Fog Computing

Fog Computing ◽  
2018 ◽  
pp. 198-207 ◽  
Author(s):  
Chintan M. Bhatt ◽  
C. K. Bhensdadia

The Internet of Things could be a recent computing paradigm, defined by networks of extremely connected things – sensors, actuators and good objects – communication across networks of homes, buildings, vehicles, and even individuals whereas cloud computing could be ready to keep up with current processing and machine demands. Fog computing provides architectural resolution to deal with some of these issues by providing a layer of intermediate nodes what's referred to as an edge network [26]. These edge nodes provide interoperability, real-time interaction, and if necessary, computational to the Cloud. This paper tries to analyse different fog computing functionalities, tools and technologies and research issues.

2017 ◽  
Vol 9 (4) ◽  
pp. 105-113 ◽  
Author(s):  
Chintan Bhatt ◽  
C. K. Bhensdadia

The Internet of Things could be a recent computing paradigm, defined by networks of extremely connected things – sensors, actuators and good objects – communication across networks of homes, buildings, vehicles, and even individuals whereas cloud computing could be ready to keep up with current processing and machine demands. Fog computing provides architectural resolution to deal with some of these issues by providing a layer of intermediate nodes what's referred to as an edge network [26]. These edge nodes provide interoperability, real-time interaction, and if necessary, computational to the Cloud. This paper tries to analyse different fog computing functionalities, tools and technologies and research issues.


Author(s):  
Ranjitha G. ◽  
Pankaj Lathar ◽  
G. M. Siddesh

Fog computing enhances cloud computing to be closer to the processes that act on IOT devices. Fogging was introduced to overcome the cloud computing paradigm which was not able to address some services, applications, and other limitations of cloud computing such as security aspects, bandwidth, and latency. Fog computing provides the direct correlation with the internet of things. IBM and CISCO are linking their concepts of internet of things with the help of fog computing. Application services are hosted on the network edge. It improves the efficiency and reduces the amount of data that is transferred to the cloud for analysis, storage, and processing. Developers write the fog application and deploy it to the access points. Several applications like smart cities, healthcare domain, pre-processing, and caching applications have to be deployed and managed properly.


2020 ◽  
Author(s):  
Tanweer Alam

<p>The fog computing is the emerging technology to compute, store, control and connecting smart devices with each other using cloud computing. The Internet of Things (IoT) is an architecture of uniquely identified interrelated physical things, these physical things are able to communicate with each other and can transmit and receive information. <a>This research presents a framework of the combination of the Internet of Things (IoT) and Fog computing. The blockchain is also the emerging technology that provides a hyper, distributed, public, authentic ledger to record the transactions. Blockchains technology is a secured technology that can be a boon for the next generation computing. The combination of fog, blockchains, and IoT creates a new opportunity in this area. In this research, the author presents a middleware framework based on the blockchain, fog, and IoT. The framework is implemented and tested. The results are found positive. </a></p>


2019 ◽  
pp. 1018-1049
Author(s):  
Marcus Tanque ◽  
Harry J. Foxwell

This chapter examines and explains cyber resilience, internet of things, software-defined networking, fog computing, cloud computing, and related areas. Organizations develop these technologies in tandem with cyber resilience best practices, such as processes and standards. Cyber resilience is at the intersection of cyber security and business resilience. Its core capabilities encompass integrated strategic policies, processes, architectures, and frameworks. Governments and industries often align defensive and resilient capabilities, to address security and network vulnerability breaches through strategic management processes.


2020 ◽  
Vol 16 (5) ◽  
pp. 155014772091662
Author(s):  
Jun-Feng Tian ◽  
Hao-Ning Wang

With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. This article proposes an efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios, which can better meet performance and security requirements. The proposed scheme realizes data sharing under the condition of protecting privacy by encrypting sensitive information. Using the private key separation method, the private key is divided into two parts using identity information generation and random selection which are, respectively, held by the user and the fog center. Then, using the two-time signature method, the Internet of things and fog computing center use two parts of the private key to generate the original signature and final signature in two separate times. Since the fog computing center only has a part of the private key generated using the identity information, the security of the system will not be damaged due to the leakage of part of the private key held by the fog center, and the fog center significantly participates in the signature generation process, which significantly reduces the computation and communication overhead of the Internet of things device. Security analysis and performance evaluation show that the proposed scheme is safe and efficient.


Author(s):  
Pankaj Kumar ◽  
Lokesh Chouhan ◽  
Ankit Songara

The internet of things (IoT) is rising at a stunning rate. Consistently, every day, the presence of new gadgets, cameras, cell phones, and sensors these are associated with the internet. It is envisioned IoT will find, coordinate, and make utilization of such gadgets and their information in the advance of new service and items that can change and emphatically blow our lives. Presently, IoT and cloud computing are the hottest area used by the researchers. In any case, to the best of the authors' insight, these works do not have a point-by-point investigation of the new Cloud-IoT worldview, which includes totally new applications, challenges, and research issues. To connect this hole, this chapter gives a review on the reconciliation of Cloud and IoT. Beginning by describing basics of both IoT and cloud computing, the authors examine their complementarity, itemizing what is at present heading to their integration. At the end this chapter, the authors describe the smart roadside assistance for smart communities.


Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1077
Author(s):  
Muhammad Ijaz ◽  
Gang Li ◽  
Ling Lin ◽  
Omar Cheikhrouhou ◽  
Habib Hamam ◽  
...  

Due to the COVID-19 pandemic, the world has faced a significant challenge in the increase of the rate of morbidity and mortality among people, particularly the elderly aged patients. The risk of acquiring infections may increase during the visit of patients to the hospitals. The utilisation of technology such as the “Internet of Things (IoT)” based on Fog Computing and Cloud Computing turned out to be efficient in enhancing the healthcare quality services for the patients. The present paper aims at gaining a better understanding and insights into the most effective and novel IoT-based applications such as Cloud Computing and Fog Computing and their implementations in the healthcare field. The research methodology employed the collection of the information from the databases such as PubMed, Google Scholar, MEDLINE, and Science Direct. There are five research articles selected after 2015 based on the inclusion and exclusion criteria set for the study. The findings of the studies included in this paper indicate that IoT-based Fog Computing and Cloud Computing increase the delivery of healthcare quality services to patients. The technology showed high efficiency in terms of convenience, reliability, safety, and cost-effectiveness. Future studies are required to incorporate the models that provided the best quality services using the Fog and Cloud Computation techniques for the different user requirements. Moreover, edge computing could be used to significantly enhance the provision of health services at home.


Author(s):  
Marcus Tanque ◽  
Harry J. Foxwell

This chapter examines and explains cyber resilience, internet of things, software-defined networking, fog computing, cloud computing, and related areas. Organizations develop these technologies in tandem with cyber resilience best practices, such as processes and standards. Cyber resilience is at the intersection of cyber security and business resilience. Its core capabilities encompass integrated strategic policies, processes, architectures, and frameworks. Governments and industries often align defensive and resilient capabilities, to address security and network vulnerability breaches through strategic management processes.


In the era of new technologies, Fog computing becomes very popular in today’s scenario. Fog computing paradigm brings a concept that extends cloud computing to the edge and close proximity to the Internet of Things (IoT) network. The fundamental components of fog computing are fog nodes. Additionally, fog nodes are energy efficient nodes. Numerous fog nodes are deployed in the associated fields that will handle the Internet of Things (IoT) sensors computation. Meanwhile, the Internet of Things (IoT) faces challenges, among which energy efficiency is one of the most prominent or critical challenges in the current scenario. However, sensor devices are an energy constraintthatcreateshotspotduringtheroutingprocess.Forthis reason,tohandlesuchconstraints,thispaperpresentsaneffective hotspot mechanism using fog nodes that demonstrate the routing process and directed the sensors to choose the routing path as selected by the fog node. Moreover, fog node will act as a decision maker node and maintain the energy efficiency of sensors during the routing as fog nodes are energy efficient nodes. As it moves towards the emergency situation, the most appropriate and effective routing approach has been designed who maintain the energy level of sensors will be high during the routing process. The proposed routing technique could be better performance for the sake of efficient routing in terms of energy consumption and prolonging networklifetime.


Sign in / Sign up

Export Citation Format

Share Document