Professional Documents
Culture Documents
Seminar Topic
On
“FOG COMPUTING”
Submitted for
Bachelor of Engineering in
Computer Engineering
Sant Gadge Baba Amravati University, Amravati
Submitted By
Anushri D. Godbole
Guided By
Prof. S. T. Sonone
Department of Computer Engineering
Session: 2016-2017
Certificate
This is to certify that the seminar entitled
“Fog Computing”
Submitted by
Anushri D. Godbole
Prof.S.T.Sonone Prof.D.V.Meshram
Seminar Guide H.O.D C.E Dept
Last but not the least I thank Dr. V. G. Arajpure, Principal of Dr.
Bhausaheb Nandurkar College of Engineering & Technology Yavatmal, for
providing all required facilities and for a constant Encouragement.
Anushree Godbole
Final Year Computer Engineering
DBNCOET,YAVATMAL
Date:-
Place:-Yavatmal
INDEX
1 INTRODUCTION 1
2 CLOUD COMPUTING 2
2.1 INTRODUCTION
2.2 DISADVANTAGES OF CLOUD COMPUTING
3 FOG COMPUTING 3
3.1 INTRODUCTION
3.2 CHARACTERSTICS OF FOG COMPUTING
3.3 WHY DO WE NEED FOG COMPUTING
5 SECURITY IN FOG 7
8 REFERENCES 12
ABSTRACT
We proposed a different approach for securing data in the cloud using offensive
decoy technology. We monitor data access in the cloud and detect abnormal data
access patterns.When unauthorized access is suspected and then verified using
challenge questions, we launch a disinformation attack by returning large amounts
of decoy information to the attacker. This protects against the misuse of the user’s
real data. Experiments conducted in a local file setting provide evidence that this
approach may provide unprecedented levels of user data security in a Cloud
environment.
Also I’m going to elaborate the motivation and advantages of Fog computing,
and analyze its applications in a series of real scenarios, such as smart traffic lights
in vehicular networks and software defined networks.