You are on page 1of 16

International Journal of Innovative Research in Computer and

Communication Engineering

FOG COMPUTING AN ABLE


EXTENSION TO CLOUD COMPUTING
Dr. Aftab Ahmed Malik Minahil Ahmad
Lahore Garrison University, professor, PhD Lahore Garrison University, M.Phil. Student
dr_aftab_malik@yahoo.com minahilahmad77@hotmail.com

Abstract:
The cloud computing has quickly gained mainstream adoption but fog computing has potential to be just as
dominant if not more so. Fog computing seats processes and possessions at the edge of the cloud, frequently on
network devices, while data remain stored in the cloud. This leads to faster processing time and fear resources
consumed. In addition we have gathered the benefits and drawbacks of both cloud and fog computing in order to find
that which computing network is more helpful and will be used by the customers in futuristic needs.

Keywords: Cloud computing; Fog computing; Internet of things (IoTs); Internet of everything (IoEs); Data
migration.

I. INTRODUCTION AND MOTIVATION


This article presents an extensive study and review of the literate related to how using the cloud computing, the user
can migrate their data to a new emerging technique that is fog computing. Considering all the journals, conference
papers, reviews on research papers and reports, it gives us a complete understanding of why it is so useful in todays
work process. Cloud computing is a service that is being provided to the users to get a preferable shared pool of
services and the access to the get those data back within the range of the network. By providing the configurable
amount of access to the users makes the cloud computing a little bit more challenging related to the security
concerns. One more important issue related to the cloud computing is that the user can get only access to the shared
data within the internet range outside it they cant even see it rather than getting it anywhere from the world [5]. It is
not such like that cloud computing is not providing a wide range of shared networking services, they provide
services in a wide range but their the defects arises are regarding the security and privacy of the users data. In order
to handle this situation and terms a new term is introduced that is fog computing [2].
Small and medium companies uses cloud computing service as it is flexible and fast enough with reduced
infrastructure cost. The enterprises that provides cloud computing services maintains super users which have that
Wright of management and maintenance of data but it is a serious threat to users privacy so it is concluded that the
use of super user Wright must be controlled in the cloud.
Cloud provides a dynamic environment where the users provided data is transmitted from data Centre to user client
and this data is not static. Traditional access control is not suitable for cloud computing environment as it has serious
shortcomings [13].
1.1 Comparison with previous reviews
With the growing needs of enterprises to store huge amount of data and within the need of accessing the information
from personal or business account, there is a need to search for something which would make us able enough to
gratify our desires.
With the provision of low maintenance cost in order to get the data, cloud computing provide facilities in different
fields handling different scenarios of what a user needs of like in IAAS, PASS SAAS, which could be single
projects. It also supports multinational work force working on single medium. Cloud computing is basically a system
architecture model for internet based computing [17]. A cloud data Centre usually deploy many services packed
closely together to make most of the space for utilizations, there is a need to improve the efficiency of
communication networks and internet.

II. CLOUD COMPUTING


Cloud computing is a model that provides a suitable, ever present and on-demand network access.
2.1 Customer-Oriented
A customer-oriented cloud computing is a service that can be accessed from anywhere at any time by a user using a
suitable device or network.
2.2 Businesses-Oriented
Cloud Computing: Business-Oriented cloud computing is a source of universal access it provides scalable services
which further consist of infrastructure managing the scaling and elasticity that are the price that are paid when there
is a need of paying it. Two new applications that come under this is pay as you go and XAAS ( X as a Service)
[31].

III. HISTORICAL EVOLUTION OF CLOUD COMPUTING


3.1 Enterprise computing systems
Considering enterprise computing cloud has covered many phases including utility computing, grid computing using
Software as a service (SAAS) and application service provision (ASP).
3.2 Input and output systems
As cloud computing is being the ultimate need for all the users and the institutes for getting their data to be stored in
a large setup, the information technology directors are trying to build the input output systems for making the cloud
a hardware access [62].
Cloud environment provides a facility in vast scope where it is dealing by a single vendor, having a company
controlled by multiple vendors or by different companies working together may be consuming the whole world.
Cloud computing could be very beneficial for the information technology users.
3.3 Storage Means
3.3.1 Pay as you go storage
The cloud is IT infrastructure as a service. The IT infrastructure is delivered as virtual machines. Automation moves
those VMs around, thereby providing the delivery mechanism for the service.
Cloud computing consist of the environment in which we have applications at software level controlling cloud
services and the hardware that provide the cloud medium over the internet. Data that is entered over the software
and the hardware mean is uploaded in cloud [31].
Cloud is not provided freely always in services like mobiles we have cloud applications but we can access that cloud
storage by having an internet medium it cant be free; so one has to pay for getting the required services of the
cloud[14]
3.3.2 Virtual Machines
Cloud computing or the cloud consist of numerous hardware machines that are provided to their end users connected
from virtual machines where the data is stored. These virtual machines (hardware) are only limited in the way that
their specifications cannot exceed that of their host (the underlying physical machine).
3.3.3 Virtual history
Virtualization is a technique that arises from an approach of making multiple virtual machines to run on a single
system. It consist of a virtualization layer which is build up by using a software and that software can install multiple
operating systems; these operating systems can run simultaneously independently within a secured environment.
Virtualization consist of three divisions: the client virtualization, the server virtualization and the storage
virtualization.
Virtualization fits in Internet of things (IoTs) by, Cloud Setups, Server Consolidation, Servers, Load Balancing,
Usage Accounting, Fairness, Security, Fog Nodes, Security, Data/ Computation migration to Clouds, Dealing with
the underlying heterogeneity of the fog nodes, Client Devices, Versatility, Security in smart phones (other hand-held
devices), Security of the critical components in automobiles, Data/ Computation migration to fogs and clouds. Many
IoT applications require a proper system support like complex development of large-scale applications, real-time
interaction and dynamic workload handling is also required and usually the applications run on heterogeneous
devices having poor resources.
Information technology has had a simultaneous shifts in evolution of paradigm, for example from Main frames to
the invention of personal computers and now most recently mobile computing, then from standalone computers,
peerto-peer, client-server, distributed systems and then the breakthrough of all times the internet in the 1990 [65].

IV. CLOUD COMPUTING PREDECESSOR PARADIGM


Cluster computing and grid computing are the immediate building blocks of cloud computing.

Figure 1: Computing history

4.1 Cluster
Cluster provides the formation of single entity that act as single administration domain when they are allocated.
4.2 Grid system
In a grid system the resources are geographically distributed across different administrative domains with their own
goals and management policies.
4.3 Cloud computing
Cloud platform possesses the characteristic of both, the cluster and grids, plus its own special attributes and
capabilities such as virtualization, web services interfaces having dynamic services, and also the support for creating
third party value added computing storage and application services.

V. CHARACTERISTICS OF CLOUD COMPUTING


5.1 Services provided on demand
Using a cloud user can get the services which one needs for resolving his problems.
5.2 Huge access of network
Cloud computing is a technique that works within an internet range so for getting the Cloud one needs to have a
great internet networking.
5.3 Resource pulling
Cloud is build-up of a multi-tenant model that consist of many physical means of data storage and if in case one
system is not working properly, then on its place another system works for making it convenient for the user to not
to waste his time.
5.4 Large storage capacity
Clouds have a large medium of storing a data and the user cant question for the virtual storage when there is a need
of storing large data.
5.5 Measured services
Services in cloud are in measured range like storing, retrieving, adding, deleting and checking for the stored data.
5.6 Resource Democratization
The data provided in the cloud is stated to be public or private, and not only stated it is stored in a way that if it is
public can be accessed by anyone, for private it can be used to the user only who are intended to use that data inside
the cloud others cant see or retrieve it.
5.7 Service oriented Architecture
Cloud provided its user with variety of services in different fields like in a form of application software or could be
in a form of platform. So basically it has multiple of ways for the data handling.
VI. CLOUD DEPLOYMENT MODEL
There are basically four models in which the cloud computing is categorized
6.1. Public cloud
A cloud medium that is accessible by each user and could be seen by other users and are easy enough to be seen by
everyone
6.2. Private cloud
It is a service that is provided to the users along with the provision of a secure medium, data saved in the private
clouds cant be easily get by anyone.
6.3. Hybrid cloud
Hybrid cloud consist of two or more companies sharing some of the resources at public level and some to be stored
in private cloud.
6.4. Community cloud
it consist of both the public or the private cloud.

VII. BENEFITS OF CLOUD COMPUTING


Cloud computing is the technique introduces few years ago that helps its user in solving the problem of storing their
data. One doesnt need to get anxious of where to store its data using a network Cloud has solved this problem.
[57].

VIII. CLOUD MIGRATION STRATEGY


For establishing the cloud migration strategy the company or the user that is performing that operation need t build
up a scenario that in which case the user gets the appropriate migration feature. For data migrartion there are three
basic schemes

Data Data Data


collection migration integration

Figure 2: Basic schemes of data migration

One of the migration strategies which can be implemented can be big bang migration it is quick approach of
migrating a data in cloud. It focuses on testing the data that is needed to be stored and then a critical path is
registered for its storage. Emergency migration can also be handled if user wants an immediate storage.
Trickle migration is also another form of migration that is complex to adopt but it handles the data trickle by storing
it where there is free space and from the medium where there is comparatively less load.

IX. USING THE CLOUD FOR DATA MIGRATION AND THE LEGAL IMPLICATIONS
The way of migrating the data by using the cloud service is not that much complex and expensive task, but it is the
suitable way of connecting the systems together within the internet. Elastic cloud compute is one of the service of
the cloud that is becoming very famous now days; Amazon Elastic compute cloud (EC2) and windows Azure uses
great features of cloud computing [17].
Many companies are working on reducing the cost of migration in information technology operations by using
virtualization techniques.
Security is one of the major concerns while transferring the data; sending masses of data from one cloud to other or
getting the data back from the cloud should pass through Prediction based Encryption (PBE) which check the person
accessing that data. Prediction based Encryption is a technique that works for checking that whether the user is
having the same identification record from the time the data was stored in the cloud. If the user has the same
identification, one can get the data and if not then he is decrypted and is not further provided with getting the data
from that specific cloud. Predication based Encryption (PBE) works on four basic operations that are setup, KeyGen
(Key Generation), Encrypt and Decrypt.
X. CLOUD SERVICES TAXONOMY

Figure 3: Taxonomy services in cloud

XI. ADVANCEMENT NEEDED IN CLOUD COMPUTING


The data stored in the cloud is not completely secured. The attackers can hack or attack on the system from
anywhere to get the access to the data stored in the cloud medium. One more failure in cloud computing is that, the
user itself is not sure about whether his data is still secured from the unauthorized users. Latency is too high with the
impractical resiliency.

XII. DATA STORAGE AND SECURITY IN CLOUD COMPUTING


Along with these it provides effective and secure storage protocols for a service provider. Storage security of data
contains cloud types and on the basis of that it implements a service secure platfor3m. Secure and dependable
storage services are designed to support secure and dynamic operation using block modification, deletion and
append [36].
Optimal cloud storage consists of data processors that process the Data Processor (DP) and the Data Verifier (DV)
to check whether data has been tampered with the tokens generator that helps to get the segments of users data by
enabling the cloud storage. File storage security management provides a client server chunking systems which
stored data with a secure system.
Cloud storage architecture consist of front end that export and API to access the storage. Behind the front end there
is a layer of middleware that is called storage logic which implements the variety of features such as data
replication, data reduction, along with data-placement algorithms.
Figure 4: Cloud storage working

Users are the one that forms a connection to the network then they manage to get to the storage by using front end in
entering that stage and back end storage result in getting the confirmation of getting that storage access. Application
program interface (API) is a language useful in storing the data in cloud. REST (representational state transfer) API
are also about to change the state of resources through the representation of those resources.

XIII. MULTI OBJECTIVE PARAMETERS FOR REAL TIME SCHEDULING IN CLOUD


COMPUTING
Cloud computing is an architecture that handles internet based services. A Cloud data Centre usually deploy many
services packed closely together to make most of the space for utilizations, improvement in efficiency of the
networks that are being communicated are the basic need of cloud computing and it depends upon the size of L2
cache. The systems models generate the request for scheduler to achieve the desire resources over internet it
consider of few steps are in order to preterit virtual resources before they become the part of scheduling mechanism.
The larger tasks are divided into further small tasks and then a queue head is assigned, in this way the task that is
preferably queued start the work process. The task queued according to their calculation of the ability which one is
strong or weak. By using response time and efficiency count resources are allocated in virtual machines [45].

XIV. FOG COMPUTING- A NEW STAR IN THE UNIVERSE OF CLOUD

Some security issues have been investigated and the resulting administrative legal issues using cloud computing [7].
Significantly, the lack of interoperability between system-level tools is one of the key issues of the Security Content
Automation Protocol.
By controlling the challenges it is concluded that security controls are not that much successful in cloud computing
environment. By using the cryptographic technique one can easily implement services like web application and
virtualization, along with platforms like SaaS and PaaS. So basically, these tasks are of special interest for further
cloud computing security research [8].
The consistency and availability of cloud resource issues is offered by the trusted third party. The attacks are now
distributed denial-of-service attacks. The solution to these attacks can be flexible flexibility in the cloud, the ability
to provide resources where it is necessary to prevent the closure of the site. All user data is stored in an external
location, and the location must be adequately protected to handle data theft and malicious intrusions that protect our
data.
In [10], a hierarchy of administrators within cloud service providers and examples of actual internal threats were
provided. Two more insider-risk clouds are: Insiders using cloud-based problems to steal information from cloud
systems, and others using cloud systems to attack resources from an employer. A technique that was a software
decoy for securing cloud data using software helps the system to build a Java code which appears as precious
information to the attacker [11].
Considering the user behavior profile he has checked when and how the amount of information a user is accessing
[4].

XV. ADVANTAGES OF FOG COMPUTING


Following are the advantages of fog computing:
Data close enough to the user at the end
Data is used by the user at the data Centre in a specified location and then is further transmitted; delays may occur in
the elimination of data [2].
Choose matte geographical spread
Extend Fog computation cloud services directly to the creation of the network board on many items. Solid
infrastructure is helping geographically in many ways, big and data analysis can be performed faster, the
administrator can support the mobility of applications based on the location and not to cross the entire WAN and
finally, the system has advanced to such that the analysis of real-time data actually made scale that is truly amazing.
Support for mobility and Internet of everything ( IoE)
The number of devices and the data may increase immediately. Administrators can take advantage of the fog to
check where the users are allocated and how they get the access to the data they needed. And other services for the
benefit of end users, the network and the fog became more frequent.
Vertical often are willing to take
"The Internet of Things" The term "fog computing" was Cisco Systems has introduced a new paradigm to support
the transfer of data to wireless devices distributed in a number of distributed computing and storage start-ups also
help determine the punishment. It is based on the concept of distributed computing for such content distribution, but
allows the delivery of more complex services through the usage of cloud technology.

XVI. THE FLAWLESSMIXTUREOF THE CLOUD AND OTHER SERVICES


Services that the experience clouds haze isolate user data must stay there to improve in edge. From, administrators
are able to analyze the wire, security or other services directly into their cloud models. Infrastructure still has the
concept of the integration of the power of the board of the fog cloud computing [51].

Figure 5: Clouds - Fog Devices

XVII. LACK OF FOG COMPUTING


According to an elevation view, some of the advantages defects computing fog function.
Physical location there is those who dispute the fact that the point of using Cloud is access to information and
resources from anywhere, even though the physical location. Although Fog calculation serves as a more effective
way to determine the remaining central and local data, some see the limits of it are dangerous while accessing data
[53].
Safety was once considered the basic advantage for the user but recent years, security issues will actually be a matter
of trust. Some organizations find it easier to keep their data in a central location rather remote is different, although
the first option board can aggravate data when considered globally. Confusion there is also the prospect that the
computing facility lacks only adds to the number of options and unnecessarily complicated cloud architecture that is
already quite complex. In theory, the experts will meet the same opinion on the subject in general [3].

XVIII. FOG COMPUTING: CONCEPTS, APPLICATION AND ISSUES


The internets of things have become more powerful from years and its consider as the future of internet but its
still contains many problems like it require low latency, awareness of the location, geo distribution and support for
mobility. Fog computing provides the computing through fog nodes. The devices are categories among resource
poor device and resource rich device. Resource rich machine consists of cloudlet and IOs.
Fog computing consults of parties that provide a sustainable business model which are internet service provider
which can construct infra-structure of fog and cloud service provider who wanted to expand their cloud services to
the end of the network.
The resource sharing optimization problems can be sort out by maximizing the sum or product of service oriented
utility function. Authentication, access control intrusion detection privacy is the factors that create issues in fog
computing [4].

XIX. FOG COMPUTING VS CLOUD COMPUTING

REQUIREMENTS GATHERING CLOUD COMPUTING FOG COMPUTING

Latency High Low


Delay jitter High Very low
Location of service Within internet At the edge
Distance between client and server Multiple loops One hope
Security Undefined Can be defined
Attack on data enroot High Very low
Location awareness probability probability
Scalability No Yes
Geo-location Yes No
No. of server nodes Centralized Distributed
Partitioning Few Very large
Support for mobility Available Unavailable
Real time interaction Limited Supported
Type of last mile connectivity Leased line Wireless

Table 1: Requirements of cloud vs. Fog computing

CLOUD COMPUTING FOG COMPUTING


Data and application processing , that is time consuming Unlike centralized system for cloud, fog is an edge network that is less
time consuming

Every bit of data sent over channels of internet provides Near enough to the user so have high bandwidth
low bandwidth

Response time is slower Avoid response time , work is done quickly

Scalability, as the user depends on remote places Scalability is avoided

Table 2: Cloud computing vs. Fog computing


XX. FORGET THE CLOUD COMPUTINGS FUTURE IS IN THE FOG
Cloud is up there somewhere at a distant locality available to the user. Fog is somewhere near enough to the ground.
A user is at the ground waiting for the most preferable medium for data storage and for acquiring different needs
[13].
Fog is an important development in cloud computing and IT in general. Presence shows the emergence of a
decentralized model to calculate a more flexible and agile than the traditional paradigm focused. Not agility and
flexibility through large data applications as IOT and low latency requirements or needs. Fog Computing is not a
panacea reflects the unique needs of the IOT and the inevitable move towards mobile computing requirements.
Identifies at least try to model centered areas. More traffic and more with less bandwidth and network functions,
such as Big Data attract growth response provides a sustainable architectural solution to the problem, self-
improvement in a short time [6].

XXI. DATA MIGRATION BETWEEN CLOUD AND FOG COMPUTING


Cloud computing is an internet based approach which helps to provide many services to their users over the internet
to store their data, manage in saving different files or data in a cloud so that they could easily access it any time from
the cloud. A shared resource is provided to their users by third party data Centre on which user relies as a utility
service. [11].
Cloud computing has quickly gained mainstream adoption. For the need of transmitting and the processing of data
one need more bandwidth for more data. Wireless networks that use the cloud have their own limitations. Data
transmission simply isnt fast enough. Amplifying these problems is the growth of Internet of things, which will use
more data and require much more bandwidth. Fog computing comes as an edge network which acts as near service
for getting the data than cloud, as using Fog our bandwidth speed becomes high.
Fog processes the data at local levels by handling the entire data over the internet. It helps cloud systems by easing
the burden of processing data. Cloud computing isnt right for everything but standard centric objections are mostly
wrong much standard work is pointless wasted effort [47]. Cloud computing needs are specific not vague. For most
services there are simple ways to avoid lock-in. we need accountable, well behaved vendors. Evaluative standards
would be helpful but are not critical [5].
Consider an example there is a system having an internet facility and a user is handing that data and a mobile phone
is connected to that system with a cable so it act as a fog; a service near enough to the user but it is just an example
of what Fog acts to be. For Fog one doesnt need a system to handle it, it can directly work for a certain task. While
migrating, the data from cloud to fog there is a need of cloudlets that attach cloud to the fog using fog nodes at the
other end of fog computing.
Figure 6: storage networks

XXII. 23. TYPES OF DATA INVOLVED IN CLOUD AND FOG COMPUTING


25.1.Bulk data
Bulk data is collection of electronic data that consist of information extracted from various multiple records. These
records form a relationship to each other that form a single or multiple databases. From that database we get our
required data in a form of common electronic file type. Bulk data transfer type is a kind of software application that
highlights following features like data compression, blocking data and for data buffering to optimize large files data
transfer. The most common bulk data transfer way is using File transfer protocol (FTP).
25.2.Hot data
Hot data is data that needs to be accessed frequently. It is typically business-critical information that needs to be
accessed quickly and is often used by a company for quick decision making. Hot data usually resides on the fastest
storage typically flash in hybrid or tiered storage environments. Conversely, cool data is data that is accessed less
frequently by an organization. Cool data is usually stored on lower performing and less expensive storage
environments in-house or in the cloud.
25.3. Cold data
Cold data is the data that is being in-active for a specific time period or you havent access it for over a year. Low
cost, high storage capacity and durability are the key features of cold data. Cold data is the data that is saved in a
cloud as bulk data processing; it can be of enormous sizes [6].
The process of retrieving the data and the response time can be comparatively slower than active or hot data that are
on cloud storage. Linear tape files system (LTFS) tapes that are low commodity hard disk drives
Figure 7: Moving from cloud to fog

Moving from cloud computing to fog computing there are different types of data migration techniques and IoT
which changes the way we live and work by providing more facilities towards computing. Internet of services
provides objects which are assigned an IP addresses that helps to regulate the traffic of data transferring over the
internet. Sending a lot of data and managing it with great ability needs a key point that is bandwidth. Fog computing
then arises to deal with local data processing by taking place of the router rather than transmitting the whole data.
For Example considering a dining table where many people are seated to eat food with a condition of no plates no
spoons or forks are provided, the people who dont have the manners to eat make it possible to eat it without any
inconvenience where else civilized people wait for the waiters to put plates and spoons on table so that they could
partake of their dinner. From this the conclusion that food is a cloud and those plates are fog, fog helps to get that
specific data which are needed to fulfill all desires. Fog computing is a technique that is rich of services while
providing services to their users that includes secure networking, managing the traffic flow, geo-distribution at
analytical site, mobility, awareness of location, provision of low latency, real-time support and Heterogeneity [7].
For data migration a virtual machine is needed that shift the entire operating system from one physical machine to
another. Data transmission requires a preparation time between initiating migration process and transferring the data
to target node. Down time is the time of processing and execution of data towards its destination. Resume time is the
time of pausing the data time and ending the data migration. Total migration time taken by the migration process is
from the start till the end of the process. It is very important as it affects the release on both sources and destination
or from cloud to fog [67].
XXIII. ARCHITECTURAL FLOW FROM CLOUD TO FOG

Figure 8: Basic Architecture

A centralized technique is used in cloud computing. Data Centre that helps in hosting of application and
management. Core networking and services which consist of internet protocols (IPs)
Multi-protocol label switching (MLPS) is a protocol which is useful for speeding up the network traffic flow by
giving it a specific orientation or flow of working. Multi- protocol label switching allows the packet to move forward
at switching phase rather than at the routing level. Service provider of the network makes each packet to get labeled
on its entry by the routing device through which data packet enters a network from another network. Then the data is
moved towards the field area network or towards the fog computing by multi-service edge by the Ethernet and
programmable logic controller (PLC).
End-point computing comes up with distributed channels consist of smart and less smart networks, vehicles ,
machines , wireless or wired connections.
Cloud computing at the core consists of key use cases that are large batch jobs, Direct current bursting, storing the
data and web hosting. Areas of applications are deep data mining, searching and financial algorithms along with
ecommerce. Web applications are the software frameworks needed for cloud computing. Scalability, security and
availability are the key requirements for making the connection and migration efficient. Enterprise, individuals are
the actors who can make this migration possible [2].
When the data is to be migrated from cloud to fog some key use cases are very useful that are mobile content
delivery, geo-distribution sensors, actuator networks and distributed systems for large scale working. Streaming the
videos, different gaming facilities, smart cities, environmental monitoring, Space construction vehicles, smart grid
and transportation are the areas where this is required. Software frameworks consist of rendering, fusion and control
loops. Low latency, geo-distribution, security, privacy, partitioning, are the key requirements of fog computing [57].
End subscribers, service providers, utilities, federal/state agencies and manufactures are the end users and providers
of this computing system.

XXIV. UNIQUE POSITION OF FOG DEVICES


Fog devices form a specific client server relation by forming the fog nodes that connects to our cloud or the devices
by using these nodes. It is called as a edge network as its characteristics conclude fog for the wired or wireless edge
network setup. [8].
Figure 8: Working on fog

XXV. CONCLUSION
It works better than fog cloud computing to meet the demands of the new paradigm. There is no cloud computing,
because it has always been a high level of employment treatment too late related technology very common IT and
questions raised about the quality of service in new business opportunities and challenges in the fog, interface,
resource management, security and privacy of relief. computer fog promote the rapid development of advanced
computer equipment to form the basis of radio access techniques, SDN, NFV, VM and moving clouds. It is believed
that there is a promising technique but still requires the joint efforts of collecting the underlying technology for "Fog
Computing". Edge IT plays an important role in the Internet of Things. In fact, there are studies on safety, privacy
and computer fog platform research equipment reliability found system. Raking fog to speed up congestion and
awareness of computers and respond to events in a journey through the solution for the analysis solution for the
cloud. This helps in degrading the gigabyte bandwidth rate that is for core network traffic. It along with this also
protects the IOT data analysis in the walls of the company. Ultimately, the benefits organizations make deeper and
faster to preview the fog greater flexibility, service levels and send more security. Fog computing is also an IOT
intelligent platform for the distribution and management of real-time infrastructure will arise naturally. To develop
services on the board operators to lead the new network that is fog computer for business models and opportunities.
Fog Computing paradigm of the growing network to help the thresholds that require faster with less delay and
treatment jitter, cloud computing can help companies reduce the needs of high-end pay the cost of a model-based
utility pricing.

XXVI. REFERENCES

1. Dai Yuefa, Wu Bo, GuYaqiang, Zhang Quan, Tang Chaojing.


2. . Data security model for cloud computing. Qingdao, China : Proceedings of the 2009 International
Workshop on Information Security and Application (IWISA 2009), November 21-22, 2009.
3. J Suresh Babu, K Kishore, K E Naresh Kumar. 2013.
4. . Migration from Single-Cloud to Multi-Cloud Computing. 2013.
5. Kumar, Aakash.
6. . Evolution of cloud to fog. 25 sep 2015.
7. Chalmers, Rachel, et al., et al. Cloud Computing- pay as you go .s.l. : UC Berkeley RAD Labs, October 20th,
2008.
8. ShyamliDewan, Devendra Kumar, SandeepGonnade. Secure Data Migration across Cloud System .india :
International Journal of Innovative Research in Science, 6, June 2015.
9. Swati Agarwal, ShashankYadav, Arun Kumar Yadav. An architecture for elastic resource allocation in Fog.
Agra, India : Available at www.csjournals.com, sep 2015.
10. Kang, Jagvinder. Cloud ccomputing: Using the cloud for Data Migration and The Legal Implications. India :
Technology Law Alliance .
11. M. Yannuzzi, R. Milito, R. Serral-Graci, D. Montero , M. Nemirovsky. Key ingredients in an IoT recipe: Fog
Computing,.Spain : Senior ICREA Researcher at Barcelona Supercomputer Center (BSC), DECEMBER 2014.
12. ParvinderKaur, Manish Mahajan. Integration of Heterogeneous Cloud Storages .Landran , India : I.J.
Information Engineering and Electronic Business, 2015, 3, 45-51, 2015.
13. Virendra Singh Kushwah*, AradhanaSaxena*. A Security approach for Data Migration in Cloud .s.l. :
International Journal of Scientific and Research Publications, Volume 3, 5, May 2013.
14. Wetzel, By Peter Sevcik and Rebecca. Seeing Through the Fog: Managing . February 2011 .
15. Ramachandran, Kishore. System Support for Internet of Things. Atlanta, Georgia, U.S.A. : BIG DATA Industry
Forum sponsored by the Institute for Data & High , March 27, 2014.
16. QingniShen, Lizhe Zhang, Xin Yang, Yahui Yang, Zhonghai Wu, Ying Zhang. SecDM: Securing Data Migration
Between Cloud Storage Systems. Beijing, China : Ninth IEEE International Conference on Dependable,
Autonomic and Secure Computing, 2011.
17. Noor Ibrahim Hussein, MervatHashem, Zhiyong li. Security Migration Requirements: From Legacy System
to Cloud and from Cloud .Iraq , China : 2nd International Symposium on Computer, Communication, Control
and Automation , 2013.
18. Evolution of cloud to fog. Kumar, A. 25 sep 2015.
19. Fog computing: Mitigating insider data theft attacks in the cloud. Keromytis, Stolfo Salvatore J. Malek Ben
Salem and Angelos D. 2012, Security and Privacy Workshop (SPW) , IEEE.
20. Fog Computing to protect real and Sensitivity information in Cloud ".ThogarichetiAshwini, Mrs.
Anuradha.S.G,. ' International Journal of Electronics and Computer Science Engineering', pp. 19-29. .
21. An architecture for elastic resource allocation in fog. Swati Agarwa, S.Y. sep 15.
22. A security approach for data migration in cloud. Virendra Singh Kushwah*, A .S. 5, May 2013, International
Journal of scientific and research publications, Volume 3.
23. Seeing through the fog. Wetzel, B .P. febraury 2011, Managing.
24. Reliability in the utility computing era: Towards reliable fog computing. . Madsen Henrik, et al. 2013,
System , Signals and Image processing ( IWSSIP ), 20th INternational Conference on IEEE.
25. Data security in the world of cloud computing. Kaufman, L. M. 2009, Security and privacy, IEEE.
26. Understanding cloud computing vulnerabilities .Grobauer, B, Wallschek, T ,& Stocker, E. 2011, security and
privacy, IEEE.
27. Cloud computing security threats and responses. Sabahi, F. 2011, In communication software and networks
(ICCSN), IEEE 3RD INTERNATIONAL CONFERENCE.
28. Insider threats to cloud computing. Claycomb, W. R, &Nicoll, A. 2012,july , Directions for new research
challenges, In computer Software and Applications Conference ( COMPSAC), IEEE 36th Annual .
29. Software decoys for insider threat. Park, Y, &Stolfo, S. J. 2012, May., In proceeding of the 7th ACM
symposium on Information, Computer and Communication Security.
30. Software decoy for insider threat. Park. Y &Stolfo, S. J. May, 2012, In proceeding of the 7th ACM
Symposium on INformation, Computer and Communication Security.
31. Cloud computing -pay as you go. Chalmers, R., Williamson, A., Berkeley, Wolski, R., & Reed, D. october
20th, 2008, UC Berkeley RAD Labs.
32. Dai Yuefa, W.B. Data security model for cloud computing. Qingdao, China : proceedings of the 2009
international workshop on information security and application, november 21-22, 2009.
33. MIgration from single-cloud to multi-cloud computing. J sureshbabu, K. K. 2013.
34. Cloud Computing: Using the cloud for data migration and legal implications .Kang., J. INDIA, Technology law
alliance .
35. Key ingredidents in an Iotreciepe . M. Yannuzzi, R M-G. December 2014, FOG COMPUTING,.Spain : Senior
ICREA Researcher at Barcelona SuperComputer Center (BSC).
36. Noor Ibrahim Hussein, M. H. Security Migration Requirements: From legacy System to cloud and from
Cloud. Iraq, China : 2nd international Symposium on computer, Communication, Control and Automation,
2013.
37. ParvinderKaur, M. M. Intergration of herterogeneous cloud storages. Landran, India : Information
engineering and electronic business, 2015.
38. Qingnishen, L. Z. SecDM: Securing Data Migration between cloud storage systems. Beijing, China : ninth
IEEE international Conference on dependable, Autonomic and secure computing, 2011.
39. Ramachandra, K. System Support for internet of Things. Atlanta, Georgia, U.S.A : Big data: Industry forum
sponsored by the institute for data & high, March 27, 2014.
40. ShyamliDewan, D. K. Secure Data migration across Cloud System. india : international journal of innovative
research in science., 6, June 2015.
41. Connected vehicles, the internet of things, and fog computing. Bonomi., F. s.l. : VANET 2011, 2011, VANET
2011.
42. Reasoning about naming systems. M. Bowman, S. K. Debray, and L. L. Peterson. November 1993. , ACM
Trans. Program. Lang. Syst., 15(5):795825.
43. An extensive empirical study of feature selection metrics for text classification. Forman., G. Mar. 2003. , J.
Mach. Learn. Res., 3:12891305,.
44. The cubic mouse: a new device for three-dimensional input. Plate., B. Frohlich and J. 2000, In Proceedings
of the SIGCHI conference on Human factors in computing systems, CHI 00, pages 526531, New York, NY, USA,
2000. ACM. .
45. Constraint satisfaction and debugging for interactive user interfaces. Sannella, M. J. 2003.
46. Modeling and simulation design. Tavel., P. 2007.
47. "The Fog Computing Paradigm: Scenarios and Security Issues ". Wen, Ivan Stojmenovic and Sheng.march-
april,2015, international jounal of enngineering research and general science volume 3. issue 2, march-april
2015.
48. "Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. Salvatore J. Stolfo, Malek Ben, Angelos
D. Keromytis. ,'IEEE'.
49. "Fog Computing: Will it be the Future of Cloud Computing?".Mohamed Firdhous, Osman Ghazali and
Suhaidi Hassan. 2014, 'Third International Conference on Informatics & Applications, Kuala Terengganu,
Malaysia, 2014, pp. 8-15. .
50. Review on Fog computing: Reducing Insiders data theft attack in cloud computing,.Prof. Pranalini Joshi
and Asavari Smart, .2014, International Journal of Innovative Research in Advanced Engineering (IJIRAE)',
2014, Volume 1 Issue 3, pp.50-53. .
51. FOG Computing and Its Role in Internet ".MunawarKhatoon, . 2014, 'Internatinal Journal & Magazine of
Engineering, Technology, Management and Research , 2014, Volume No: 4 (2014), pp. 72-74. .
52. Fog Computing to protect real and Sensitivity information in Cloud ".ThogarichetiAshwini, Mrs.
Anuradha.S.G,. ' International Journal of Electronics and Computer Science Engineering', pp. 19-29. .
53. Fog Computing: Characteristics, Advantages and Security-Privacy,. V. Anil Kumar, E.Prasad,.2014,
International Journal of Computer Science and. Management Research', 2014, VOL 3, pp.4212-4215.
54. Fog Computing: Focusing on Mobile Users at the Edge. Tom H. Luan, LongxiangGao, Yang Xiang and Zhi Li,
Limin Sun,.6 Feb 2015, 'arXiv', 6 Feb 2015.
55. F. Bonomi. Connected vehicles, the internet of things, and fog computing,. Las Vegas, USA : in The Eighth
ACM International Workshop on Vehicular InterNetworking (VANET)., 2011.
56. Fog computing and its role in the internet of things,. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli,. 2012,
in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC12. ACM, 2012,
pp. 1316.
57. A view of cloud computing, . M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee,
D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia,. apr 2010, Commun. ACM, vol. 53, no. 4, pp. 5058, Apr
2010.
58. On optimally reducing power loss in micro-grids with power storage devices,. C. Wei, Z. Fadlullah, N.
Kato, and I. Stojmenovic,.2014, IEEE Journal of Selected Areas in Communications, 2014 to appear. .
59. The internet of things: A survey, . L. Atzori, A. Iera, and G. Morabito,.2010, Comput.Netw., vol. 54, no. 15,
pp. 27872805, Oct. 2010.
60. Cooperative data dissemination in hybrid vehicular networks. K. Liu, J. Ng, V. Lee, S. Son, and I.
Stojmenovic,. 2014, Vanet as a software defined network, Submitted for publication, 2014.
61. Software-defined networking, . K. Kirkpatrick. 2013, Commun. ACM, vol. 56, no. 9, pp. 1619, Sep. 2013. .
62. Cisco delivers vision of fog computing to accelerate value from billions of connected devices, .Cisco.
2014, Cisco, Tech. Rep., Jan. 2014.
63. Opportunistic spatio-temporal event processing for mobile situation awareness,. K. Hong, D. Lillethun, U.
Ramachandran, B. Ottenwlder, and B. Koldehofe,.2013, in Proceedings of the 7th ACM International
Conference on Distributed Event-based Systems, ser. DEBS'13. ACM, 2013,pp. 195-206.
64. Reliability in the utility computing era: Towards reliable fog computing, . H. Madsen, G. Albeanu, B.
Burtschy, and F. Popentiu-Vladicescu,.2013, in Systems, Signals and Image Processing (IWSSIP), 2013 20th
International Conference on, July 2013, pp. 4346.
65. Mobile fog: A programming model for large-scale applications on the internet of things,. K. Hong, D.
Lillethun, U. Ramachandran, B. Ottenwlder, and B. Koldehofe,. 2013, in Proceedings of the Second ACM
SIGCOMM Workshop on Mobile Cloud Computing, ser. MCC13. ACM, 2013, pp. 15-20.
66. . K. Hong, D. Lillethun, U. Ramachandran, B. Ottenwlder, and B. Koldehofe. 2013, in Proceedings of the
Second ACM SIGCOMM Workshop on Mobile Cloud Computing, ser. MCC13. ACM,2013,pp.15-20.
67. Serviceoriented heterogeneous resource sharing for optimizing service latency in mobile cloud,. T.
Nishio, R. Shinkuma, T. Takahashi, and N. B. Mandayam. 2013, in Proceedings of the First International
Workshop on Mobile Cloud Computing and Networking, ser. Mobilecloud'13. ACM,2013,pp.19-26.IVAN
STOJMENOVIC,SHENGWEN: THE FOG COMPUTING PARADIGM7.
68. Migcep: Operator migration for mobility driven distributed complex event processing,. B. Ottenwalder, B.
Koldehofe, K. Rothermel, and U. Ramachandran. 2013, in Proceedings of the 7th ACM International
Conference on Distributed Event-based Systems, ser. DEBS13.ACM,2013,pp. 183-194.
69. Improving web sites performance using edge servers in fog computing architecture,. J. Zhu, D. Chan, M.
Prabhu, P. Natarajan, H. Hu, and F. Bonomi. 2013, in Service Oriented System Engineering (SOSE), 2013 IEEE
7th International Symposium on, March 2013, pp. 320-323.
70. Building the environment for the things as a service, . BETaaS. 2012, BETaaS, Tech. Rep., Nov. 2012.
71. Dependable demand response management in the smart grid: A stackelberg game approach,. S.
Maharjan, Q. Zhu, Y. Zhang, S. Gjessing, and T. Basar. 2013, Smart Grid, IEEE Transactions on, vol. 4, no. 1, pp.
120 132, March 2013.
72. Solving stackelberg games with uncertain observability,. D. Korzhyk, V. Conitzer, and R. Parr. 2011, in The
10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3, ser. AAMAS 11,
2011, pp. 10131020. .
73. Gtes: An optimized game-theoretic demand-side management scheme for smart grid, . Z. Fadlullah, D.
Quan, N. Kato, and I. Stojmenovic. 2014, Systems Journal, IEEE, vol. 8, no. 2, pp. 588597, June 2014.
74. Sensor openflow: Enabling softwaredefined wireless sensor networks,. T. Luo, H.-P. Tan, and T. Quek.
2012, Communications Letters, IEEE, vol. 16, no. 11, pp. 18961899, Nov. 2012. .
75. Forwarding methods in data dissemination and routing protocols for vehicular ad hoc networks,. Y.
Daraghmi, C.-W. Yi, and I. Stojmenovic. 2013, Network, IEEE, vol. 27, no. 6, pp. 7479, November 2013.

You might also like