SlideShare a Scribd company logo
1 of 27
Prepared By:
Ankit Ap
www.facebook.com/Ank1tAp
FOG COMPUTING
(INTERNET OF THINGS)
 User Behavior Profiling.
 Application of Fog Computing.
 Decoy System.
 Security And Privacy issues.
 Conclusion.
 Future Scope & Prediction.
 References.
 Abstract.
 Introduction.
 Existing System.
 Disadvantage Of Existing System.
 Internet Of Things (IOT).
 Proposed System.
 Characteristics.
CONTENTS
• Fog Computing is a paradigm that extends Cloud computing and
services to the edge of the network. Similar to Cloud, Fog provides
data, compute, storage, and application services to end-users. The
motivation of Fog computing lies in a series of real scenarios, such as
Smart Grid, smart traffic lights in vehicular networks and software
defined networks
ABSTRACT
• Fog computing is a term created by Cisco that refers to extending cloud
computing to the edge of an enterprise's network.
• Cisco introduced its fog computing vision in January 2014 as a way of
bringing cloud computing capabilities to the edge of the network .
• As the result, closer to the rapidly growing number of connected devices
and applications that consume cloud services and generate increasingly
massive amounts of data.
INTRODUCTION
• Cloud computing is a type of
computing that relies on sharing
computing resources rather than
having local servers or personal
devices to handle applications.
Cloud computing is comparable to
grid computing, a type of
computing where unused
processing cycles of all computers in
a network are harnesses to solve
problems too intensive for any
stand-alone machine.
EXISTING SYSTEM
DISADVANTAGE OF EXISTING SYSTEM
• ENCRYPTION WAS FAILED IN SECURING THE DATA FROM THE
ATTACKER.
• IT DOES NOT VERIFY WHETHER THE USER IS AUTHORISED OR NOT.
• NO BODY IS IDENTIFIED WHEN THE ATTACK HAPPENS.
• IT IS COMPLEX TO DETECT WHICH USER IS ATTACK.
• WE CAN’T DETECT WHICH FILE IS BEING HACKED.
• LATENCY TOO HIGH.
• RESILIENCY IMPRACTICAL.
INTERNET OF THINGS (IOT)
• The Internet of Things (IoT) is
the network of physical
objects—devices, vehicles,
buildings and other items
embedded with electronics,
software, sensors, and network
connectivity—that enables
these objects to collect and
exchange data.
• We proposed a completely new technique to secure user’s data in
cloud using user behavior Profiling and Decoy information
technology called as fog computing.
• In this technique when the unauthorized person try to access the
data of the real user the system generates the fake documents in
such a way that the unauthorized person was also not able to
identify the data is fake or real.
PROPOSED SYSTEM
• SECURITY
• - STRONG SECURITY (HARDWARE ROOT OF TRUST)
• - RESILIENCY/FAULT TOLERANCE.
• PROGRAMMABILITY
• - MULTIPLE APPLICATION SUPPORT.
• - VERSATILITY IN OPERATING ENVIRONMENT.
CHARACTERISTICS
• REAL TIME FEATURES
- DETERMINISTIC TIMING CAPABILITIES.
• SUPPORTS MULTIPLE OPERATING
PLATFORMS:UNIX,WINDOWS,MAC etc.
• EMPLOYS SIMPLE,FAST AND STANDARIZED IOT INTERNET
PROTOCOLS(TCP/IP ,SOCKETS etc.).
• RUNS ON AFFORDABLE,OFF THE SHELF COMPUTING
TECHNOLOGIES.
CHARACTERISTICS
• Admin monitor data access in the cloud and notice abnormal data
access patterns User profiling will a well known Technique that can
be applied here to check how, when, and how much a client access
their data in the Cloud.
• This method of behavior based security will regularly used in
scheme uncovering applications.
USER BEHAVIOR PROFILING
• IT INCLUDES VOLUMETRIC INFORMATION,HOW MANY
INFORMATIONS ARE TYPICALLY READ AND HOW OFTEN.
• “NORMAL USER ” BEHAVIOR IS CONTINUOUSLY CHECKED TO
DETERMINE ABNORMAL ACCESS .
• THIS SECURITY IS COMMONLY USED IN FRAUD DETECTION
APPLICATION.
USER BEHAVIOR PROFILING
• SOFTWARE DEFINED NETWORKS(SDN):
SDN CONCEPT TOGETHER WITH FOG WILL RESOLVE THE ISSUE IN
VEHICULAR NETWORKS , INTERMITTENT CONNECTIVITY , COLLISION
HIGH PACKET LOSS RATE.
• IoT AND CYBER-PHYSICAL SYSTEMS(CPSs):
INTEGRATE THE ABSTRACTIONS AND PRECISION OF SOFTWARE AND
NETWORKING WITH THE DYNAMICS IN THE PHYSICAL ENVIRONMENT.
• DECENTRALIZED SMART BUILDING CONTROL:
WITH FOG COMPUTING ,SMART BUILDING CAN MAINTAIN THEIR
FABRIC,EXTERNAL AND INTERNAL ENVIRONMENTS.
APPLICATION OF FOG COMPUTING.
• The main security issues are authentication at different levels of
gateways as well as (in case of smart grids) at the smart meters
installed in the consumer’s home.
• Each smart meter and smart appliance has an IP address. A
malicious user can either tamper with its own smart meter, report
false readings, or spoof IP addresses.
• In smart grids, privacy issues deal with hiding details, such as what
appliance was used at what time, while allowing correct
summary information for accurate charging.
SECURITY AND PRIVACY ISSUES
• Decoy system is a different approach for securing data in the cloud
using nasty decoy technology.
• data access in the cloud and sense irregular data access patterns.
• We use this technology to begin disinformation attacks against
malicious insiders, preventing them from distinguishing the valid
aware customer data from bogus useless.
DECOY SYSTEM
DECOY SYSTEM
• Extending the cloud closer to the things that generate and act on
data benefits the business in the following ways:
• Greater business agility: With the right tools, developers can quickly
develop fog applications and deploy
them where needed.
• Better security: Protect your fog nodes using the same policy,
controls, and procedures you use in other
parts of your IT environment. Use the same physical security and
ADVANTAGE OF FOG COMPUTING
• ● Deeper insights, with privacy control: Analyze sensitive data locally
instead of sending it to the cloud for
analysis.
• ● Lower operating expense: Conserve network bandwidth by
processing selected data locally instead of
sending it to the cloud for analysis.
ADVANTAGE OF FOG COMPUTING
CONCLUSION
• Fog computing gives the cloud a companion to handle the two
exabytes of data generated daily from the Internet of
Things.
• Processing data closer to where it is produced and needed solves
the challenges of exploding data volume, variety, and velocity.
•
Fog computing accelerates awareness and response to events by
eliminating a round trip to the cloud for analysis.
CONCLUSION
• It avoids the need for costly bandwidth additions by offloading
gigabytes of network traffic from the core network.
• It also protects sensitive IoT data by analyzing it inside company
walls. Ultimately, organizations that adopt fog
computing gain deeper and faster insights, leading to increased
business agility, higher service levels, and
improved safety.
• 2010, IBM (describing their Rational software design)
• “A World with 1 Trillion Connected Devices” … by 2015
• 2011, Ericsson CEO Hans Vestberg
• “50 Billion Connected Devices” … by 2020
• 2013, ABI Research report
• “30 Billion” … by 2020
• 2013, Morgan Stanley report
• “75 Billion Devices Connected to the IoT” … by 2020
• 2014, Intel infographic
• “31 billion devices connected to the Internet” … by 2020
• 2014, ABI Research updated report
• “41 billion active wireless connected devices” … by 2020
FUTURE SCOPE & PREDICTIONS
FUTURE SCOPE & PREDICTIONS
• Cellular M2M Devices send on average: 2 MBytes / month
• India: 15M cellular devices (8% of all M2M): 30 TBytes / Month
Total cellular M2M data use is increasing
• Number of cellular M2M devices (at 5%): 2.5 Billion
• Data (assuming 4MB / month): 10,000,000 TBytes / month
With 50 Billion Devices by 2020
• Transmissions and total data haystacks are enormous
• Demands “processing at the edge” … at device  Fog Computing
Even with conservative estimates
• Sources
• Fog Computing and the Internet of Things: Extend
http://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-
• Cisco Fog Computing Solutions: Unleash the Power of Internet
• http://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-solutions.pdf
• A Simple Explanation Of 'The Internet Of Things' – Forbes
• http://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-
understand/#793c56ca6828
• The Internet of Things (IoT) Starts with Intel Inside®
• http://www.intel.com/content/www/us/en/internet-of-things/overview.html
BIBLIOGRAPHY
Fog computing
Fog computing

More Related Content

What's hot (20)

Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
Fog computing
Fog computingFog computing
Fog computing
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Edge computing
Edge computingEdge computing
Edge computing
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Fog computing
Fog computingFog computing
Fog computing
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
 
Edge computing
Edge computingEdge computing
Edge computing
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 

Viewers also liked

cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with FogAchu Anna
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

Viewers also liked (16)

Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similar to Fog computing

Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentationVishakha Kumar
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptxImpanaR2
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...RahulJain989779
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptxOdedeleIfeoluwa
 
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxCHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxFame22
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationSherin C Abraham
 
Internet_of_Things.pptx
Internet_of_Things.pptxInternet_of_Things.pptx
Internet_of_Things.pptxzarakhalid20
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Midhul N
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsDennis Jacob
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...RahulJain989779
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfAnujashejwal
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
 

Similar to Fog computing (20)

Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentation
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
 
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxCHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M Communication
 
Internet_of_Things.pptx
Internet_of_Things.pptxInternet_of_Things.pptx
Internet_of_Things.pptx
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
IOT Introduction.pptx
IOT Introduction.pptxIOT Introduction.pptx
IOT Introduction.pptx
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
Knowledge of IoT
Knowledge of IoTKnowledge of IoT
Knowledge of IoT
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 

Recently uploaded

WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 

Recently uploaded (20)

WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 

Fog computing

  • 1. Prepared By: Ankit Ap www.facebook.com/Ank1tAp FOG COMPUTING (INTERNET OF THINGS)
  • 2.  User Behavior Profiling.  Application of Fog Computing.  Decoy System.  Security And Privacy issues.  Conclusion.  Future Scope & Prediction.  References.  Abstract.  Introduction.  Existing System.  Disadvantage Of Existing System.  Internet Of Things (IOT).  Proposed System.  Characteristics. CONTENTS
  • 3. • Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks ABSTRACT
  • 4. • Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network. • Cisco introduced its fog computing vision in January 2014 as a way of bringing cloud computing capabilities to the edge of the network . • As the result, closer to the rapidly growing number of connected devices and applications that consume cloud services and generate increasingly massive amounts of data. INTRODUCTION
  • 5. • Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Cloud computing is comparable to grid computing, a type of computing where unused processing cycles of all computers in a network are harnesses to solve problems too intensive for any stand-alone machine. EXISTING SYSTEM
  • 6. DISADVANTAGE OF EXISTING SYSTEM • ENCRYPTION WAS FAILED IN SECURING THE DATA FROM THE ATTACKER. • IT DOES NOT VERIFY WHETHER THE USER IS AUTHORISED OR NOT. • NO BODY IS IDENTIFIED WHEN THE ATTACK HAPPENS. • IT IS COMPLEX TO DETECT WHICH USER IS ATTACK. • WE CAN’T DETECT WHICH FILE IS BEING HACKED. • LATENCY TOO HIGH. • RESILIENCY IMPRACTICAL.
  • 7. INTERNET OF THINGS (IOT) • The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity—that enables these objects to collect and exchange data.
  • 8.
  • 9. • We proposed a completely new technique to secure user’s data in cloud using user behavior Profiling and Decoy information technology called as fog computing. • In this technique when the unauthorized person try to access the data of the real user the system generates the fake documents in such a way that the unauthorized person was also not able to identify the data is fake or real. PROPOSED SYSTEM
  • 10.
  • 11. • SECURITY • - STRONG SECURITY (HARDWARE ROOT OF TRUST) • - RESILIENCY/FAULT TOLERANCE. • PROGRAMMABILITY • - MULTIPLE APPLICATION SUPPORT. • - VERSATILITY IN OPERATING ENVIRONMENT. CHARACTERISTICS
  • 12. • REAL TIME FEATURES - DETERMINISTIC TIMING CAPABILITIES. • SUPPORTS MULTIPLE OPERATING PLATFORMS:UNIX,WINDOWS,MAC etc. • EMPLOYS SIMPLE,FAST AND STANDARIZED IOT INTERNET PROTOCOLS(TCP/IP ,SOCKETS etc.). • RUNS ON AFFORDABLE,OFF THE SHELF COMPUTING TECHNOLOGIES. CHARACTERISTICS
  • 13. • Admin monitor data access in the cloud and notice abnormal data access patterns User profiling will a well known Technique that can be applied here to check how, when, and how much a client access their data in the Cloud. • This method of behavior based security will regularly used in scheme uncovering applications. USER BEHAVIOR PROFILING
  • 14. • IT INCLUDES VOLUMETRIC INFORMATION,HOW MANY INFORMATIONS ARE TYPICALLY READ AND HOW OFTEN. • “NORMAL USER ” BEHAVIOR IS CONTINUOUSLY CHECKED TO DETERMINE ABNORMAL ACCESS . • THIS SECURITY IS COMMONLY USED IN FRAUD DETECTION APPLICATION. USER BEHAVIOR PROFILING
  • 15. • SOFTWARE DEFINED NETWORKS(SDN): SDN CONCEPT TOGETHER WITH FOG WILL RESOLVE THE ISSUE IN VEHICULAR NETWORKS , INTERMITTENT CONNECTIVITY , COLLISION HIGH PACKET LOSS RATE. • IoT AND CYBER-PHYSICAL SYSTEMS(CPSs): INTEGRATE THE ABSTRACTIONS AND PRECISION OF SOFTWARE AND NETWORKING WITH THE DYNAMICS IN THE PHYSICAL ENVIRONMENT. • DECENTRALIZED SMART BUILDING CONTROL: WITH FOG COMPUTING ,SMART BUILDING CAN MAINTAIN THEIR FABRIC,EXTERNAL AND INTERNAL ENVIRONMENTS. APPLICATION OF FOG COMPUTING.
  • 16. • The main security issues are authentication at different levels of gateways as well as (in case of smart grids) at the smart meters installed in the consumer’s home. • Each smart meter and smart appliance has an IP address. A malicious user can either tamper with its own smart meter, report false readings, or spoof IP addresses. • In smart grids, privacy issues deal with hiding details, such as what appliance was used at what time, while allowing correct summary information for accurate charging. SECURITY AND PRIVACY ISSUES
  • 17. • Decoy system is a different approach for securing data in the cloud using nasty decoy technology. • data access in the cloud and sense irregular data access patterns. • We use this technology to begin disinformation attacks against malicious insiders, preventing them from distinguishing the valid aware customer data from bogus useless. DECOY SYSTEM
  • 19. • Extending the cloud closer to the things that generate and act on data benefits the business in the following ways: • Greater business agility: With the right tools, developers can quickly develop fog applications and deploy them where needed. • Better security: Protect your fog nodes using the same policy, controls, and procedures you use in other parts of your IT environment. Use the same physical security and ADVANTAGE OF FOG COMPUTING
  • 20. • ● Deeper insights, with privacy control: Analyze sensitive data locally instead of sending it to the cloud for analysis. • ● Lower operating expense: Conserve network bandwidth by processing selected data locally instead of sending it to the cloud for analysis. ADVANTAGE OF FOG COMPUTING
  • 21. CONCLUSION • Fog computing gives the cloud a companion to handle the two exabytes of data generated daily from the Internet of Things. • Processing data closer to where it is produced and needed solves the challenges of exploding data volume, variety, and velocity. • Fog computing accelerates awareness and response to events by eliminating a round trip to the cloud for analysis.
  • 22. CONCLUSION • It avoids the need for costly bandwidth additions by offloading gigabytes of network traffic from the core network. • It also protects sensitive IoT data by analyzing it inside company walls. Ultimately, organizations that adopt fog computing gain deeper and faster insights, leading to increased business agility, higher service levels, and improved safety.
  • 23. • 2010, IBM (describing their Rational software design) • “A World with 1 Trillion Connected Devices” … by 2015 • 2011, Ericsson CEO Hans Vestberg • “50 Billion Connected Devices” … by 2020 • 2013, ABI Research report • “30 Billion” … by 2020 • 2013, Morgan Stanley report • “75 Billion Devices Connected to the IoT” … by 2020 • 2014, Intel infographic • “31 billion devices connected to the Internet” … by 2020 • 2014, ABI Research updated report • “41 billion active wireless connected devices” … by 2020 FUTURE SCOPE & PREDICTIONS
  • 24. FUTURE SCOPE & PREDICTIONS • Cellular M2M Devices send on average: 2 MBytes / month • India: 15M cellular devices (8% of all M2M): 30 TBytes / Month Total cellular M2M data use is increasing • Number of cellular M2M devices (at 5%): 2.5 Billion • Data (assuming 4MB / month): 10,000,000 TBytes / month With 50 Billion Devices by 2020 • Transmissions and total data haystacks are enormous • Demands “processing at the edge” … at device  Fog Computing Even with conservative estimates
  • 25. • Sources • Fog Computing and the Internet of Things: Extend http://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing- • Cisco Fog Computing Solutions: Unleash the Power of Internet • http://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-solutions.pdf • A Simple Explanation Of 'The Internet Of Things' – Forbes • http://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can- understand/#793c56ca6828 • The Internet of Things (IoT) Starts with Intel Inside® • http://www.intel.com/content/www/us/en/internet-of-things/overview.html BIBLIOGRAPHY