Comparative of FOG Computing And Cloud Computing
Abstract: Fog computing extends cloud computing, cloud computing provide data, compute, storage, and application services to end-user, also the fog computing also provide the services like data, compute ,storage and application to end user. But in cloud the main problem that occurs is security and now a days security and privacy both are main concern that needed to be considered. Fog Computing is not a replacement of cloud it is just extends the cloud computing by providing security in the cloud environment. With Fog services we are able to enhance the cloud experience by isolating users’ data that need to live on the edge. The main aim of the fog computing is to place the data close to the end user.The securityissues are mentioned in this paper.
Keywords: Cloud Computing, Decoy, Fog Computing
1. Introduction
Fog computing also known as fogging is a distributed computing infrastructure in which some application services are handled at the network edge in a smart device. Fog computing is a new standard that exploits the profits of virtualized IT infrastructures closer to end users Fog computing offers an attractive mixture of computational power, storage capability, and networking facilities at the edge of the networks. The infrastructure of this new scattered computing allows
…show more content…
Here malicious insider means Insider attacks can be performed by malicious employees at the providers or users site. Malicious insider can access the confidential data of cloud users. A malicious insider can easily obtain passwords, cryptographic keys and files. The threat of malicious attacks has increased due to lack of transparency in cloud providers processes and procedures. It means that a provider may not know how employees are granted access and how this access is monitored or how reports as well as policy compliances are
...common risks and their mitigating techniques are: Unauthorized access to data centers, computer rooms, and wiring closets – this risk can be mitigated by applying policies, standards, procedures, and guidelines for staff and visitors to secure facilities. Servers must sometimes be shut down to perform maintenance – this can be mitigated by creating a system to tie servers, storage devices, and the network together and created redundancy to prevent down time on mission critical services. Server operating systems vulnerability – this can be mitigated by ensuring all server operating system environments are defined with the proper patches and updates. And lastly cloud computing virtual environments are not secure by default configurations – can be mitigated with setting up virtual firewalls and server segments on separate VLANs to help prevent failure in the network.
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
The cloud computing is still under development but if it can manage to maintain information privacy and confidentiality than it will become revolutionary in healthcare field. And we never know, in future science and technology might introduce more advanced level of apps and service with enhanced level of privacy and security measures.
If you have ever traded in the stock market, or have any knowledge about the stock market at all, you surely have heard the term “insider trading”. This term has a negative connotation to most people and is usually associated with illegal conduct. What most people do not know, is that insider trading can be conducted in a legal way. So what exactly is insider trading? It is defined as “the buying or selling of a security by someone who has access to material, nonpublic information about the security”. CEOS and employees of certain companies usually know, or can more easily obtain, information about the company that individual investors and outside people may not know. They may have an insight on future decisions the company is going to make
External information system services are computing outside of the traditional security authorization boundaries established by organizations for their information systems. The traditional authorization boundaries that are linked to physical space and control of assets, are being extended (both physically and logically) with the use of external services. “External services can be provided by entities within the organization but outside of the security authorization boundaries established for organizational information systems, entities outside of the organization either in the public sector (e.g., federal agencies) or private sector (e.g., commercial service providers), or some combination of the public and private sector options (Gallagher, 2015)”. External information system services can include the use of service oriented architectures (SOAs), cloud-based services (infrastructure, platform, software), or data center
What is an insider threat? Insider threat has been defined as a malicious hacker who is an employee of office of a business, institution or agency. There can also be outsider threats by a person who poses as an officer or employee by gaining access to false credentials. An insider threat can also go by the term of a cracker or a black hat. Insider threats have damaged the United States for a long time. Today the threat is much easier to pull off due to the fact that we have newer technologies; such as how easy it is to transmit information over the internet and many people wanting to get their hand on specific materials that only the insiders have access too. Why do people become insider threats? Many of them become insider threats because they need money and it just comes as easy money to them. Not to mention it is hard to track down and find out who sold the sensitive information because of having so many employees who have access to the same sensitive information. Sometimes the information that the insiders sell leads to acts of terror that can be detrimental to our society.
Due to the escalation in Internet use, the amount of computer security breaches that businesses have experienced in the last year has increased at a rapid rate. Breaches can come from external attacks as well as within the walls of a company. External attacks are serious, but the threat created by a company’s employees can be much worse (Robb, 2010). Last year, 81 percent of security breaches came from inside the company. Employees can cause deliberate attacks, but more likely employee use can compromise your system without malice and unknowingly.
The combination of both mobile computing and cloud computing can be termed as mobile cloud computing. Mobile cloud computing technology can be inherent from the cloud computing technology. Due to the increase in number of mobile devices such as smart phones, PDA’s, laptops, tablet PC’s the mobile cloud computing technology is proving to be one of the most potential and efficient technology in the near future. In this section we will see in brief about mobile computing, cloud computing and mobile cloud computing.
At the World Congress on Engineering 2011 conference in London, U.K., it was noted that the issue of security matters for cloud computing requires revising (Pinto et al., 2011). As mentioned earlier, when going to a cloud network any internal control system is essentially transferred to the service provider. As such, Pinto et al. (2011) explains about the “existence of a new entity called a cloud security manager” whose responsibility it is to keep documentation of client access to the cloud as well as third party processing. To put it differently, the duties of the cloud security manager will be to manage the overall cloud system by instituting an internal control matrix.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.
We live our lives through our cell phones and handheld devices which makes every moment of your life able to be put on display in real time. One of the newest products to enter the realm of sharing every moment is the Google Glass. Google Glass is a wearable computer with an optical head-mounted display that is developed by Google. Google Glass displays information in a Smartphone-like hands-free format that can communicate with the Internet via natural language voice commands. This pair or glasses basically conveys all information you see with your eye to a Google cloud where it is stored. Such data, knowingly and unknowingly, collected and bandwidth pe...
Cloud computing technology is a very known and popular paradigm in the field of Information technology. It is an incipient computing model which emanates from grid computing which is resulting into an emerging paramount concept in Information Technology. Vast number of operating systems and virtual servers are mutually dependent through the internet and allow sharable resources with each other. This generates expeditious and efficient computing speed. The concept of cloud computing is predicated on the time sharing of expensive resources and benefits of the providence of scale. The word Cloud originates from the well-known cloud shape which is expressed as a network in architectural system diagrams. Cloud computing applies traditional supercomputing to provide tremendous throughput computing power. Cloud computing allows user to execute simulated applications on a virtual server. In this report, we discuss about cloud computing technologies for example “Distributed File System (DFS), Map-Reduce, and Big tab”. [3] This cloud computing architecture is designed for, geographic information Services which contains functional utilization, perceptions, benefits, computing reserving data and infrastructure layers. We also discuss about software backdrops called as “D cloud”. D-Cloud provides a condition for analysis on the cloud elements using a particular structural configuration and implements large number of evaluations automatically as per the scenario. We also discuss about combining Peer to peer systems and technologies related cloud computing in order to construct a blueprint of the architecture and establish PC2, an open and free cloud computing platform. [4]
Cloud computing is a type of computing that depends on sharing computing resources rather than having local servers or personal device to handle applications.
The computer-security enterprise is acquainted with the concept of a Malicious Insider. However, a malicious insider in the cloud may have get access to an unmatched quantity of information and on a far more bigger scale. An insider attack is a malicious assault perpetrated on a network or PC by someone with legal system access.