Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Approach Towards the Fog Computing:Stretching Cloud Computing and Internet of Things


Affiliations
1 Programme Officer, ADE Section, University Head Office, The M. S. University of Baroda, Vadodara, Gujarat, India
2 Assistant Professor, Department of Computer Science & Engineering, The M. S. University of Baroda, Vadodara, Gujarat, India
     

   Subscribe/Renew Journal


Fog computing is a natural extension to cloud computing. It extends the Cloud platform by providing computing resources on the edges of a network. Fog Computing is acting as the intermediate layer for securing the data which is stored inside the cloud. By the year 2025, it is estimated that 75.4 billion IoT devices will be connected to Internet. So in the future this gives challenge to handle huge amount of data and to provide the security for the Data.

1. Internet of Things (IoT) combines information and computing processes to control very large collections of different objects. The IoT devices will produce very large volume of data. It is very difficult to manage these data with traditional system and cloud systems.

2. Fog computing is designed to overcome the limitations of cloud computing. This paper analyses the current developments in the field of fog computing, addresses security issues in fog computing, and based on the observations propose future directions for research.


Keywords

Cloud Computing, Edge Computing, Fog Computing, Internet of Things (IoT).
Subscription Login to verify subscription
User
Notifications
Font Size


  • A. V. Dastjerdi, and R. Buyya, “Fog computing: helping the internet of things realize its potential,” Computer, vol. 49, no. 8, pp. 112-116, August 2016.
  • A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog computing for the Internet of Things: Security and privacy issues,” IEEE Special Section on Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing, vol. 21, no. 2, pp. 34-42, March 2017.
  • A. A. Lisbon, and R. Kavitha, “A study on cloud and fog computing security issues and solutions,” International Journal of Innovative Research in Advanced Engineering, vol. 4, no. 3, pp. 17-22, March 2017.
  • A. A. Dabhi, T. J. Raval, and K. Chaudhary, “Fog computing: A review and conceptual architecture, issues, applications and its challenges,” IJARIIE, vol. 3, no. 5, pp. 717-722, 2017.
  • A. B. Shah, J. Kannan, D. U. Shah, S. B. Ware, and R. S. Badodekar, “Fog Computing: Securing the cloud and preventing insider attacks in the cloud,” International Journal of Engineering and Computer, vol. 5, no. 3, pp. 16009-16012, March 2016.
  • A. S. K. Ratnam, M. Vuyyuru, P. Annapurna, and K. G. Babu, “An overview of cloud computing technology,” International Journal of Soft Computing and Engineering, vol. 2, no. 3, pp. 244-246, July 2012.
  • B. B. Rad, and A. A. Shareef, “Fog computing: A short review of concept and applications,” IJCSNS International Journal of Computer Science and Network Security, vol. 17, no. 11, pp. 68-74, November 2017.
  • C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho, M. J. Morrow, and P. A. Polakos, “A comprehensive survey on fog computing: State-of-the-art and research challenges,” IEEE Communications Surveys and Tutorials, vol. 20, no. 1, pp. 416-464, 2018.
  • D. Koo, and J. Hur, “Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing,” Future Generation Computer Systems, vol. 78, no. 2, pp. 739-752, January 2018.
  • E. Strohmaier, J. Dongarra, H. W. Meuer, and H. Simon, “The marketplace of high-performance computing,” Parallel Computing, vol. 25, no. 1314, pp. 1517-1544, 1999.
  • H. Gupta, S. Chakraborty, S. K. Ghosh, and R. Buyya, “Fog computing in 5G Networks: An application perspective,” March 2017.
  • I. Stojmenovic, “Fog computing: A cloud to the ground support for smart things and machine-to-machine networks,” In 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC), pp. 117-122, 2014.
  • J. Ni, A. Zhang, X. Lin, and X. S. Shen, “Security, privacy, and fairness in fog-based vehicular crowdsensing,” IEEE Communications Magazine, vol. 55, no. 6, pp. 146-152, June 2017.
  • K. Asanović, R. Bodik, B. C. Catanzaro, J. J. Gebis, P. Husbands, K. Keutzer, D. A. Patterson, W. L. Plishker, J. Shalf, S. W. Williams, and K. A. Yelick, “The Landscape of parallel computing research: A view from Berkeley,” University of California, Berkeley, Tech. Rep. UCB/EECS-2006-183, December 2006.
  • K. P. Saharan, and A. Kumar, “Fog in comparison to cloud: A survey,” International Journal of Computer Applications, vol. 122, no. 3, pp. 10-12, July 2015.
  • K. Gai, M. Qiu, L. Tao, and Y. Zhu, “Intrusion detection techniques for mobile cloud computing in heterogeneous 5G,” Security and Communication Networks, vol. 9, no. 16, pp. 3049-3058, November 2016.
  • L. Jiao, R. Friedman, X. Fu, S. Secci, Z. Smoreda, and H. Tschofenig, “Cloud-based computation offload ing for mobile devices: State of the art, challenges and opportunities,” In 2013 Future Network Mobile Summit, pp. 1-11, 2013.
  • L. M. Vaquero, and L. Rodero-Merino, “Finding your way in the fog: Towards a comprehensive definition of fog computing,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, pp. 27-32, October 2014.
  • R. Waheetha, and S. Fernandez, “Fog computing and its applications,” International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST), vol. 2, no. sp.19, pp. 56-62, October 2016.
  • M. Mukherjee, R. Matam, L. Shu, L. Maglaras, M. A. Ferrag, N. Choudhury, and V. Kumar, “Security and privacy in fog computing: Challenges,” IEEE Access, vol. 5, pp. 19293-19304, 2017.
  • M. Firdhous, O. Ghazali, and S. Hassan, “Fog computing: Will it be the future of cloud computing?,” Proceedings of the Third International Conference on Informatics & Applications, Kuala Terengganu, Malaysia, 2014.
  • N. Cranford, “The role of fog computing in 5G,”. Available: https://www.rcrwireless.com
  • P. More, and J. Kulkarni, “Fog computing,” International Research Journal of Engineering and Technology (IRJET), vol. 4, no. 2, pp. 1113-1116, February 2017.
  • P. V. Patil, “Fog computing,” International Journal of Computer Applications, National Conference on Advancements in Alternate Energy Resources for Rural Applications (AERA-2015), 2015.
  • P. Kumar, N. Zaidi, and T. Choudhury, “Fog computing: Common security issues and proposed countermeasures,” In Proc. Int. Conf. System Modeling Adv. Res. Trends (SMART), pp. 311-315, November 2016.
  • R. Romana, J. Lopeza, and M. Mambob, “Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges,” Future Generation Computer Systems, vol. 78, pp. 680-698, 2018.
  • S. Erich, D. Jack, W. Meuer, and H. Simon, “Recent trends in the marketplace of high performance computing,” Parallel Computing, vol. 31, no. 34, pp. 261-273, 2005.
  • S. Yangui, P. Ravindran, O. Bibani, R. H. Glitho, N. B. Hadj-Alouane, M. J. Morrow, and P. A. Polakos, “A platform as-a-service for hybrid cloud/fog environments,” In 2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), pp. 1-7, 2016.
  • S. Yangui, and S. Tata, “The SPD approach to deploy service-based applications in the cloud,” Concurrency and Computation: Practice and Experience, vol. 27, no. 15, pp. 3943-3960, October 2015.
  • S. Singh, Y. C. Chiu, Y. H. Tsai, and J. S. Yang, “Mobile edge fog computing in 5G era: Architecture and implementation,” 2016 International Computer Symposium (ICS), 2016.
  • S. Yi, C. Li, and Q. Li, “A survey of fog computing: Concepts, applications and issues,” In Proceedings of the 2015 Workshop on Mobile Big Data, pp. 37-42, June 2015.
  • S. Kitanov, and T. Janevski, “Energy efficiency of 5G mobile networks in hybrid fog and cloud computing environment,” RTA-CSIT, pp. 41-46, 2016.
  • S. Yi, Z. Qin, and Q. Li., “Security and privacy issues of fog computing: A survey,” In Proc. 10th Int. Conf. Wireless Algorithms, Syst., Appl. (WASA), pp. 685-695, August 2015.
  • S. Khan, S. Parkinson, and Y. Qin, “Fog computing security: A review of current applications and security solutions,” Journal of Cloud Computing Advances, Systems and Applications, vol. 6, no. 19, 2017.
  • T. Wang, J. Zeng, Md. Z. A. Bhuiyan, H. Tian, Y. Cai, Y. Chen, and B. Zhong, “Trajectory privacy preservation based on a fog structure for cloud location services,” IEEE Access, vol. 5, pp. 7692-7701, May 2017.
  • T. Ercana, “Effective use of cloud computing in educational institutions,” Yasar University, Department of Computer Engineering, Turkey, January 2010.
  • U. A. Deshmukh, and S. A. More, “Fog Computing: New approach in the world of cloud computing,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 9, pp. 16310-16316, September 2016.
  • V. Dubey, D. Sahu, S. Sharma, and A. Tripathi, “Cloud computing in mobile applications,” International Journal of Scientific and Research Publications, vol. 2, no. 8, pp. 1-9, August 2012.
  • X. Zhu, D. S. Chan, H. Hu, M. S. Prabhu, E. Ganesan, and F. Bonomi, “Improving video performance with edge servers in the fog computing architecture,” Intel Technology Journal, vol. 19, no. 1, pp. 202-224, April 2015.
  • X. Huang, I. Stojmenovic, S. Wen, and H. Luan, “An overview of fog computing and its security issues,” Concurrency and Computation: Practice and Experience, vol. 28, no. 10, pp. 2991-3005, July 2016.
  • Y. Wang, T. Uehara, and R. Sasaki, “Fog computing: Issues and challenges in security and forensics,” In 2015 IEEE 39th Annual Computer Software and Applications Conference (COMPSAC), vol. 3, pp. 53-59, July 2015.

Abstract Views: 397

PDF Views: 0




  • An Approach Towards the Fog Computing:Stretching Cloud Computing and Internet of Things

Abstract Views: 397  |  PDF Views: 0

Authors

Bhoomi Shah
Programme Officer, ADE Section, University Head Office, The M. S. University of Baroda, Vadodara, Gujarat, India
Hetal Bhavsar
Assistant Professor, Department of Computer Science & Engineering, The M. S. University of Baroda, Vadodara, Gujarat, India

Abstract


Fog computing is a natural extension to cloud computing. It extends the Cloud platform by providing computing resources on the edges of a network. Fog Computing is acting as the intermediate layer for securing the data which is stored inside the cloud. By the year 2025, it is estimated that 75.4 billion IoT devices will be connected to Internet. So in the future this gives challenge to handle huge amount of data and to provide the security for the Data.

1. Internet of Things (IoT) combines information and computing processes to control very large collections of different objects. The IoT devices will produce very large volume of data. It is very difficult to manage these data with traditional system and cloud systems.

2. Fog computing is designed to overcome the limitations of cloud computing. This paper analyses the current developments in the field of fog computing, addresses security issues in fog computing, and based on the observations propose future directions for research.


Keywords


Cloud Computing, Edge Computing, Fog Computing, Internet of Things (IoT).

References