Fog Computing and Virtualization

Fog Computing ◽  
2018 ◽  
pp. 208-219
Author(s):  
Siddhartha Duggirala

The essence of Cloud computing is moving out the processing from the local systems to remote systems. Cloud is an umbrella of physical/virtual services/resources easily accessible over the internet. With more companies adopting cloud either fully through public cloud or Hybrid model, the challenges in maintaining a cloud capable infrastructure is also increasing. About 42% of CTOs say that security is their main concern for moving into cloud. Another problem which is mainly problem with infrastructure is the connectivity issue. The datacenter could be considered as the backbone of cloud computing architecture. As the processing power and storage capabilities of the end devices like mobile phones, routers, sensor hubs improve we can increasing leverage these resources to improve your quality and reliability of services.

Author(s):  
Siddhartha Duggirala

The essence of Cloud computing is moving out the processing from the local systems to remote systems. Cloud is an umbrella of physical/virtual services/resources easily accessible over the internet. With more companies adopting cloud either fully through public cloud or Hybrid model, the challenges in maintaining a cloud capable infrastructure is also increasing. About 42% of CTOs say that security is their main concern for moving into cloud. Another problem which is mainly problem with infrastructure is the connectivity issue. The datacenter could be considered as the backbone of cloud computing architecture. As the processing power and storage capabilities of the end devices like mobile phones, routers, sensor hubs improve we can increasing leverage these resources to improve your quality and reliability of services.


Author(s):  
Siddhartha Duggirala

The essence of cloud computing is moving out the processing from the local systems to remote systems. Cloud is an umbrella of physical/virtual services/resources easily accessible over the internet. With more companies adopting cloud either fully through public cloud or hybrid model, the challenges in maintaining a cloud capable infrastructure is also increasing. About 42% of CTOs say that security is their main concern for moving into cloud. Another problem, which is mainly problem with infrastructure, is the connectivity issue. The datacenter could be considered as the backbone of cloud computing architecture. Handling this new generation of requirements of volume, variety, and velocity in IoT data requires us to evaluate the tools and technologies. As the processing power and storage capabilities of the end devices like mobile phones, routers, sensor hubs improve, we can increase leverage these resources to improve your quality and reliability of services. Applications of fog computing is as diverse as IoT and cloud computing itself. What IoT and fog computing have in common is to monitor and analyse real-time data from network connected things and acting on them. Machine-to-machine coordination or human-machine interaction can be a part of this action. This chapter explores fog computing and virtualization.


Author(s):  
Claudio Estevez

Cloud computing is consistently proving to be the dominant architecture of the future, and mobile technology is the catalyst. By having the processing power and storage remotely accessible, the main focus of the terminal is now related to connectivity and user-interface. The success of cloud-based applications greatly depends on the throughput experienced by the end user, which is why transport protocols play a key role in mobile cloud computing. This chapter discusses the main issues encountered in cloud networks that affect connection-oriented transport protocols. These issues include, but are not limited to, large delay connections, bandwidth variations, power consumption, and high segment loss rates. To reduce these adverse effects, a set of proposed solutions are presented; furthermore, the advantages and disadvantages are discussed. Finally, suggestions are made for future mobile cloud computing transport-layer designs that address different aspects of the network, such as transparency, congestion-intensity estimation, and quality-of-service integration.


2019 ◽  
Vol 16 (2) ◽  
pp. 0419 ◽  
Author(s):  
Dar Et al.

            The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here in this research article, we present a comprehensive review of fog computing, differentiating it from cloud computing, also present various use-cases of fog computing in different domains, we came to conclude that Fog computing leads in an efficient energy resource management, leveraging the energy both in terms of consumption and cost scenarios. Further, we highlighted its key features, challenges and issues, resource optimization methods.


Author(s):  
Yagnik A. Rathod ◽  
Chetan B. Kotwal ◽  
Sohil D. Pandya

Cloud Computing becomes most preferable solution for satisfying the various requirements of organizations and institutions. Different types of clouds like IaaS, PaaS, SaaS makes cloud capable to fulfills the client's different kind of needs like computer processing power, storage spaces, databases, software, application, web based solutions. Cloud computing can also be useful and worthy in providing certain customized solutions to enhance the capability of legacy systems in terms of effectiveness, reliability and optimization by replication of environment up to satisfactory extent. To provide adequate security solutions for cloud is still a challenging task and access control mechanism is one of the domain which demands significant attention on the mission towards securing clouds. In this paper, our work primarily focus on defining ABAC components, mapping functions and access control policies composed by access rules. Amazon Web Services is one of the most prominent cloud providers. Identity and Access Management (IAM) and Amazon S3 are access management and storage facilities of AWS respectively. ABAC based access policies are attached with the user and storage components for authorization.


2019 ◽  
Vol 15 (11) ◽  
pp. 155014771988816 ◽  
Author(s):  
Trung Dong Mai

The traditional data processing of the Internet of Things is concentrated in cloud computing, and its huge number of devices and massive real-time data transmission are extremely stressful on network bandwidth and cloud computing data centers. Fog computing is the infrastructure that can use processing power anywhere in the cloud. Virtual computing extends the power of cloud computing to the edge of the network, enabling any computing device to host and process software services, analyzing and storing data closer to where data are generated. The architecture of the fog computing brings enormous processing power. Since its processing power is often located near the required equipment, the distance of data transmission is reduced and the delay is reduced. This article explores how to use the fog computing layer between the cloud data center and the end node layer to store and process large amounts of local data in a timely manner, speeding decision making and enabling Internet of Things manufacturers and software developers to limit their ability to send data. They reduced cloud computing costs and built a reasonable security architecture.


Author(s):  
Vijayalakshmi Saravanan ◽  
Anpalagan Alagan ◽  
Isaac Woungang

With the advent of novel wireless technologies and Cloud Computing, large volumes of data are being produced from various heterogeneous devices such as mobile phones, credit cards, and computers. Managing this data has become the de-facto challenge in the current Information Systems. According to Moore's law, processor speeds are no longer doubling, the processing power also continuing to grow rapidly which leads to a new scientific data intensive problem in every field, especially Big Data domain. The revolution of Big Data lies in the improved statistical analysis and computational power depend on its processing speed. Hence, the need to put massively multi-core systems on the job is vital in order to overcome the physical limits of complexity and speed. It also arises with many challenges such as difficulties in capturing massive applications, data storage, and analysis. This chapter discusses some of the Big Data architectural challenges in the perspective of multi-core processors.


2021 ◽  
Vol 4 (1) ◽  
pp. 1-17
Author(s):  
Hewan Shrestha ◽  
Puviyarai T. ◽  
Sana Sodanapalli ◽  
Chandramohan Dhasarathan

The emerging trend of internet of things in recent times is a blessing for various industries in the world. With the increasing amount of data generated by these devices, it makes it difficult for proper data flow and computation over the regular cloud architecture. Fog computing is a great alternative for cloud computing as it supports computation in devices over a large distributed geographical area, which is a plus for fog computing. Having applications in various domains including healthcare, logistics, design, marketing, manufacturing, and many more, fog computing is a great boon for the future. Evolving fog computing in various domains with different methods and techniques has shaped a clear future for it. Applicability of fog computing in vehicular communications and storage-as-a-service has made the term more popular these days. It is a review of all the possible fog computing-enabled applications and their future scope. It also prepares a basis for further research into fog computing domain-enabled services with low latency and minimum costs.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Mbasa Joaquim Molo ◽  
Joke A. Badejo ◽  
Emmanuel Adetiba ◽  
Vingi Patrick Nzanzu ◽  
Etinosa Noma-Osaghae ◽  
...  

Cloud computing is a technology that allows dynamic and flexible computing capability and storage through on-demand delivery and pay-as-you-go services over the Internet. This technology has brought significant advances in the Information Technology (IT) domain. In the last few years, the evolution of cloud computing has led to the development of new technologies such as cloud federation, edge computing, and fog computing. However, with the development of Internet of Things (IoT), several challenges have emerged with these new technologies. Therefore, this paper discusses each of the emerging cloud-based technologies, as well as their architectures, opportunities, and challenges. We present how cloud computing evolved from one paradigm to another through the interplay of benefits such as improvement in computational resources through the combination of the strengths of various Cloud Service Providers (CSPs), decrease in latency, improvement in bandwidth, and so on. Furthermore, the paper highlights the application of different cloud paradigms in the healthcare ecosystem.


2014 ◽  
Vol 573 ◽  
pp. 523-528
Author(s):  
K. Latha ◽  
B. Gowsalya ◽  
B. Kannega

Cloud Computing is the important aspect in Information Technology, which is believed to be suitable for Small business purposes for accessing the resources .Cloud Community portals are used for storing, accessing, synchronizing and for backup the files .The main concern in cloud portal is the security issues in public cloud like Drop box. Drop box are used to access the data whenever needed. In this paper, the attack of Drop box by means of Spam mails is taken into consideration and encryption techniques such as Honey Encryption is used for avoidance of attacks caused by Spam mails such as data stealing, guessing of passwords etc.


Sign in / Sign up

Export Citation Format

Share Document