logo-foot
Spinner-1s-200px

Intelligent Iot Will Drive Fog Computing Growth

22 février 2022

Google and Facebook are among several companies looking into establishing alternate means of internet access, such as balloons and drones to avoid network bottleneck. But smaller organizations could be able to create a fog out of whatever devices are currently around to establish closer and quicker connections to compute resources. Fog computing tackles an important problem in cloud computing, namely, reducing the need for bandwidth by not sending every bit of information over cloud channels, and instead aggregating it at certain access points. More interestingly, it’s one approach to dealing with the emerging concept of Internet of Things . Moreover, fog computing doesn’t exactly spell the end for the normalized IoT networks that are based in the cloud. Centralized data is almost always more easily available, in turn offering the private and public sectors more ways to establish open data agreements.

  • A MITM attack can be launched by a malicious internal user and can exploit the Fog platform by sniffing, hijacking, injecting and filtering data incoming from the end-user .
  • IoT devices and applications are organized at an overwhelming rate from a countless of global endpoints.
  • Such behaviour profiling techniques are often performed in a traditional client-server architecture where computation resources are freely available.
  • Real-time monitoring and discovery of irregularities carry strict low latency requirements on surveillance systems.
  • Fog and cloud computing operate together to generate IT solutions (e.g., increase network connectivity, processor capacity, security management, and analytics platforms).
  • Eliminates the core computing environment, thereby reducing a major block and a point of failure.

Even though it is mostly used for efficiency reasons, it can also be used for security and compliance reasons. Fog computing extends the concept of cloud computing to the network edge, making it ideal for internet of things and other applications that require real-time interactions. All that is needed is a simple solution to train models and send them to highly optimized and low resource intensive execution engines that can be easily embedded in devices, mobile phones and smart hubs/gateways.

Ii System Architecture

Fog platforms should implement multi-factor authentication mechanisms based on either the role or identity of end-users, logically segregate data and resources and aggressively analyse the activities of both administrator and tenants. Another system called Secure and Resilient Networking service can provide a Fog platform with programmable environment to adjust it’s topology, bandwidth allocation, and traffic policies . Furthermore, as many devices are connected, Fog system should be able to fairly allocate compute resources among users meanwhile preventing virtualization-based attacks to keep the infrastructure available. Mobile applications have become an integral part of modern life and their intensive use has led to an exponential growth in the consumption of mobile data, and hence the requirement for 5G mobile networks. Fog computing can not only provide a 5G network with better service quality, but they can also help in predicting the future need of mobile users .

It brings intelligence and processing closer to where the data is created and transmitted to other sources. The use of automated guided vehicles on industrial shop floors provide an excellent scenario that explains how fog computing functions. In this scenario, a real-time geolocation application using MQTT will provide the edge compute needed to track the AGVs movement across the shop floor. Intel estimates that the average automated vehicle produces approximately 40TB of data every 8 hours it is used. In this case, fog computing infrastructure is generally provisioned to use only the data relevant for specific processes or tasks.

Due to the increased demand of IoT devices the processing is not afforded at the IoT tier, hence processing is done at the fog tier and cloud. However, it is only a matter of time before everything is connected to everything, thus conceiving an intelligent society where more and better methodologies will be required to manage information. You have IoT-based systems with geographically dispersed end devices generating data in the order of terabytes, and where connectivity to the cloud is irregular or not feasible. Using the proper set of resources, programmers can seamlessly create fog programs and deploy them every time required.

Cloud computing is a critical component of the Internet of Things architecture. Data collected from the sensors and devices is transferred to a platform in the cloud. It is then aggregated, normalized, and processed according to pre-defined rules, and acted upon.

Further improvements for the Fog platform are backup and recovery procedures for SSD-assisted database systems and VM images as a whole. For mobile and wireless Fog platforms, the situation might get challenging as the system would require portable and on-site backup storage or will need a significant amount of network bandwidth to transmit data to the off-site location. Based on the current state of authentication in Fog platform, Fog platforms are missing rigorous authentication and secure communication protocols as per their specification and requirements. In a Fog platform both security and performance factors are considered in conjunction, and mechanisms such as the encryption methodologies known as fully homomorphic and Fan-Vercauteren somewhat homomorphic can be used to secure the data. These schemes consists of a hybrid of symmetric and public-key encryption algorithms, as well as other variants of attribute-based encryption. As homomorphic encryption permits normal operations without decrypting the data, the reduction in key distribution will maintain the privacy of data.

Note that the Fog servers at different locations can be deployed by separate operators and owners, and form a collaborative Fog computing system in the wide region. For example, describes a distributed vehicular Fog computing system where Fog servers in a city are deployed by separate entities for their own commercial usage. The Fog servers deployed by different owners work in a fully distributed manner, and are formed as an integrated content distribution network for disseminating media contents to vehicles across the city. In the example of , the content files to distribute is uploaded to the Fog servers by their owners using local wireless connections. To summarize, the Fog computing is to deploy the virtualized cloud-like device more close to mobile users, and therefore the Fog is interpreted as “the cloud close to the ground” .

With the high growth of Internet, users are generating their own data on Facebook and Twitter, and these data become larger than older one. Now there has become a third level of this progression because now machines are accumulating data in the building of all over the cities with fully implanted sensors that are monitoring humidity, temperature, and electricity usage with smart meters. On the other hand the satellite around the earth is monitoring the earth 24 hours a day with taking pictures and accumulating data.

Words Near Fog

The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems. The hierarchical features of fog computing indicate some key issues of accessible huge number of IoTs by frontage fog devices. Security solutions that were planned for CC would not be directly applicable in fog structure. Working environment of fog computing may face security problems that do not exist in a usual cloud working structure. Authentication based on different gateways is identified as a major security issue of fog services .

The OPC server converts the raw data into a protocol that can be more easily understood by web-based services such as HTTP or MQTT . The MQTT protocol is particularly designed for connections with remote locations where network bandwidth is limited. Data can be transferred from the place it is created to different places using fog computing deployments.

Fog Computing examples

Popular fog computing applications include smart grids, smart cities, smart buildings, vehicle networks and software-defined networks. The major concern anyone should have about any technology or application before adoption should be data https://globalcloudteam.com/ security. Since fog computing is decentralized, you will need to rely on the people near your network edge to maintain and protect your fog nodes. It will also be difficult to maintain any centralized security control over your fog nodes.

In most cases, the Internet of things gathers data and sends it to a company’s cloud for processing or analysis. Fog computing’s purpose is to allow that data to be processed locally , reducing the backhaul that takes the data to the internet. In the case of the Tesla crash scenario, fog computing enabled the car to make a split-second decision by processing the data of the deer at the edge of the cloud. Avoiding the collision would not have been possible if the data had to be transferred to the cloud itself and back again. Because the initial data processing occurs near the data, latency is reduced, and overall responsiveness is improved. The goal is to provide millisecond-level responsiveness, enabling data to be processed in near-real time.

Therefore, the key design issue of Fog computing is to predict the user’s demand and proactively select the contents to cache in the geo-distributed Fog servers based on the specific locations. The major difference between cloud computing and Fog computing is on the support of location awareness. The cloud computing locates in a centralized Fog Computing vs Cloud Computing place and serves as a centralized global portal of information; cloud computing is often lack of location awareness. The Fog computing extends cloud to reside at user’s premises and dedicates on localized service applications. The Fog computing system can be deployed in a senary park to provide localized tourism services.

Technology And Self

Recently an accomplished computing and network framework to manage tremendously large amounts of big IoT data generated by end users or devices is described . Fog computing is a framework which is an appreciative extension of the prenetworking system and cloud services. Fog and cloud computing operate together to generate IT solutions (e.g., increase network connectivity, processor capacity, security management, and analytics platforms).

Fog computing, edge computing, cloud computing, big data analytics, and machine learning enhance data gathering and processing of data and use it to improve operations. If a user with a hand-held device wants to review the latest CCTV footage from a locally positioned IoT security camera, he would need to request the stream from the cloud since the camera does not have storage. This could take a bit of time, which can be eliminated with fog computing, where a local fog node can be accessed for video streaming which is far quicker. Fog Computing is the term coined by Cisco that refers to extending cloud computing to an edge of the enterprise’s network. It facilitates the operation of computing, storage, and networking services between end devices and computing data centers.

Smart cities, which are secure and aware of their citizens’ requirements, need to cater to an intelligent waste management solution. Here a smart waste management solution is applied by the city council that may use sensor data and improvises on garbage collection strategies. Smart cities are urban factions that use electronic devices and collect the population’s data that may or may not reside there. Water is an essential component in the agriculture industry, and it uses 70 % of freshwater, making it the most significant consumer. Often, there is a wastage of the resource due to leakages in distribution and irrigation systems and the field application methods. Signals are wired from IoT devices to an automation controller which executes a control system program to automate those devices.

Cloud Data Protection Explained

Abuse and Nefarious Use often arises when resources are made available for free and malicious users utilise said resources to undertake malicious activity. Insecure APIs Many Cloud/Fog providers expose Application Programming Interfaces for customer use. The security of these APIs is pivotal to the security of any implemented applications. Denial of Service are where legitimate users are prevented from using a system by overwhelming a system’s finite resources. Access Control Issues can result in poor management and any unauthorised user being able to acquire data and permissions to install software and change configurations. Advance Persistent Threats are cyber attacks whereby the aim is to compromise a company’s infrastructure with the desire to steal data and intellectual property.

In fog computing the aim is to bring the data analysis and so forth as close as possible to the data source but in this case to fog nodes, fog aggregation nodes or, when decided so by the fog application, to the cloud. Fog computing and edge computing are both about processing data closer to the source—a significant difference between both concerns the place where processing occurs. As fog computing is an extension of cloud computing to where data is created, it is located between the data center and the end equipment. Fog computing performs better than cloud computing in meeting the demands of the emerging paradigms.

Top 6 Cloud Computing Online Courses To Supercharge Your Career In 2022

Malware-based attacks can potentially corrupt and damage the CIA of data and communication. Additionally, smart connecting vehicles could be synchronized to sense large scale data efficiently. Such direction requires massive computing, power, and communication resources.

The Openfog Consortium And Openfog Reference Architecture

They are intended to support resource-intensive IoT apps that require low latency. The considerable processing power of edge nodes allows them to compute large amounts of data without sending them to distant servers. Fog computing analyzes the most time-sensitive data and operates on the data in less than a second, whereas cloud computing does not provide round-the-clock technical support. The biggest markets are transportation, industrial, energy/utilities and healthcare. Cloud revenue is expected to go up by 147 percent by 2022 and fog is expected to go into existing devices and software, working with new single-purpose fog nodes. The actions which are taken based upon the analysis of data in a fog node, if that’s where the fog application sent the data from the IoT sensors or IoT end devices to, can also take many shapes.

Present several works focused on facial recognition, where it was proved that the transmission time is five times longer in cloud computing than edge computing. Also, it decreases the response time, another necessary feature for edge computing is low power consumption, where different alternatives have been proposed. Moreover, it helps in reducing the cost of additional bandwidths by discharging gigabytes of the network from the prime network. In addition, it can protect the sensitive Internet of Things data by evaluating it inside the company.

Surveillance Video Stream Processing

Take an example of tracking multiple targets in a drone video stream as stated in . Instead of sending live video feeds to a Cloud-based application, it is directed towards the nearest Fog node. Any mobile device such as tablets, smart-phones and laptop can become Fog node, run tracking algorithms and process raw video stream frames, hence removing the latency of transmitting data from the surveillance area to the Cloud.

As a result, we’re enjoying improved living standards, using super-fast gadgets, and making better business decisions using data analytics. On the other hand, fog computing shifts computing tasks to an IoT gateway or fog nodes that are located in the LAN network. Fog computing, then, is a bridge that connects a company’s cloud of information to the edge of its network. In essence, fog computing allows an organization to extend its cloud to the things using the data live.

Processes on nodes between devices and Cloud are intermediate nodes (routers, servers, etc.). Fog computing seems to be more appealing to data processing companies and service providers, while edge computing is popular with middle-ware and telecom companies that work with backbone and radio networks. Nonetheless, both fog and edge computing are designed to deal with one key problem—latency and response time.