SlideShare a Scribd company logo
1 of 22
Jain College of Engineering
T.S Nagar, Machhe, Belagavi-590014
Seminar on
“FOG COMPUTING”
Submitted By
MAHANTESH HIREMATH
(2JI13CS024)
Under the Guidance of
PROF. VIJAYALAXMI S. NAGANUR
Department of Computer science and Engineering
2016-2017
FOG COMPUTING
CONTENTS:
 Introduction.
 Existing System.
 Proposed System.
 Securing Clouds With Fog
 Security Issues.
 Example.
 Privacy Issues.
 Conclusion.
 References.
What Is FOG Computing.
 Fog Computing is a technology that extends cloud computing and services
to the edge of the network.
 It provides data, compute, storage and application services to the users like
cloud.
 Fog computing is an emerging technology that is basically used for Internet
of Things.
Fog
Cloud
Locations
Edge
Core
Simple Three Level Hierarchy
A simple three level hierarchy as shown in above Figure.
 In this framework, each smart thing is attached to one of Fog devices.
Fog devices could be interconnected and each of them is linked to the
Cloud.
 As Fog computing is implemented at the edge of the network, it
provides low latency, location awareness, and improves quality-of-
services (QoS) for streaming and real time applications.
EXISTING SYSTEM
 Cloud computing has provided many opportunities for enterprises by
offering their customers a range of computing services. Current “pay-as-
you-go” Cloud computing model becomes an efficient alternative to owning
and managing private data centers for customers facing Web applications
DISADVANTAGES
 Existing data protection mechanisms such as encryption was failed in
securing the data from the attackers.
 It does not verify whether the user was authorized or not.
 Cloud computing security does not focus on ways of secure the data from
unauthorized access.
PROPOSED SYSTEM
 Unlike traditional data centers, Fog
devices are geographically
distributed over heterogeneous
platforms, spanning multiple
management domains. Cisco is
interested in innovative proposals
that facilitate service mobility across
platforms, and technologies that
preserve end-user and content
security and privacy across domains.
ADVANTAGES
 Fog can be distinguished from Cloud by its proximity to end-users.
 The dense geographical distribution and its support for mobility.
 It provides low latency, location awareness, and improves quality-of-
services (QoS) and real time applications.
SECURING CLOUDS WITH FOG
User behavior profiling
• User profiling is a well-known technique that can be applied here to model
how, when, and how much a user accesses their information in the Cloud.
• Simple user specific features can serve to detect abnormal Cloud access based
partially upon the scale and scope of data transferred.
• Behaviour based security: a ‘normal user’ behaviour can be continuously
checked to determine whether abnormal access to a user’s information is
occurring.
Ex: Fraud detection applications.
Decoy system
 Decoy data, such as decoy documents, honey
pots and other bogus information can be
generated on demand and used for detecting
unauthorized access to information and to
poison the thief’s ex-filtrated information.
 Serving decoys will confuse an attacker into
believing they have ex-filtrated useful
information, when they have actually not.
Fog computing architecture
ADMIN
ADMIN
OPERATIONS
ANSWER TO
QUESTIONS
LOGIN
USER
LOGIN
SIGN UP
ANSWER TO
QUESTIONS
ENTER
USERNAME
ENTER
PASSWORD
VIEW MY
FILES
SEND
MAIL
DOWNLOAD
FILES
UPLOAD
FILES
ORIGINAL
DOCUMENT
DECOY
DOCUMENT
FOG COMPUTING
APPLICATIONS OF FOG
• Connected cars: Fog computing is ideal for Connected Vehicles (CV)
because real-time interactions will make communications between cars,
access points and traffic lights as safe and efficient as possible
• Smart grids: Fog computing allows fast, machine-to-machine (M2M)
handshakes and human to machine interactions (HMI), which would work
in cooperation with the cloud
Fig. Fog computing in smart grid
SECURITY ISSUES
The main security issues are authentication at different
levels of gateways as well as (in case of smart grids) at the smart meters
installed in the consumer’s home. Each smart meter and smart appliance
has an IP address. A malicious user can either tamper with its own smart
meter, report false readings, or spoof IP addresses.
EXAMPLE : MAN-IN –MIDDLE-ATTACK
In this subsection, we take man- in-the-middle attack as
an example to expose the security problems in Fog computing. In this
attack, gateways serving as Fog devices may be compromised or replaced by
fake ones .
PRIVACY ISSUES
In smart grids, privacy issues deal with hiding details, such as what
appliance was used at what time, while allowing correct summary
information for accurate charging.
CONCLUSION
With the increase of data theft attacks the security of user data is becoming
a serious issue for cloud service providers for which Fog Computing is a
paradigm which helps in monitoring the behavior of the user and providing
security to the user’s data. By using decoy technique in Fog can minimize
insider attacks in cloud. Fog provides unprecedented levels of security in the
Cloud and in social networks. The usage of fog computing can accelerate
the innovation process in ways that has never been seen before.
REFERENCES
[1] F. Bonomi, “Connected vehicles, the internet of things, and fog com-
puting,” in The Eighth ACM International Workshop on Vehicular Inter-
Networking (VANET), Las Vegas, USA, 2011.
[2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its
role in the internet of things,” in Proceedings of the First Edition of the MCC
Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16.
Thank You

More Related Content

What's hot

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Iot ppt
Iot pptIot ppt
Iot ppt
piyuu7
 

What's hot (20)

Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Rain technology
Rain technologyRain technology
Rain technology
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
I twin technology
I twin technologyI twin technology
I twin technology
 
Fog computing
Fog computingFog computing
Fog computing
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology ppt
 
Edge computing
Edge computingEdge computing
Edge computing
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Cloud Computing and Data Centers
Cloud Computing and Data CentersCloud Computing and Data Centers
Cloud Computing and Data Centers
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 

Viewers also liked

Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
Thesis Scientist Private Limited
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 

Viewers also liked (18)

Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Fog computing
Fog computingFog computing
Fog computing
 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similar to Seminar ppt fog comp

Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
IJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
IJCNCJournal
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
 

Similar to Seminar ppt fog comp (20)

seminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxseminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptx
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
Fog computing
Fog computing Fog computing
Fog computing
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
76 s201913
76 s20191376 s201913
76 s201913
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Seminar ppt fog comp

  • 1. Jain College of Engineering T.S Nagar, Machhe, Belagavi-590014 Seminar on “FOG COMPUTING” Submitted By MAHANTESH HIREMATH (2JI13CS024) Under the Guidance of PROF. VIJAYALAXMI S. NAGANUR Department of Computer science and Engineering 2016-2017
  • 3. CONTENTS:  Introduction.  Existing System.  Proposed System.  Securing Clouds With Fog  Security Issues.  Example.  Privacy Issues.  Conclusion.  References.
  • 4. What Is FOG Computing.  Fog Computing is a technology that extends cloud computing and services to the edge of the network.  It provides data, compute, storage and application services to the users like cloud.  Fog computing is an emerging technology that is basically used for Internet of Things.
  • 6. A simple three level hierarchy as shown in above Figure.  In this framework, each smart thing is attached to one of Fog devices. Fog devices could be interconnected and each of them is linked to the Cloud.  As Fog computing is implemented at the edge of the network, it provides low latency, location awareness, and improves quality-of- services (QoS) for streaming and real time applications.
  • 7. EXISTING SYSTEM  Cloud computing has provided many opportunities for enterprises by offering their customers a range of computing services. Current “pay-as- you-go” Cloud computing model becomes an efficient alternative to owning and managing private data centers for customers facing Web applications
  • 8. DISADVANTAGES  Existing data protection mechanisms such as encryption was failed in securing the data from the attackers.  It does not verify whether the user was authorized or not.  Cloud computing security does not focus on ways of secure the data from unauthorized access.
  • 9. PROPOSED SYSTEM  Unlike traditional data centers, Fog devices are geographically distributed over heterogeneous platforms, spanning multiple management domains. Cisco is interested in innovative proposals that facilitate service mobility across platforms, and technologies that preserve end-user and content security and privacy across domains.
  • 10. ADVANTAGES  Fog can be distinguished from Cloud by its proximity to end-users.  The dense geographical distribution and its support for mobility.  It provides low latency, location awareness, and improves quality-of- services (QoS) and real time applications.
  • 12. User behavior profiling • User profiling is a well-known technique that can be applied here to model how, when, and how much a user accesses their information in the Cloud. • Simple user specific features can serve to detect abnormal Cloud access based partially upon the scale and scope of data transferred. • Behaviour based security: a ‘normal user’ behaviour can be continuously checked to determine whether abnormal access to a user’s information is occurring. Ex: Fraud detection applications.
  • 13. Decoy system  Decoy data, such as decoy documents, honey pots and other bogus information can be generated on demand and used for detecting unauthorized access to information and to poison the thief’s ex-filtrated information.  Serving decoys will confuse an attacker into believing they have ex-filtrated useful information, when they have actually not.
  • 14. Fog computing architecture ADMIN ADMIN OPERATIONS ANSWER TO QUESTIONS LOGIN USER LOGIN SIGN UP ANSWER TO QUESTIONS ENTER USERNAME ENTER PASSWORD VIEW MY FILES SEND MAIL DOWNLOAD FILES UPLOAD FILES ORIGINAL DOCUMENT DECOY DOCUMENT FOG COMPUTING
  • 15. APPLICATIONS OF FOG • Connected cars: Fog computing is ideal for Connected Vehicles (CV) because real-time interactions will make communications between cars, access points and traffic lights as safe and efficient as possible
  • 16. • Smart grids: Fog computing allows fast, machine-to-machine (M2M) handshakes and human to machine interactions (HMI), which would work in cooperation with the cloud Fig. Fog computing in smart grid
  • 17. SECURITY ISSUES The main security issues are authentication at different levels of gateways as well as (in case of smart grids) at the smart meters installed in the consumer’s home. Each smart meter and smart appliance has an IP address. A malicious user can either tamper with its own smart meter, report false readings, or spoof IP addresses.
  • 18. EXAMPLE : MAN-IN –MIDDLE-ATTACK In this subsection, we take man- in-the-middle attack as an example to expose the security problems in Fog computing. In this attack, gateways serving as Fog devices may be compromised or replaced by fake ones .
  • 19. PRIVACY ISSUES In smart grids, privacy issues deal with hiding details, such as what appliance was used at what time, while allowing correct summary information for accurate charging.
  • 20. CONCLUSION With the increase of data theft attacks the security of user data is becoming a serious issue for cloud service providers for which Fog Computing is a paradigm which helps in monitoring the behavior of the user and providing security to the user’s data. By using decoy technique in Fog can minimize insider attacks in cloud. Fog provides unprecedented levels of security in the Cloud and in social networks. The usage of fog computing can accelerate the innovation process in ways that has never been seen before.
  • 21. REFERENCES [1] F. Bonomi, “Connected vehicles, the internet of things, and fog com- puting,” in The Eighth ACM International Workshop on Vehicular Inter- Networking (VANET), Las Vegas, USA, 2011. [2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16.