Security Issues in Fog Computing and ML-Based Solutions

Author(s):  
Himanshu Sahu ◽  
Gaytri

IoT requires data processing, which is provided by the cloud and fog computing. Fog computing shifts centralized data processing from the cloud data center to the edge, thereby supporting faster response due to reduced communication latencies. Its distributed architecture raises security and privacy issues; some are inherited from the cloud, IoT, and network whereas others are unique. Securing fog computing is equally important as securing cloud computing and IoT infrastructure. Security solutions used for cloud computing and IoT are similar but are not directly applicable in fog scenarios. Machine learning techniques are useful in security such as anomaly detection, intrusion detection, etc. So, to provide a systematic study, the chapter will cover fog computing architecture, parallel technologies, security requirements attacks, and security solutions with a special focus on machine learning techniques.

2021 ◽  
Vol 7 (1) ◽  
pp. 38
Author(s):  
Brais Galdo ◽  
Daniel Rivero ◽  
Enrique Fernandez-Blanco

Data processing and the use of machine learning techniques make it possible to solve a wide variety of problems. The great disadvantage of using this type of technology is the enormous amount of computation involved. This is why we have tried to develop an architecture that makes the best possible use of the resources available on each machine. The growth of cloud computing and the rise of virtualization techniques have led to a development that allows these tasks to be carried out in a more optimized way.


2020 ◽  
Vol 19 (04) ◽  
pp. 1149-1172
Author(s):  
Jia-Yen Huang ◽  
Ke-Wei Tan

Owing to the large number of professional glossaries and unknown patent classification, analysts usually fail to collect and analyze patents efficiently. One solution to this problem is to conduct patent analysis using a patent classification system. However, in a corpus such as cloud patents, many keywords are common among different classes, making it difficult to classify the unknown class documents using the machine learning techniques proposed by previous studies. To remedy this problem, this study aims to establish an efficient classification system with a special focus on features extraction and application of extension theory. We first propose a compound method to determine the features, and then, we propose an extension-based classification method to develop an efficient patent classification system. Using cloud computing patents as the database, the experimental results show that our proposed scheme can outperform the classification quality of the traditional classifiers.


Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


Author(s):  
Mhd Hasan Sarhan ◽  
Mohammad Ali Nasseri ◽  
Daniel Zapp ◽  
Mathias Maier ◽  
Chris Lohmann ◽  
...  

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Zhijie Han ◽  
Weibei Fan ◽  
Jie Li ◽  
Miaoxin Xu

Fog computing is a distributed computing model as the middle layer between the cloud data center and the IoT device/sensor. It provides computing, network, and storage devices so that cloud based services can be closer to IOT devices and sensors. Cloud computing requires a lot of bandwidth, and the bandwidth of the wireless network is limited. In contrast, the amount of bandwidth required for “fog computing” is much less. In this paper, we improved a new protocol Peer Assistant UDT-Based Data Transfer Protocol (PaUDT), applied to Iot-Cloud computing. Furthermore, we compared the efficiency of the congestion control algorithm of UDT with the Adobe’s Secure Real-Time Media Flow Protocol (RTMFP), based on UDP completely at the transport layer. At last, we built an evaluation model of UDT in RTT and bit error ratio which describes the performance. The theoretical analysis and experiment result have shown that UDT has good performance in IoT-Cloud computing.


Sign in / Sign up

Export Citation Format

Share Document