SURVEY ON FOG COMPUTING AND SECURITY ISSUES IN FOG |
Author(s): |
Vidyavathi D P |
Keywords: |
Cloud computing,Fog computing, end devices, Layers |
Abstract |
Cloud computing is a general term for anything that involves delivering hosted services over the internet.A cloud can be private or public. A public cloud sells services to anyone on the internet. A private cloud is a proprietary network or a data center that supplies hosted services to a limited number of people, with certain access and permissions settings. Private or public, the goal of cloud computing is to provide easy, scalable access to computing resources and IT services. Cloud infrastructure involves the hardware and software components required for proper implementation of a cloud computing model. Though cloud has advantages, downtime is considered as one of the biggest potential downsides of using Cloud Computing. The cloud providers may sometimes face technical outages that can happen due to various reasons, such as loss of power, low Internet connectivity, data centers going out of service for maintenance, etc. In such cases “Fog computing” can be used. "Fog computing" which refers to extending cloud computing to an enterprise's network's edge. As a result, it's also known as Fogging or Edge Computing. It makes computation, storage, and networking services more accessible between end devices and computing data centers.Fog computing is the computing, storage, and communication architecture that employs EDGE devices to perform a significant portion of computation, storage, and communication locally before routing it over the Internet backbone.The goal of fog computing is to conduct as much processing as possible using computing units that are co-located with data-generating devices so that processed data rather than raw data is sent and bandwidth needs are decreased. |
Other Details |
Paper ID: IJSARTV Published in: Volume : 9, Issue : 3 Publication Date: 3/8/2023 |
Article Preview |
Download Article |