You are on page 1of 5

A

Seminar Topic
On

“FOG COMPUTING”
Submitted for
Bachelor of Engineering in
Computer Engineering
Sant Gadge Baba Amravati University, Amravati

Submitted By
Anushri D. Godbole

Guided By
Prof. S. T. Sonone
Department of Computer Engineering

Department of Computer Engineering


Dr. Bhausaheb Nandurkar College of Engineering & Technology
Yavatmal-445001(M.S.)

Session: 2016-2017
Certificate
This is to certify that the seminar entitled
“Fog Computing”
Submitted by

Anushri D. Godbole

In partial fulfillment for the degree of


Bachelor of Engineering
(Name of Department)
Sant Gadge Baba Amravati University, Amravati.
During the academic year 2013-2014 under my guidance

Prof.S.T.Sonone Prof.D.V.Meshram
Seminar Guide H.O.D C.E Dept

Department of (Name of Department)


Dr.Bhausaheb Nandurkar College of Engineering & Technology
Yavatmal-445001(M.S.)
2016-2017
Acknowledgement

I express my since gratitude to my guide, Prof. S.T.Sonone for her


valuable guidance and keen interest in the seminar. I am thankful for her
help and encouragement for the fulfillment of the seminar.

I am thankful to Head of Department Prof.D.V.Meshram & staff of C.E.


Department for their co-opration, guidance and help from time to time. We
thank all our friends for help and co-opration.

Last but not the least I thank Dr. V. G. Arajpure, Principal of Dr.
Bhausaheb Nandurkar College of Engineering & Technology Yavatmal, for
providing all required facilities and for a constant Encouragement.

Anushree Godbole
Final Year Computer Engineering
DBNCOET,YAVATMAL

Date:-
Place:-Yavatmal
INDEX

CHAPTER NO. TITLE PAGE NO.

1 INTRODUCTION 1

2 CLOUD COMPUTING 2

2.1 INTRODUCTION
2.2 DISADVANTAGES OF CLOUD COMPUTING

3 FOG COMPUTING 3

3.1 INTRODUCTION
3.2 CHARACTERSTICS OF FOG COMPUTING
3.3 WHY DO WE NEED FOG COMPUTING

4 WHAT WE CAN DO WITH FOG 5

5 SECURITY IN FOG 7

5.1 DECOY SYSTEM


5.2 ADVANTAGES OF FOG COMPUTING
6 APPLICATIONS 10

7 CONCLUSION AND FUTURE SCOPE 11

8 REFERENCES 12
ABSTRACT

Fog computing is not a replacement of cloud it is just extends the cloud


computing by providing security in the cloud environment. Similar to Cloud, Fog
provides data, compute, storage, and application services to end-users.

Cloud computing promises to significantly change the way of use computers


and store our personal and business information .With these new computing and
communication paradigms arise new data security challenges . Existing data
protection mechanisms such as Encryption have failed to protect the data in the
cloud from unauthorized access.

We proposed a different approach for securing data in the cloud using offensive
decoy technology. We monitor data access in the cloud and detect abnormal data
access patterns.When unauthorized access is suspected and then verified using
challenge questions, we launch a disinformation attack by returning large amounts
of decoy information to the attacker. This protects against the misuse of the user’s
real data. Experiments conducted in a local file setting provide evidence that this
approach may provide unprecedented levels of user data security in a Cloud
environment.

Also I’m going to elaborate the motivation and advantages of Fog computing,
and analyze its applications in a series of real scenarios, such as smart traffic lights
in vehicular networks and software defined networks.

You might also like