scholarly journals Structure proposed to deal with sensor-based data

2021 ◽  
Vol 40 (1) ◽  
Author(s):  
Leandro Colevati dos Santos ◽  
Sebastião Gomes dos Santos Filho ◽  
Maria Lucia Pereira da Silva

The possibility of greater control over processes, with the increasing use of sensors, leads to the generation of a large amount of data and, consequently, inherent difficulties, also need care. Storage, processing, filtering, become more difficult and the use of cloud computing can be a solution, however, the cloud computing technology also has limitations regarding latency and availability that can be mitigated with the use of an intermediate layer, called fog computing. As the structuring of the fog computing layer is not yet standardized, one of the possibilities is the application of an enterprise service bus (ESB), a structure based on the availability and interconnection of targeted services, for processing, filtering or storage. From an ESB structure such as fog computing, proofs of concept were developed to validate the technology, the first proof of concept being an environment, whose temperature must be controlled, with distributed sensors and their values received, processed and stored by services in the ESB and the second proof of concept, based on soil contaminant data, obtained by sensors and made available in the literature, for which filtering and processing services, on the same bus, were used. The study presents, in its results, the applicability of the fog computing layer, minimizing the limitations of cloud computing.

2020 ◽  
Vol 19 ◽  

Fog computing is a promising technology that is used by many organizations and end-users. It has characteristics and advantages that offer services such as computing, storage, communication, and application services. It facilitates these services to end-users and allows to increase the number of devices that can connect to the network. In this paper, we provide a survey of Fog computing technology in terms of its architecture, features, advantages and disadvantages. We provide a comparison of this model with Cloud Computing, Mobile-Edge Computing, and Cloudlet Computing. We also present challenges and issues that face Fog Computing such as privacy and security, control and management, fog networking and task scheduling. Finally, we discuss aspects of Fog computing security and the benefits of integration between Fog computing and other techniques like Internet of Things and Cloud Computing.


Author(s):  
Arumugam So Raman

This paper is documenting the potential of Fog Computing in Education. First, this study explores the difference between cloud computing and Fog Computing. Then the features of computing explained briefly. A tremendous increase in Internet usage among the people does not allow the sustainability to continue depending on Cloud Computing as a centralized web server, due to the truth that Cloud Computing system allows access to internet data as well as therefore making it feasible for users to availability, share along with store information in remote servers. With Fog Computing, multiple users, gadgets such as automobiles, wearable gizmos, sensing units, wise gadgets, an organization can accept one another utilizing their very own Fog facilities. In the educational sector, Fog computing technology boosts educational operations and provides a platform with agility, versus slowing them down or quitting them. Fog computing is a modern technology that is set for high development in the future, as well as will substantially improve day-to-day procedures for many sectors, including education. Finally, security issues and challenges of implementation Fog computing discussed.


10.29007/nc47 ◽  
2018 ◽  
Author(s):  
Manu Sharma

In the world of Digital Innovation “Cloud Computing” is not just a word or a technology but a paramount to the organizations now days. Because it is not easy to store, compute the data on an internet and central remote server to manage a huge bulk of data and information. It is well known that cloud computing provides data, storage of data, computation of data to the end user also by providing the services to the end users by the different applications. So, now the Fog Computing Is generally a concept to extend the cloud computing technology as it also does the same function which cloud computing functionality as well. It is not the replacement but the enhanced version of cloud which provides a security on the cloud environment by isolating user’s data which is saved on the Edge Devices. Fog Computing enables a user to save their data to nearby devices. In this paper the security issues also the technology which is used for security in this enhanced concept of cloud is mentioned.


Fog computing is one of the most latest technology used by the cloud providers to safe guard the user data and service provider’s data servers. Fog computing acts as mediator between hardware and remote servers or cloud servers. Cloud computing still has the lot of vulnerabilities. Privacy to the users data is main issue in the present cloud computing. Whenever users uploads data into cloud server then user will lose their right on their own data because users don’t know about, what cloud providers do with users data, they can sell the users data for their own profit without knowing to users. Fog computing provides lot of services like operation of computer, storage and networking services between users and cloud computing data centers. With the networking services users can lose their data privacy or leakage without knowing to user. Because public clouds are not secure enough and users doesn’t know where data is storing in cloud servers. Breaking the data into small parts can lead to loss of data and which it can create way to attackers to steal data. Even data might be changed instated of one data with another. Intelligence can be applied in the fog computing technology to use of computing resources and security reasons. Applying multiple layers of security features by using kubernets can improve better service to user and user’s data can be safe from the attackers. Whenever user lost connection with the server kubernets establishes reconnection between user and server. RSA256 encryption is applied to users data with this we can provide better security between cloud server and users.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2122 ◽  
Author(s):  
Guangshun Li ◽  
Yuncui Liu ◽  
Junhua Wu ◽  
Dandan Lin ◽  
Shuaishuai Zhao

Cloud computing technology is widely used at present. However, cloud computing servers are far from terminal users, which may lead to high service request delays and low user satisfaction. As a new computing architecture, fog computing is an extension of cloud computing that can effectively solve the aforementioned problems. Resource scheduling is one of the key technologies in fog computing. We propose a resource scheduling method for fog computing in this paper. First, we standardize and normalize the resource attributes. Second, we combine the methods of fuzzy clustering with particle swarm optimization to divide the resources, and the scale of the resource search is reduced. Finally, we propose a new resource scheduling algorithm based on optimized fuzzy clustering. The experimental results show that our method can improve user satisfaction and the efficiency of resource scheduling.


The inventions in the field of Cloud computing with mobile devices, cloudlets, Edge computing are sizzling growth of IoT(Internet of Things) devices. The cloud computing technology has its limitation in various attributes such as bandwidth, latency, location awareness, resource constraints etc. In order to overcome these issues, the edge computing, which is known as manipulating the data at the edge of the network. In order to support various integrated features with IoT such as storage, networking, home energy management, augment reality fog computing provides resource access to the network edge of the user. In the user side it is confronted with serious security issues for data security. This article provides the augmentation and orchestration of security issues in fog computing. In this paper, first we check the architecture of fog computing. Then we suggest broad taxonomy of fog architecture with various architectures. Finally, this paper is concluded with scope and future research in fog computing


Author(s):  
Priyanshu Srivastava ◽  
Rizwan Khan

Today is the era of Cloud Computing Technology in IT Industries. Cloud computing which is based on Internet has the most powerful architecture of computation. It reckons in of a compilation of integrated and networked hardware, software and internet infrastructure. It has various avails atop grid computing and other computing. In this paper, I have given a brief of evaluation of cloud computing by reviewing more than 30 articles on cloud computing. The outcome of this review signalizes the face of the IT industries before and after the cloud computing.


2019 ◽  
pp. 1-4
Author(s):  
C. T. Kantharaja

Cloud computing technology has signicant role in academic libraries. Most of the library services are available on cloud platform and library software vendors developed their Library Management Software on cloud platform. It is the right time for library professionals to upgrade their technical skills to provide good services to the library stakeholders. This study shows the library services and facilities available on cloud. It is the right time to migrate to cloud


Sign in / Sign up

Export Citation Format

Share Document