fog computing by KRISHNA - PowerPoint PPT Presentation

About This Presentation
Title:

fog computing by KRISHNA

Description:

A NEW STAR IN THE CLOUD UNIVERSE – PowerPoint PPT presentation

Number of Views:12704
Slides: 29
Provided by: krishna556
Tags:

less

Transcript and Presenter's Notes

Title: fog computing by KRISHNA


1
FUTURE INSTITUTE OF ENGINEERING MANAGEMENT
,KOLKATA
GROUP-03 PRESENTS FOG COMPUTING
  • A NEW STAR IN
    THE CLOUD UNIVERSE

2
GROUP-03KRISHNA KINKAR
JHAUJJAWAL KUMAR CHOUDHARYSHASHI KANT
KUMARARGHA SEN SHARMAGROUP-MENTORMr.
PRASHANT MAJUMDAR
3
CONTENTS KRISHNA
  • EXISTING SYSTEM(...)
  • DISADVANTAGES
  • CLOUD COMPUTING SECURITY THREATS.
  • PROPOSED SYSTEM(FOG COMPUTING)
  • CHARACTERISTICS
  • USER BEHAVIOUR PROFILING
  • DECOY SYSTEM
  • SECURITY MEASURES
  • APPLICATION OF FOG COMPUTING
  • SECURITY AND PRIVACY IN FOG COMPUTING
  • CONCLUSION
  • FUTURE SCOPE.

4



5
EXISTING SYSTEM CLOUD COMPUTING
  • CLOUD COMPUTING IS A MODEL FOR ENABLING
  • COVENIENT,ON DEMAND NETWORK ACCESS TO A
    SHARED POOL OF CONFIGRABLE COMPUTING
    RESOURCES THAT CAN BE RAPIDLY PROVISIONED AND
    RELEASED WITH MINIMAL MANAGEMENT EFFORT.

6
CLOUD COMPUTING UTILITY
7
CLOUD MARKET
8
WHY ADVANCEMENT NEEDED
  • ENCRYPTION WAS FAILED IN SECURING THE DATA FROM
    THE ATTACKER.
  • IT DOES NOT VERIFY WHETHER THE USER IS AUTHORISED
    OR NOT.
  • NO BODY IS IDENTIFIED WHEN THE ATTACK HAPPENS.
  • IT IS COMPLEX TO DETECT WHICH USER IS ATTACK.
  • WE CANT DETECT WHICH FILE IS BEING HACKED.
  • LATENCY TOO HIGH.
  • RESILIENCY IMPRACTICAL.

9
CLOUD COMPUTING SECURITY THREATS
  • INSECURE APPLICATION PROGRAMMING INTERFACE.
  • MALICIOUS INSIDERS.
  • SHARED TECHNOLOGY VULNERABILITY.
  • DATA LOSS/LEAKAGE.
  • ACCOUNT,SERVICE TRAFFIC HIJACKING.
  • UNKNOWN RISK PROFILE.

10
PROPOSED SYSTEM UJJAWAL
(FOG COMPUTING)
  • DATA PROCESSING AND APPLICATIONS ARE CONCENTRATED
    IN DEVICES AT THE NETWORK EDGE RATHER THAN THE
    CLOUD.
  • PROPOSED TO SECURE USERS DATA IN CLOUD USING-
  • USER BEHAVIOUR PROFILING.
  • DECOY INFORMATION TECHNOLOGY.


  • IN THIS TECHNIQUE WHEN THE UNAUTHORISED PERSON
    TRY TO ACCESS THE DATA, SYSTEM GENERATES THE FAKE
    DOCUMENTS.
  • DEVICES COMMUNICATE PEER-TO-PEER TO EFFICIIENTLY
    STORE/SHARE DATA AND TAKE LOCAL DECISIONS.

11
(No Transcript)
12
CHARACTERISTICS
  • SECURITY
  • - STRONG SECURITY (HARDWARE ROOT OF TRUST)
  • - RESILIENCY/FAULT TOLERANCE.
  • PROGRAMMABILITY
  • - MULTIPLE APPLICATION SUPPORT.
  • - VERSATILITY IN OPERATING ENVIRONMENT.
  • REAL TIME FEATURES
  • - DETERMINISTIC TIMING CAPABILITIES.
  • SUPPORTS MULTIPLE OPERATING PLATFORMSUNIX,WINDOWS
    ,MAC etc.
  • EMPLOYS SIMPLE,FAST AND STANDARIZED IOT INTERNET
    PROTOCOLS(TCP/IP ,SOCKETS etc.).
  • RUNS ON AFFORDABLE,OFF THE SHELF COMPUTING
    TECHNOLOGIES.

13
FOG COMPUTING SERVICE COVER
  • APPLICATIONS THAT REQUIRE VERY LOW AND
    PREDICTABLE LATENCY.
  • GEOGRAPHICALLY DISTRIBUTED APPLICATIONS.
  • FAST MOBILE APLICATIONS.
  • LARGE SCALE DISTRIBUTED CONTROL SYSTEMS.
  • IMPROVES QUALITY OF SERVICE.

14
ADVANTAGES OF FOG COMPUTING
  • FOG AIMS TO PLACE THE DATA CLOSE TO THE END
    USERS.
  • BIG DATA AND ANALYTICS CAN BE DONE FASTER WITH
    BETTER RESULTS.
  • ADMINISTRATORS ARE ABLE TO SUPPORT LOCATION BASED
    MOBILIY DEMANDS AND NOT HAVE TO TRAVERSE THE
    ENTIRE NETWORK.
  • ENHANCE THE CLOUD EXPERIENCE BY ISOLATING USER
    DATA THAT NEEDS TO LIVE ON THE EDGE .

15
SECURING CLOUDS USING FOG
(USER BAHAVIOUR PROFILING)
  • IT INCLUDES VOLUMETRIC INFORMATION,HOW MANY
    INFORMATIONS ARE TYPICALLY READ AND HOW OFTEN.
  • NORMAL USER BEHAVIOR IS CONTINUOUSLY CHECKED
    TO DETERMINE ABNORMAL ACCESS .
  • THIS SECURITY IS COMMONLY USED IN FRAUD DETECTION
    APPLICATION.

16
DECOY SYSTEM
  • IN THIS SYSTEM BOGUS INFORMATION CAN BE GENERATED
    ON DEMAND.
  • IT WILL CONFUSE AN ATTACKER.
  • THIS TECHNOLOGY CAN BE INTEGRATED WITH USER
    BAHAVIOR PROFILING TO SECURE A USERS DATA IN YHE
    CLOUD.

17
FOG COMPUTING ARCHITECTURE
18
SECURITY MEASURES SHASHI KANT
  • ANOMALY DETECTION
  • COMPARED WITH THE PAST BEHAVIOUR OF USER.IF
    THE USER BEHAVIOUR IS EXCEEDING A LIMIT THEN THE
    REMOTE USER IS SUSPECTED TO BE ANOMALY.
  • CHALLENGE REQUEST
  • SUSPECTED USER IS ASKED FOR RANDOMLY
    SELECTED SECRET QUESTIONS.

19
(No Transcript)
20
(No Transcript)
21
(No Transcript)
22
APPLICATION OF FOG COMPUTING
  • SOFTWARE DEFINED NETWORKS(SDN)
  • SDN CONCEPT TOGETHER WITH FOG WILL RESOLVE
    THE ISSUE IN VEHICULAR NETWORKS , INTERMITTENT
    CONNECTIVITY , COLLISION AND HIGH PACKET LOSS
    RATE.
  • IoT AND CYBER-PHYSICAL SYSTEMS(CPSs)
  • INTEGRATE THE ABSTRACTIONS AND PRECISION OF
    SOFTWARE AND NETWORKING WITH THE DYNAMICS IN THE
    PHYSICAL ENVIRONMENT.
  • DECENTRALIZED SMART BUILDING CONTROL
  • WITH FOG COMPUTING ,SMART BUILDING CAN MAINTAIN
    THEIR FABRIC,EXTERNAL AND INTERNAL ENVIRONMENTS.

23
(No Transcript)
24
SECURITY PRIVACY IN
FOG COMPUTING
  • AUTHENTICATION AT DIFFERENT LEVELS OF GATEWAYS.
  • SMART METERS INSTALLED IN THE CONSUMERS HOME.
  • PUBLIC KEY INFRASTRUCTURE(PKI) WHICH INVOLVE
    MULTICAST AUTHENTICATION.
  • INTRUSIONS CAN BE DETECTED USING SIGNATURE BASED
    METHOD.
  • INTRUSION CAN ALSO BE CAPTURED BY USING AN
    ANOMALY-BASED METHOD.

25
CONCLUSION
  • FOG COMPUTING IS NOT A REPLACEMENT OF CLOUD.
  • IT JUST EXTENDS THE CLOUD COMPUTING BY PROVIDING
    SECURITY IN THE CLOUD ENVIRONMENT.
  • IT IS A NEW APPROACH FOR SECURING DATA IN THE
    CLOUD BY USING OFFENSIVE DECOY TECHNOLOGY.
  • IT MONITORS DATA ACCESS IN THE CLOUD AND DETECTS
    ABNORMAL DATA ACCESS PATTERNS.
  • BY USING FOG TECHNOLOGY CAN MINIMIZE INSIDER
    ATTACKS IN CLOUD

26
FUTURE SCOPE
  • APPLICABLE ONLY FOR SINGLE CLOUD OWNERSHIP
    SYSTEM.
  • FOG APPLICATION CAN BE ENHANCEDTO MANAGE A CLOUD
    ENVIRONMENT WHICH HAS MORE THAN ONE CLOUD
    ARCHITECTURE.

27
(No Transcript)
28
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com