FOG computing and its various uses in different applications

  • Authors

    • Chandra Sekhar Maganty
    • Kothamasu Kiran Kumar
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10712
  • Cloud Computing, Fog Computing, Internet of Things, Network Congestion, Use cases.
  • Cloud computing is the transformation, which involves storing large applications where data or information is exchanged among differ-ent platforms for giving good service to clients who belong to different organizations. It assures great use of resources by making data, software and infrastructure available with minimal cost along with security and reliability. Even though cloud computing gives many advantages, it has certain limitations like network congestion, fault tolerance, less bandwidth etc. To come out of this issue a new era computing model is introduced called Fog Computing. This new computing model can transfer fragile data without any delay to other devices in the network. The only difference between both is fog is located more close to the end user or the device and gives response to the client instantly. Moreover, it is beneficial to the real time streaming applications, internet of things which need reliable internet con-nectivity along with high speed. This paper is a review on Fog Computing, differences in edge and fog computing, use cases of fog and the architecture.

  • References

    1. [1] Z. Cai, Z. He, X. Guan, and Y. Li, “Collective data-sanitization for preventing sensitive information inference attacks in social net-works,†IEEE Transactions on Dependable and Secure Computing, 2016.

      [2] I.J. Information Technology and Computer Science, 2016, 5, 28-3 published Online May 2016 in MECS (http://www.mecspress.org/).

      [3] Ben-Salem M., and Stolfo Angelos D. Keromytis, “Fog computing: Mitigating Insider Data Theft Attacks inthe Cloud,†IEEE symposium on security and privacy workshop (SPW) 2012.

      [4] F. Bonomi, "Connected vehicles, the internet of things, and fog computing," in The Eighth ACM International Workshop on Vehic-ular Inter-Networking (VANET), Las Vegas, USA, 2011.

      [5] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Kon-winski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, Apr 2010.

      [6] L. Atzori, A. Iera, and G. Morabito, "The internet of things: A sur-vey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, Oct. 2010.

      [7] Pearson, S., Benameur, A., Privacy, Security and Trust Issues Aris-es from Cloud Computing, Cloud Computing Technology and Sci-ence (CloudCom), IEEE Second International Conference 2010, On page(s): 693-702.

  • Downloads

  • How to Cite

    Sekhar Maganty, C., & Kiran Kumar, K. (2018). FOG computing and its various uses in different applications. International Journal of Engineering & Technology, 7(2.7), 345-347. https://doi.org/10.14419/ijet.v7i2.7.10712