scholarly journals Features, Challenges and Issues of Fog Computing: A Comprehensive Study

Fog computing is one of the most important technologies and promising computing model used by many end-users, organizations, and companies. This model has many qualities, characteristics, advantages and offers many services to end-users like compute, and application services. So, it facilitates the services that provided it to the end-users and allows us to increase the number of devices that connect the network. In this research paper, we survey the Fog technology in terms of the architecture and the primary features (i.e. advantages, and disadvantages). Then, we compare this model with Cloud computing, Mobile-Edge Computing, and Cloudlet Computing. Also, this paper is constructed by illustrating the importance of several challenges and issues that facing Fog computing like "privacy and security: issues and solutions", control and management issues, fog networking and task scheduling. Finally, we mention the six aspects of fog computing security and the benefits of merging between Fog computing and other techniques like “Internet of Things and Cloud”. This paper will contribute to providing the researchers who want to study the Fog computing in terms of aspects that previously mentioned.

2020 ◽  
Vol 19 ◽  

Fog computing is a promising technology that is used by many organizations and end-users. It has characteristics and advantages that offer services such as computing, storage, communication, and application services. It facilitates these services to end-users and allows to increase the number of devices that can connect to the network. In this paper, we provide a survey of Fog computing technology in terms of its architecture, features, advantages and disadvantages. We provide a comparison of this model with Cloud Computing, Mobile-Edge Computing, and Cloudlet Computing. We also present challenges and issues that face Fog Computing such as privacy and security, control and management, fog networking and task scheduling. Finally, we discuss aspects of Fog computing security and the benefits of integration between Fog computing and other techniques like Internet of Things and Cloud Computing.


Internet-of-Things (IoT) has been considered as a fundamental part of our day by day existence with billions of IoT devices gathering information remotely and can interoperate within the current Internet framework. Fog computing is nothing but cloud computing to the extreme of network security. It provides computation and storage services via CSP (Cloud Service Provider) to end devices in the Internet of Things (IoT). Fog computing allows the data storing and processing any nearby network devices or nearby cloud endpoint continuum. Using fog computing, the designer can reduce the computation architecture of the IoT devices. Unfortunitily, this new paradigm IoT-Fog faces numerous new privacy and security issues, like authentication and authorization, secure communication, information confidentiality. Despite the fact that the customary cloud-based platform can even utilize heavyweight cryptosystem to upgrade security, it can't be performed on fog devices drectly due to reseource constraints. Additionally, a huge number of smart fog devices are fiercely disseminated and situated in various zones, which expands the danger of being undermined by some pernicious gatherings. Trait Based Encryption (ABE) is an open key encryption conspire that enables clients to scramble and unscramble messages dependent on client qualities, which ensures information classification and hearty information get to control. Be that as it may, its computational expense for encryption and unscrambling stage is straightforwardly corresponding to the multifaceted nature of the arrangements utilized. The points is to assess the planning, CPU burden, and memory burden, and system estimations all through each phase of the cloud-to-things continuum amid an analysis for deciding highlights from a finger tapping exercise for Parkinson's Disease patients. It will be appeared there are confinements to the proposed testbeds when endeavoring to deal with upwards of 35 customers at the same time. These discoveries lead us to a proper conveyance of handling the leaves the Intel NUC as the most suitable fog gadget. While the Intel Edison and Raspberry Pi locate a superior balance at in the edge layer, crossing over correspondence conventions and keeping up a self-mending network topology for "thing" devices in the individual territory organize.


Author(s):  
Bhumika Paharia ◽  
Kriti Bhushan

Fog computing is an extension to cloud computing that inhibits its limitations and enhances its amenities. Being similar to cloud computing, it has some more fascinating features that escalate the overall performance of the system. It faces many new disputes besides those already inherited from cloud computing. Fog computing is actually a paradigm that provides services at the network's edge as it serves the end-users with data, applications, storing, and computing capabilities. Fog computing is a new breed in services and applications to the end-users by enabling the above features, hence making its security and privacy aspects much more challenging then the cloud computing. Further, in this chapter, the basic concepts of fog computing are discussed with its applications as a high lighting feature. In addition, discussion about the attacks that could setback the advantages of fog computing and some defense mechanisms to overcome the effects of these attack have been discussed, giving a comprehensive study of fog computing.


2020 ◽  
Vol 8 (5) ◽  
pp. 1732-1736

In today’s world, cloud computing is the most exciting and advanced technology. It came into existence with lots of advantages, but cloud-only computing has some disadvantages also like latency in real-time data processing, network congestion, less bandwidth utilization, fault tolerance, and security issues in public cloud. To address the issue of real-time data-processing and security in public cloud new computing model are used which is known as Fog Computing. It is nearer to the client or edge so that it can reduce the latency in real time data-processing and security in public cloud using techniques like user profiling and decoying technique. Fog Computing help us to overcome the latency and security issues of cloud computing. It reduces cloud latency in real time data-processing because fog computing model is nearer to the edge devices. It also improves cloud security in the public cloud.


2011 ◽  
Vol 264-265 ◽  
pp. 777-782 ◽  
Author(s):  
M.A. Maleque ◽  
M.S. Hossain ◽  
S. Dyuti

successful design of folding bicycle should take into account the function, material properties, and fabrication process. There are some other factors that should be considered in anticipating the behavior of materials for folding bicycle. In order to understand the relationship between material properties and design of a folding bicycle and also for the future direction in new materials with new design, a comprehensive study on the design under different conditions are essential. Therefore, a systematic study on the relationship between material properties and design for folding bicycle has been performed. The advantages and disadvantages matrix between conventional bicycle and folding bicycle is presented for better understanding of the materials properties and design. It was found that the materials properties of the folding bicycle frame such as fatigue and tensile strength are the important properties for the better performance of the frame. The relationship between materials properties and design is not straight forward because the behavior of the material in the finished product could be different from that of the raw material. The swing hinge technique could be a better technique in the design for the folding bicycle frame.


2020 ◽  
pp. 16-30
Author(s):  
Mukesh Soni ◽  
◽  
◽  
◽  
YashKumar Barot ◽  
...  

Health care information has great potential for improving the health care system and also providing fast and accurate outcomes for patients, predicting disease outbreaks, gaining valuable information for prediction in future, preventing such diseases, reducing healthcare costs, and improving overall health. In any case, deciding the genuine utilization of information while saving the patient's identity protection is an overwhelming task. Regardless of the amount of medical data it can help advance clinical science and it is essential to the accomplishment of all medicinal services associations, at the end information security is vital. To guarantee safe and solid information security and cloud-based conditions, It is critical to consider the constraints of existing arrangements and systems for the social insurance of information security and assurance. Here we talk about the security and privacy challenges of high-quality important data as it is used mainly by the healthcare structure and similar industry to examine how privacy and security issues occur when there is a large amount of healthcare information to protect from all possible threats. We will discuss ways that these can be addressed. The main focus will be on recently analyzed and optimized methods based on anonymity and encryption, and we will compare their strengths and limitations, and this chapter closes at last the privacy and security recommendations for best practices for privacy of preprocessing healthcare data.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Faisal Ali ◽  
Muhammad Hamza ◽  
Munawar Iqbal ◽  
Beriham Basha ◽  
Norah Alwadai ◽  
...  

Abstract To date, the noble metal-based nanoparticles have been used in every field of life. The Au and Ag nanoparticles (NPs) have been fabricated employing different techniques to tune the properties. In this study, the methodologies developed and adopted for the fabrication of Au and Ag have been discussed, which include physical, chemical and biological routes. The Au and Ag characteristics (morphology, size, shape) along with advantages and disadvantages are discussed. The Au and Ag NPs catalytic and biomedical applications are discussed. For the Ag and Au NPs characterization, SEM (scanning electron microscope), TEM (transmission electron microscope), FTIR (Fourier transform infra-red spectroscopy), XRD (X-rays diffraction) and DLS (dynamic light scattering) techniques are employed. The properties of Au and Ag NPs found dependent to synthesis approach, i.e., the size, shape and morphologies, which showed a promising Catalytic, drug delivery and antimicrobial agent applications. The review is a comprehensive study for the comparison of Au and Ag NPs synthesis, properties and applications in different fields.


Sign in / Sign up

Export Citation Format

Share Document