Abstract

Fog computing spreads the cloud administrations and services to the edge of the system, and brings processing, communications and reserving, and storage capacity closer to edge gadgets and end-clients and, in the process, aims at enhancing versatility, low latency, transfer speed and safety and protection. This article takes an extensive and wide-ranging view of fog computing, covering several aspects. At the outset is the many-layered structural design of fog computing and its attributes. After that, chief advances like communication and inter-exchange, computing, etc. are delineated, while showing how these backup and facilitate the installations and various applications. Following that, it is shown that how, despite fog computing being a feature-rich platform, it is dogged by its susceptibility to several security, privacy, and safety concerns, which stem from the nature of its widely distributed and open architecture. Finally, some suggestions are advanced to address some of the safety challenges discussed so as to propel the further growth of fog computing.

Highlights

  • The internet has revolutionized the computers, communication and communication technology like nothing has ever before

  • Fog computing is able to offer an array of different Internet of Things (IoT) related services in the area of Internet of Vehicles - services such as feedback on conditions prevailing in urban areas and on streets, entertaining related data, traffic security etc., emanating from the linking and communication between vehicle to vehicle and vehicle to access doors [50]

  • Fog computing is not deemed as a substitution for cloud computing

Read more

Summary

Introduction

The internet has revolutionized the computers, communication and communication technology like nothing has ever before. IoT implies an expansion of Internet through which physical objects are connected virtually, with the ability to provide smart services to its users This interaction between devices is slated to create gargantuan amounts and diversities of information and data. Fog computing serves to work as a connecting link between cloud and edge users This is accomplished by fog nodes by conjoining end appliances and devices and users through the use of wireless connection platforms like Wi-Fi, Bluetooth, 4G etc., to make available services such storage, computation and computing. This paper undertakes an extensive survey of fog computing It details various aspects of fog computing, including its design and architecture, main technologies involved, the applications where fog computing can be put to effective use and the security and trust issues and other challenges.

Architecture of Fog Computing
The Hierarchical Architecture of Fog Computing
Charesteristics of Fog Computing
Saving of Bandwidth
Support of Mobility
Low Latency and Real Time Interactions
Heterogeneous in Nature
Geographical Distribution and Decentralized Data Analytics
Data Security and Privacy Protection
Low Energy Consumption
Interoperability
Main Technologies Supporting Fog Computing
Computing Technologies
Latency Management
Computational Offloading
Communication Technologies
Software Define Networking
Storage Technologies
Security and Privacy Protection
Applications
Healthcare
Vehicular Fog Computing
Smart Energy Grid
Fog in IoT and Cloud of Things
Security Issues and Challenges in Fog Computing
Collusion Deception
Trust Middleware and Specimen
Area Based Trust
Assault
Malignant Nodes and their Assaults Assaults from malignant Fog nodes
Quality Encryption
Behaviour Profiling
Safe Communication
Privacy Safeguarding
Others
Conclusion
Findings
Cisco global cloud index
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call