Advances in Computer and Electrical Engineering - Advancing Consumer-Centric Fog Computing Architectures
Latest Publications


TOTAL DOCUMENTS

8
(FIVE YEARS 8)

H-INDEX

1
(FIVE YEARS 1)

Published By IGI Global

9781522571490, 9781522571506

Author(s):  
Kashif Munir ◽  
Lawan A. Mohammed

In the IoT scenario, things at the edge can create significantly large amounts of data. Fog computing has recently emerged as the paradigm to address the needs of edge computing in internet of things (IoT) and industrial internet of things (IIoT) applications. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes. Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data, and there have been instances when the password-based authentication has been manipulated to gain access to the data. Since the conventional methods such as passwords do not serve the purpose of data security, this chapter focuses on biometric user authentication in fog computing environments. In this chapter, the authors present biometric smartcard authentication to protect the fog computing environment.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has emerged as a new technology that allows the users to acquire resources at anytime, anywhere by connecting with internet. It provides the options to users for renting of infrastructure, storage space, and services. One service issue that affects the QoS of cloud computing is network latency while dealing with real-time application. In this, the user interacts directly with application but delays in receiving the services, and jitter delay will encourage the user to think about this. In today's world, clients are moving towards the IoT techniques, enabling them to connect all things with internet and get their services from cloud. This advancement requires introduction of new technology termed as “fog computing.” Fog computing is an extension of cloud computing that provides the service at the edge of the network. Its proximity to end users, mobility support, and dense distribution reduces the service latency and improves QoS. This fog model provides the prosperity for advertisement and entertainment and is well suited for distributed data model.


Author(s):  
Nisha Angeline C. V. ◽  
Raja Lavanya

Fog computing extends the cloud computing paradigm to the edge of the network, thus enabling a new breed of applications and services. Defining characteristics of the Fog are 1) low latency and location awareness, 2) widespread geographical distribution, 3) mobility, 4) very large number of nodes, 5) predominant role of wireless access, 6) strong presence of streaming and real time applications, and 7) heterogeneity. In this chapter, the authors argue that the above characteristics make the Fog the appropriate platform for a number of critical internet of things (IoT) services and applications, namely connected vehicle, smart grid, smart cities, and in general, wireless sensors and actuators networks (WSANs).


Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

Fog computing has the potential to resolve cloud computing issues by extending the cloud service provider's reach to the edge of the cloud network model, right up to the cloud service consumer. This enables a whole new state of applications and services which increases the security, enhances the cloud experience, and keeps the data close to the user. This chapter presents a review on the academic literature research work on fog computing, introduces a novel taxonomy to classify cloud products based on fog computing elements, and then determines the best fit fog computing product to choose for the cloud service consumer.


Author(s):  
Kashif Munir ◽  
Lawan Ahmed Mohammed

Fog computing is a distributed infrastructure in which certain application processes or services are managed at the edge of the network by a smart device. Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. These features make the fog platform highly suitable for time and location-sensitive applications. For example, internet of things (IoT) devices are required to quickly process a large amount of data. The significance of enterprise data and increased access rates from low-resource terminal devices demand reliable and low-cost authentication protocols. Lots of researchers have proposed authentication protocols with varied efficiencies. As a part of this chapter, the authors propose a secure authentication protocol that is strongly secure and best suited for the fog computing environment.


Author(s):  
Manikandakumar Muthusamy ◽  
Karthikeyan Periasamy

Internet of things is a growing technology with many business opportunities and risks. It is strongly believed that IoT will cause a major shift in people's lives similar to how the internet transformed the way people communicate and share information. IoT is becoming popular in the various domains such as smart health, smart cities, smart transport, and smart retail. The security and privacy concerns of IoT are crucial as it connects a large number of devices. Security is a more critical issue that certainly needs to be resolved with a high level of attention, as with an increasing number of users, there would be a need to manage their requests and check authenticity on the cloud-based pattern. Recently, a series of massive distributed denial-of-service attacks have occurred in IoT organizations. Such malicious attacks have highlighted the threats resulting from not enough security in IoT devices together with their overwhelming effects on the internet. This chapter provides an overview of the security attacks with regard to IoT technologies, protocols, and applications.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has started a new era in the field of computing, which allows the access of remote data or services at anytime and anywhere. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. The scalability feature of cloud computing allows one to expand and contract the resources. The owner's data stored at the remote location, but he is usually afraid of sharing confidential data with cloud service provider. If the service provider is not the trusted one, there may be a chance of leakage of confidential data to external third party. Security and privacy of data require high consideration, which is resolved by storing the data in encrypted form. Data owner requires that the service provider should be trustworthy to store its confidential data without any exposure. One of the outstanding solutions for maintaining trust between different communicating parties could be the service level agreement between them.


Author(s):  
Guru Prasad Bhandari ◽  
Ratneshwer Gupta

Edge computing is a technique of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data in the systems. And, cloud computing is a service that delivers on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, which is trending in today's technology-driven world. With the advantage of flexibility, storage, sharing, and easy accessibility, cloud is being used by major players in IT (information technology). This chapter highlights cloud/edge computing architecture and its current issues and challenges from technological and organizational aspects. A brief introduction of edge computing architecture with similar technologies along with its service models is discussed. A few counterexamples of cloud computing architecture are showed. Organizational aspects of cloud computing architecture, as well as IBM and Oracle reference cloud architecture, are briefly presented. Some emerging issues and challenges associated with cloud/edge computing on its utilization are also elaborated.


Sign in / Sign up

Export Citation Format

Share Document