promising technology to convene such demands of dynamic user. In adding up, increasing mobile use devices, the Internet of Things has in recent times use substantial concentration since the Internet of Things has bring physical devices and associated them to Internet, that also enable each device to contribute to data with nearby devices and virtualized real-time technologies. As a result, the data usage exploding requires an innovative, new platform of computing that offer vigorous real-time analytics of data and provisioning resource to the clients. As a effect, the fog computing has newly introduced to offer storage, computation and networking services among traditional data centers of cloud computing and end-users. This article also propose resources of  policy-based management in the fog computing, increasing the present platform of fog computing to hold up secure interoperability and association amongst resources requested by user in the fog computing (Dsouza, Gail-Joon, & Taguinod, 2014).

According to the research conducted by Kerr (2003), it is reviewed that the computer hacker hack the Internet commerce company servers for credit card numbers to duplicate and put up for sale. The companies find out attack and for support contact the FBI. The FBI unlock an examination and focal point its hard work on effort to outline the confirmation of attack from the sufferer back to hacker. The strategy of government will be to go after the follow the "electronic bread crumbs" that might left behind, for example stored files and logs of connection, until they can identify the wrongdoer and outline back attack. This procedure is extremely synchronized by centralized electronic observation statutes that necessitate the management to get hold of orders in court practically every step of system; the court orders induce the ISPs owners and some of the servers that have records attack to reveal the information to the government. Visualize that all of these method prove flourishing, and offer information that point towards the hacker. At this position, the FBI obtains an investigation authorizing enforcement of law to look for the hacker's residence and grab his computer. The agents of FBI carry out the demand, and  look for of the computer discover the credit card numbers that were stolen inside it. The agents FBI can by doing this arrest the hacker (Kerr, 2003).

Research Methodology of Fog Computing

Research Design of Fog Computing

This research paper uses the qualitative and quantitative method of research. The primary and the secondary research techniques were used in the present research. For the primary research the Journal and peer reviewed articles were used and for the secondary research questionnaires method is used to get the response from the user of fog computing  and some of the IT professionals. This research study is the complete analysis of all methods to know about the user perspective about the usage of fog computing. In this research, statistical method is used for the selection of the sample. The questionnaire method is used in the research to know about the perspective of people about using the fog computing services and how secure they feel to use all of these services.

Sampling Technique and Sampling Size of Fog Computing

The simple random sampling technique will be employed. The simple random sampling technique is the probability sampling technique. The probability sampling technique has more level of generalization and its results are considered more authentic. The simple random sample will be used with the help of the lists which will be obtained. Once, the numbering will be assigned the subjects will be selected with the simple random tables. Therefore, this is the most important and essential way to collect the sample. For conducting the research the sample of 300 individuals was collected from which 200 were the users of fog computing and 100 were the networking experts in the IT field to know about their point of view regarding the use of fog computing (Singh, 2018).

Data Collection Procedures of Fog Computing

The researchers will personally administer the data. For that purpose, the prior approval will be given by the concerned authorities. The covering letter and the letter of approval will also be used in order to make the respondents aware of the purpose of the data collection. Moreover, the instruction to fill the questionnaire will also be provided in on the questionnaire. These are the arrangements which are necessary to undertake and quite important for the sake of the appropriate selection and collection of the data. The covering letter will explicitly indicate that the purpose of the research is noncommercial and it is not going to be conducted for the sake of the commercial activity (abs.gov.au, 2018).

Moreover, the participation of the respondents would be subject to the voluntary. The researcher personally will not force them to participate and the participants have the right to quit the survey at any stage of the research. Therefore, this will be the procedure of the research which will be going to be conducted in that context. No incentive will be given to the participants and the participants would be subject to the personal decision of the participants. Thus, these are the important considerations which will be given priority.

Data Analysis Technique of Fog Computing

Selection of the appropriate statistical technique is the most important factor. Therefore, the data analysis techniques for the present research study are based on both the descriptive and inferential data analysis. For the sake of the analysis of the demographic variables, the descriptive data analysis technique will be employed. These techniques involve percentages, graphs and central tendencies. These are quite important techniques which are essentially used in such kind of the analysis.

However, the inferential data analysis techniques will also be employed. These techniques include correlation and the regression. The correlation and the regression both will be utilized in order to assess the nature of the direction and the impact of the one variable over other. Similarly, the regression investigates the magnitude of the impact of the independent variable over a dependent variable. Thus, both the correlation and the regression analysis will be used by using SPSS software in order to investigate the impact of the employee task accomplishment and goal achievement on the organizational performance. The importance of both the descriptive and the inferential data analysis is thus quite important. Both data analysis tools will be thus employed to assess the impact of the independent variables over other.

Data Analysis of Fog Computing

From the research study it is analyzed that the Fog computing is a main solution towards objective. The Fog computing expand the cloud computing by offering virtualized capital and occupied services based on location to the mobile networks edge to better serve up traffics on mobile. When the unauthorized right of entry is supposed and then confirmed using confront questions, there is disinformation attack launch by recurring large quantity of attacker decoy information. The main Fog computing features are described with all of their architecture, concept and design objective. Depending on the customary information carrier as well as telecommunication network and internet of Things is a system that can intersect regular physical matter with identified addresses. Fog computing view from perspective of networking with the objective to form the Fog computing key features and recognizes its main open research and design goals issues to well-organized system of mobile networking. With all of the computing and communications paradigms raise new challenges of data security. The most significant is its close up end users distance. It is very important to maintain computing supply at the network edge to hold up latency-sensitive services and applications (Westbase.io, 2016).

Conclusion of Fog Computing

Summing up the discussion it can be said that the fog computing can be used in the big data structure and larger systems of cloud computing. The fog computing involves data plane and control plane. Fog computing is idea of fabric network that draw out from the outer edges to design data to the storage stored of data, whether that's in cloud or in a data center of customer. The fog  Computing  also likely to lengthen  a  considerable  data  amount  storage,  communication,  computing and  cloud computing  networking  close to  end  devices. The  edge  computing is the major  idea  of  is  to  force  computation  capability  to  sources of data  ,   for example., actuators,  sensors,  and  devices of mobile.  Considering the scattering of fog nodes over large areas, toughness of centralized control increases. Fog computing, that is also known as edge computing, that deal with the troubles by offering flexible services and resources to the users of the network edge, at the same time as cloud computing is related to offering distributed possessions in network core.

References of Fog Computing

abs.gov.au. (2018, August 30). DATA COLLECTION METHODS. Retrieved from http://www.abs.gov.au/websitedbs/D3310114.nsf/home/Basic+Survey+Design+-+Data+Collection+Methods

Alrawais, A., Alhothaily, A., Hu, C., & Xiuzhe. (2017). Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE Internet Computing .

Butler, B. (2018, January 17). What is fog computing? Connecting the cloud to things. Retrieved from https://www.networkworld.com/article/3243111/internet-of-things/what-is-fog-computing-connecting-the-cloud-to-things.html

DeMuro, J. (2018, August 13). What is fog computing? Retrieved from https://www.techradar.com/news/what-is-fog-computing

Dsouza, C., Gail-Joon, & Taguinod, A. M. (2014). Policy-Driven Security Management for Fog Computing:Preliminary Framework and A Case Study. IEEE , 13-15.

Ismail, K. (2018, August 14). Edge Computing vs. Fog Computing: What's the Difference? Retrieved from https://www.cmswire.com/information-management/edge-computing-vs-fog-computing-whats-the-difference/

Kerr, O. S. (2003). Lifting the Fog of Internet Surveillance: How a Suppression Remedy Would Change Computer Crime Law. Hasting law Journal .

Luan, T. H., Gao, L., Li, Z., Xiang, Y., We, G., & Sun, L. (2016). Fog Computing: Focusing on Mobile Users at the Edge .

MUKHERJEE, M., MATAM, R., SHU, L., MAGLARAS, E., FERRAG, M. A., CHOUDHURY, N., et al. (2017). Security and Privacy in FogComputing: Challenges. IEEE .

Singh, S. (2018, July 26). Sampling Techniques. Retrieved from https://towardsdatascience.com/sampling-techniques-a4e34111d808

Stojmenovic, I., & Wen, S. (2014). The Fog Computing Paradigm: Scenarios and Security Issues. IEEE , 2, 1-8.

Stolfo, S. J., Salem, M. B., & Keromytis, A. D. (2012). Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. IEEE .

Westbase.io. (2016, May 5). Fog Computing vs Cloud Computing: What’s the difference? Retrieved from https://www.westbase.io/fog-computing-vs-cloud-computing-whats-the-difference/

Yi, S., & Li, Q. (2015). A Survey of Fog Computing: Concepts, Applications, and Issues.

Yi, S., Hao, Z., Qin, Z., & Li, Q. (2015). Fog Computing: Platform and Applications. IEEE .

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Grade Tutor

ONLINE

Top Grade Tutor

11445 Orders Completed

University Coursework Help

ONLINE

University Coursework Help

1722 Orders Completed

Supreme Essay Writer

ONLINE

Supreme Essay Writer

1890 Orders Completed