Abstract

Moving from cloud to fog: scenarios and security concerns

Highlights

  • The increased use of a “pay-as-you-go” cloud computing model has reduced the overall cost of users owning and managing private data centres

  • Fog computing termed edge-of-network has been recently introduced by CISCO with the vision to enable applications on billions of devices, already connected in the Internet of Things (IoT), to run directly at the network edge ( Bonomi et al,2011)

  • Fog computing has been proved very useful in many real time and near real time applications due to its features such as edge location, location awareness and low latency

Read more

Summary

INTRODUCTION

The increased use of a “pay-as-you-go” cloud computing model has reduced the overall cost of users owning and managing private data centres This has given rise to increasing user demand for computing, networking, and storage resources as well as the need for efficient management and access to highly virtualized resources. FC supports mobility, location awareness and latency sensitive services It enables computing directly at the edge of the network so that the data can be shared instantaneously between the physical devices. According to the CISCO estimate, the average of connected devices per person will reach 6.58 by 2020 (Luan et al, 2015) This prediction is demanding to improve and optimize the services provision by internet. With the process of increasing efficiency and capacity of network as well as cloud and fog computing, it is necessary to keep check and balance on the ever-increasing issues and problems like security, privacy, energy efficiency, resource management and environmental hazards

Fog Computing Overview
Mobile Computing Systems
Security Concerns In Fog Computing
Intrusion Detection system
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call