Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Literature Review of Fog Computing

Category: Financial Reporting Paper Type: Dissertation & Thesis Writing Reference: APA Words: 1900

According to the research conducted by MUKHERJEE, et al., (2017) it is reviewed that on the distributed nodes’ computational power, it is demonstrated that Fog computing relies on it for decreasing the data center’s total pressure. When it comes to fog computing, preservation of privacy is quite difficult which are in EUs’ vicinity as they might gather the data which is sensitive concerning the location, smart grid, use of utilities, and identity compared to the cloud server which is remote and fall in the stigma or core network. Considering the scattering of fog nodes over large areas, toughness of centralized control increases. The mere possibility of a weak edge node might offer access to an intruder. With the entrance of intruder, chances of stealing shared data between entities rise. Privacy leakages can also be led by the high communication within the trio of layers which compromise the architecture. As per the discussion, location privacy is the most important model when it comes to privacy as the location of device can be connected to the owner. The clients of  fog  delegate  its  responsibilities  to  next-door  nodes of fog  ,  trajectory,  position and  still  habits  mobility  can  become  exposed  of  a challenger.  The habits  of user  can  be  exposed  from opposition by  examining  fog  services habits  usage  ,  for example smart grid.  It  revealed  in  readings of  smart  meters’  can  reveal information  concerning  time  that  TV  programs  or  empty  house  that  EU  have a preference  to  watch (MUKHERJEE, et al., 2017).

According to the research conducted by Alrawais, Alhothaily, Hu, & Xiuzhe, (2017) it is analyzed that the fog  computing is  a  technology  that  bridges  the  gap  among  Internet  of  Things  devices and  remote  data  centers  .  It enable  an  extensive  range  of  reimbursement,  that include  decreased  bandwidth,  enhanced  security  and  latency reduction  ,  fog  is  a  suitable  model  for  many  internet  of  Things services.  On the other hand,   fog  devices  (situated  at  Internet edge  )  clearly  face  a lot of  privacy  and  security   threats.  At this time,  the  authors  talk about  the  privacy  and  security  concern in  internet  of  Things background  and  suggest  a  mechanism  that  employ  fog  to  develop  the  distribution  of  certificate  revocation  information  between  internet  of  Things devices  for  enhancement of security   (Alrawais, Alhothaily, Hu, & Xiuzhe, 2017).

According to the research conducted by (Yi & Li, 2015)it is reviewed that with the cloud computing increasing usage, there are some of the issues unsettled because of the intrinsic cloud computing problem for example be short of of mobility maintain, unreliable latency and consciousness of location. Fog computing, that is known as edge computing, that deal with the troubles by offering expandable services and resources to users at network edge, at the same time as cloud computing offering distributed possessions in network core. In this review there is a  discussion about meaning of fog computing alike conception, ambassador state of application affairs, and identifies a range of issues might come across implementing and designing systems of fog computing. It is focus on some challenges and opportunities, as possible future direction of work, in associated method that require to be measured in fog computing context  (Yi & Li, 2015).

According to the research conducted by (Stojmenovic & Wen, 2014) it is reviewed that the fog Computing is a model that expand the Cloud computing and services to network edge. Similar to Cloud, Fog offer data, storage, compute and services of application to the end-users. In this article, there is an elaboration of the incentive and rewards of Fog computing, and analyze its application in real scenarios series, for example vehicular networks smart traffic lights, Smart Grid and networks defined by software. There is also discussion about the Fog computing state-of-the-art and same work underneath the same umbrella. The issues related to Security and authorizations are reveal according to present paradigm of Fog computing. As an instance, there is an analysis of man-in-the-middle attack, typical attack for argument of authorization and security in Fog computing. The furtive aspects of attack are investigative by memory consumption and CPU on Fog device, the lass of internet of Things and CPSs. Depending on the customary information carrier as well as telecommunication network and internet of  Things is a system that can intersect regular physical matter with identified addresses. The feature of CPSs a stretched combination of the system’s physical and computational fundamentals. The CPSs also organize integration of computer and information oriented engineered and physical systems. The internet  of  Things and CPSs assure to change our world with new affairs between communication systems and control based on the engineered systems and physical reality  (Stojmenovic & Wen, 2014).

According to the research conducted by (Luan, Gao, Li, Xiang, We, & Sun, 2016) it is reviewed that with particular smartphones, smart devices, becoming the daily companions, the ever-present computing applications and mobile Internet encompass daily lives of people. With the surge command on high-class mobile services anywhere, how to deal with ever-present user needs and accommodate the unstable mobile traffics growth are the main problems of next mobile networks of generation. The Fog computing is a main solution towards objective. The Fog computing expand the cloud computing by offering virtualized capital and occupied services based on location to the mobile networks edge to better serve up traffics on mobile. Consequently, the Fog computing is a good combination of mobile applications and cloud computing. In this article, the main Fog computing features are described with all of their architecture, concept and design objective. There is also discussion about some issues of future research from the perspective of networking  (Luan, Gao, Li, Xiang, We, & Sun, 2016).

 Fog computing is a said to be a lack of a homogeneous definition. This article offers a Fog computing view from perspective of networking with the objective to form the Fog computing key features and recognizes its main open research and design goals issues to well-organized system of mobile networking. In this part of article, there is an analysis of the unfold journey of the fog computing by first recitation the Fog computing system architecture and showcase scenarios of the exemplary function. After that fundamental incentive following the Fog computing and the assessment with accessible related paradigms of networking  (Luan, Gao, Li, Xiang, We, & Sun, 2016).

According to the research conducted (Stolfo, Salem, & Keromytis, 2012) by it is reviewed that Cloud computing guarantee to considerably modify the approach that is used in computers to entrance and accumulate business and individual information. With all of the paradigms of communications and computing raise new challenges of security of data. Existing mechanisms of data protection for example encryption have unsuccessful in data theft attacks prevention, particularly those carry out by a cloud provider insider. In this article different approach is used for data securing in cloud by using distasteful decoy technology. It is also monitored that data access in cloud and perceive irregular patterns of data access. When the unauthorized right of entry is supposed and then confirmed using confront questions, there is disinformation attack launch by recurring large quantity of attacker decoy information. This is also likely to protect alongside the users real data misuse. All of the experiments carry out in a local setting of file that provide proof about this approach might offer unparalleled data security levels of user in a Cloud setting (Stolfo, Salem, & Keromytis, 2012).

According to the research conducted by (Yi, Hao, Qin, & Li, 2015) it is reviewed that Fog computing is typically lend a hand with the cloud computing. As an effect fog, end users and cloud mutually form a 3 layer model of service delivery. In terms of characterization Fog computing also demonstrates a well-built association towards the cloud computing. For instance, elastic possessions (storage, computation and networking) are building blocks, demonstrating that the majority of technologies in cloud computing can be openly functional to fog computing. on the other hand, fog computing has more than a few unique possessions that differentiate it from other accessible architectures of computing. The most significant is its close up end users distance. It is very important to maintain computing supply at the network edge to hold up latency-sensitive services and applications. Another property is awareness of location-; fog node geo-distributed is able to deduce its position and follow end user devices to hold up mobility (Yi, Hao, Qin, & Li, 2015).

According to the research conducted by (Dsouza, Gail-Joon, & Taguinod, 2014)it is reviewed that with the growing demand of user for elastic resources provisioning attached with ever-present and data on-demand access, the cloud computing documented as an promising technology to convene such demands of dynamic user. In adding up, increasing mobile use devices, the Internet of Things has in recent times use substantial concentration since the Internet of Things has bring physical devices and associated them to Internet, that also enable each device to contribute to data with nearby devices and virtualized real-time technologies. As a result, the data usage exploding requires an innovative, new platform of computing that offer vigorous real-time analytics of data and provisioning resource to the clients. As a effect, the fog computing has newly introduced to offer storage, computation and networking services among traditional data centers of cloud computing and end-users. This article also propose resources of  policy-based management in the fog computing, increasing the present platform of fog computing to hold up secure interoperability and association amongst resources requested by user in the fog computing (Dsouza, Gail-Joon, & Taguinod, 2014).

According to the research conducted by Kerr (2003), it is reviewed that the computer hacker hack the Internet commerce company servers for credit card numbers to duplicate and put up for sale. The companies find out attack and for support contact the FBI. The FBI unlock an examination and focal point its hard work on effort to outline the confirmation of attack from the sufferer back to hacker. The strategy of government will be to go after the follow the "electronic bread crumbs" that might left behind, for example stored files and logs of connection, until they can identify the wrongdoer and outline back attack. This procedure is extremely synchronized by centralized electronic observation statutes that necessitate the management to get hold of orders in court practically every step of system; the court orders induce the ISPs owners and some of the servers that have records attack to reveal the information to the government. Visualize that all of these method prove flourishing, and offer information that point towards the hacker. At this position, the FBI obtains an investigation authorizing enforcement of law to look for the hacker's residence and grab his computer. The agents of FBI carry out the demand, and  look for of the computer discover the credit card numbers that were stolen inside it. The agents FBI can by doing this arrest the hacker (Kerr, 2003).

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Math Exam Success

ONLINE

Math Exam Success

1239 Orders Completed

Best Coursework Help

ONLINE

Best Coursework Help

1554 Orders Completed

Top Grade Tutor

ONLINE

Top Grade Tutor

11445 Orders Completed