Technical seminar report on 64 bit computing
Technical seminar report on 64 bit computing
National Conference on Advancements in Alternate Energy Resources for Rural Applications (AERA-2015)
Fog Computing
Pranati V. Patil
Computer science & Engg
College of Engg & Tech, Akola.
ABSTRACT
Fog Computing is a paradigm that extends Cloud computing
and services to the edge of the network. Similar to Cloud, Fog
provides data, compute, storage, and application services to
end users. In this article, we elaborate the motivation and
advantages of Fog computing, and analyses its applications in
a series of real scenarios, such as Smart Grid, smart traffic
lights in vehicular networks and software defined networks.
We discuss the state-of-the-art of Fog computing and similar
work under the same umbrella. Security and privacy issues are
further disclosed according to current Fog computing
paradigm. As an example, we study a typical attack, man-in-
the-middle attack, for the discussion of security in Fog
computing.
1
International Journal of Computer Applications (0975 – 8887)
National Conference on Advancements in Alternate Energy Resources for Rural Applications (AERA-2015)
2
International Journal of Computer Applications (0975 – 8887)
National Conference on Advancements in Alternate Energy Resources for Rural Applications (AERA-2015)
3
International Journal of Computer Applications (0975 – 8887)
National Conference on Advancements in Alternate Energy Resources for Rural Applications (AERA-2015)
4
International Journal of Computer Applications (0975 – 8887)
National Conference on Advancements in Alternate Energy Resources for Rural Applications (AERA-2015)
also trace and react to movements (e.g, by turning light on or 2) Compute/Storage limitation Current trends are improving
off). Fog devices could be assigned at each floor and could this fact with smaller, more energy-efficient and more
collaborate on higher level of actuation. With Fog computing powerful devices (e.g. one of today's phones is more powerful
applied in this scenario, smart buildings can maintain their than many high end desktops from 15 years ago). Still new
fabric, external and internal environments to conserve energy, improvements are granted for non consumer devices.
water and other resources[2].
3) Management In addition to setting up the communication
routes across end nodes, IoT/ubiquitous computing nodes and
applications running on top need to be properly setup and
configured to operate as desired. Having potentially billions of
small devices to be configured, the fog will heavily rely on
decentralized (scalable) management mechanisms that are yet
to be tested at this unprecedented scale. One thing that can be
predicted with certain degree of confidence is that there will
be no full control of the whole fog and asymptotic declarative
configuration techniques will become more common.
4) Security The same security concerns that apply to current
virtualized environments can be foreseen to affect fog devices
hosting applications. The presence of secure sandboxes for the
execution of droplet applications poses new interesting
challenges: Trust and Privacy. Before using other devices or
mini-clouds in the network to run some software, isolation and
sandboxing mechanisms must be in place to ensure
bidirectional trust among cooperating parties. The fog will
Fig.6. Smart Cities.
allow applications to process users data in third party's
12. PRIVACY hardware/software. This of course introduces strong concerns
Today, we constantly leak personal information by using about data privacy and its visibility for those third parties[6].
different products, platforms and services. We may think were 5) Standardization Today no standardized mechanisms are
in charge of our shopper cards and our mobile apps and our available so each member of the network (terminal, edge
smart fridges, but lets not fool ourselves. The information is point...) can announce its availability to host others software
not ours. It belongs to Google, and IBM, and Cisco Systems components, and for others to sent it their software to be run.
and the global Mega Corp that owns your local supermarket.
If you don‟t believe us, just try removing your data from their 6) Accountability/Monetization Having users able to share
databases. Users are becoming increasingly concerned about they spare resources to host applications is crucial to enable
the risk of having their private data exposed. As a result, new business models around the concept of the fog. A proper
besides the technical challenges introduced by the ubiquity of system of incentives needs to be created. The incentives can
devices, there is another trend that will push for a fog scenario financial or otherwise (e.g. unlimited free data rates). On the
where data is not sent to a few centralized services, but it is other hand the lack of central controlling entity in the fog
instead kept 'in the network' for better privacy. Data makes it difficult to assert if a given device is indeed hosting a
ownership will be a very important cornerstone of the fog, component (droplet) or not.
where some applications will be able to use the network to run 7) Programmability Controlling application lifecycle is
applications and manage data without relying on centralized already a challenge in cloud environments. The presence of
services.. Storing encrypted sensitive data in traditional clouds small functional units (droplets) in more locations (devices)
is an alternative to keep privacy. However, this makes it really calls for the right abstractions to be in place, so that
hard to perform any processing over such data. There is programmers do not need to deal with these difficult issues.
important research work on this topic, for example using Easy to use APIs for programmers will heavily rely on simple
crypto-processors or applying special encryption functions Management mechanisms that provide them with the right
that cipher while keeping some of its original properties, thus abstractions to hide the massive complexity of the fog. Some
allowing to perform certain limited tasks on it. Still, such vendors like Microsoft have already taken some steps in
options have limited applicability. As a result, users will positioning themselves in this space9[8].
demand innovative ways to preserve their privacy from any
potential big-brother-like entity. This will be a great incentive 14. CONCLUSION
to adopt fog technologies, as they will enable the network to The fog is nothing but the convergence of a set of
replace centralized services[3][9]. technologies that have been developing and maturing in an
independent manner for quite some time. The integration of
13. CHALLENGES AHEAD these into a single IT scenario is an answer to the new
There are many open problems that will have to be addressed requirements introduced by device ubiquity and demands for
to make the fog a reality. It is necessary to clearly identify agile network and service management and data privacy. As a
them so future research works have these problems into result the fog will dramatically shift many of our current
account. The set of open challenges for the fog to become a practices at almost every layer of the IT stack, like apps
reality is: development, network traffic management, network/service
1) Discovery/Sync Applications running on devices may need provision, accounting, apps collaboration mechanisms, etc.
either some agreed centralized point (e.g. establish an This article has provided a broad overview of this
upstream backup if there are too few peers in our storage convergence and what are the common points that link all
application). these technologies together, creating a new paradigm that
some have already named as fog computing.
5
International Journal of Computer Applications (0975 – 8887)
National Conference on Advancements in Alternate Energy Resources for Rural Applications (AERA-2015)
IJCATM : www.ijcaonline.org 6