Professional Documents
Culture Documents
Communication Engineering
Abstract:
The cloud computing has quickly gained mainstream adoption but fog computing has potential to be just as
dominant if not more so. Fog computing seats processes and possessions at the edge of the cloud, frequently on
network devices, while data remain stored in the cloud. This leads to faster processing time and fear resources
consumed. In addition we have gathered the benefits and drawbacks of both cloud and fog computing in order to find
that which computing network is more helpful and will be used by the customers in futuristic needs.
Keywords: Cloud computing; Fog computing; Internet of things (IoTs); Internet of everything (IoEs); Data
migration.
4.1 Cluster
Cluster provides the formation of single entity that act as single administration domain when they are allocated.
4.2 Grid system
In a grid system the resources are geographically distributed across different administrative domains with their own
goals and management policies.
4.3 Cloud computing
Cloud platform possesses the characteristic of both, the cluster and grids, plus its own special attributes and
capabilities such as virtualization, web services interfaces having dynamic services, and also the support for creating
third party value added computing storage and application services.
One of the migration strategies which can be implemented can be big bang migration it is quick approach of
migrating a data in cloud. It focuses on testing the data that is needed to be stored and then a critical path is
registered for its storage. Emergency migration can also be handled if user wants an immediate storage.
Trickle migration is also another form of migration that is complex to adopt but it handles the data trickle by storing
it where there is free space and from the medium where there is comparatively less load.
IX. USING THE CLOUD FOR DATA MIGRATION AND THE LEGAL IMPLICATIONS
The way of migrating the data by using the cloud service is not that much complex and expensive task, but it is the
suitable way of connecting the systems together within the internet. Elastic cloud compute is one of the service of
the cloud that is becoming very famous now days; Amazon Elastic compute cloud (EC2) and windows Azure uses
great features of cloud computing [17].
Many companies are working on reducing the cost of migration in information technology operations by using
virtualization techniques.
Security is one of the major concerns while transferring the data; sending masses of data from one cloud to other or
getting the data back from the cloud should pass through Prediction based Encryption (PBE) which check the person
accessing that data. Prediction based Encryption is a technique that works for checking that whether the user is
having the same identification record from the time the data was stored in the cloud. If the user has the same
identification, one can get the data and if not then he is decrypted and is not further provided with getting the data
from that specific cloud. Predication based Encryption (PBE) works on four basic operations that are setup, KeyGen
(Key Generation), Encrypt and Decrypt.
X. CLOUD SERVICES TAXONOMY
Users are the one that forms a connection to the network then they manage to get to the storage by using front end in
entering that stage and back end storage result in getting the confirmation of getting that storage access. Application
program interface (API) is a language useful in storing the data in cloud. REST (representational state transfer) API
are also about to change the state of resources through the representation of those resources.
Some security issues have been investigated and the resulting administrative legal issues using cloud computing [7].
Significantly, the lack of interoperability between system-level tools is one of the key issues of the Security Content
Automation Protocol.
By controlling the challenges it is concluded that security controls are not that much successful in cloud computing
environment. By using the cryptographic technique one can easily implement services like web application and
virtualization, along with platforms like SaaS and PaaS. So basically, these tasks are of special interest for further
cloud computing security research [8].
The consistency and availability of cloud resource issues is offered by the trusted third party. The attacks are now
distributed denial-of-service attacks. The solution to these attacks can be flexible flexibility in the cloud, the ability
to provide resources where it is necessary to prevent the closure of the site. All user data is stored in an external
location, and the location must be adequately protected to handle data theft and malicious intrusions that protect our
data.
In [10], a hierarchy of administrators within cloud service providers and examples of actual internal threats were
provided. Two more insider-risk clouds are: Insiders using cloud-based problems to steal information from cloud
systems, and others using cloud systems to attack resources from an employer. A technique that was a software
decoy for securing cloud data using software helps the system to build a Java code which appears as precious
information to the attacker [11].
Considering the user behavior profile he has checked when and how the amount of information a user is accessing
[4].
Every bit of data sent over channels of internet provides Near enough to the user so have high bandwidth
low bandwidth
Moving from cloud computing to fog computing there are different types of data migration techniques and IoT
which changes the way we live and work by providing more facilities towards computing. Internet of services
provides objects which are assigned an IP addresses that helps to regulate the traffic of data transferring over the
internet. Sending a lot of data and managing it with great ability needs a key point that is bandwidth. Fog computing
then arises to deal with local data processing by taking place of the router rather than transmitting the whole data.
For Example considering a dining table where many people are seated to eat food with a condition of no plates no
spoons or forks are provided, the people who dont have the manners to eat make it possible to eat it without any
inconvenience where else civilized people wait for the waiters to put plates and spoons on table so that they could
partake of their dinner. From this the conclusion that food is a cloud and those plates are fog, fog helps to get that
specific data which are needed to fulfill all desires. Fog computing is a technique that is rich of services while
providing services to their users that includes secure networking, managing the traffic flow, geo-distribution at
analytical site, mobility, awareness of location, provision of low latency, real-time support and Heterogeneity [7].
For data migration a virtual machine is needed that shift the entire operating system from one physical machine to
another. Data transmission requires a preparation time between initiating migration process and transferring the data
to target node. Down time is the time of processing and execution of data towards its destination. Resume time is the
time of pausing the data time and ending the data migration. Total migration time taken by the migration process is
from the start till the end of the process. It is very important as it affects the release on both sources and destination
or from cloud to fog [67].
XXIII. ARCHITECTURAL FLOW FROM CLOUD TO FOG
A centralized technique is used in cloud computing. Data Centre that helps in hosting of application and
management. Core networking and services which consist of internet protocols (IPs)
Multi-protocol label switching (MLPS) is a protocol which is useful for speeding up the network traffic flow by
giving it a specific orientation or flow of working. Multi- protocol label switching allows the packet to move forward
at switching phase rather than at the routing level. Service provider of the network makes each packet to get labeled
on its entry by the routing device through which data packet enters a network from another network. Then the data is
moved towards the field area network or towards the fog computing by multi-service edge by the Ethernet and
programmable logic controller (PLC).
End-point computing comes up with distributed channels consist of smart and less smart networks, vehicles ,
machines , wireless or wired connections.
Cloud computing at the core consists of key use cases that are large batch jobs, Direct current bursting, storing the
data and web hosting. Areas of applications are deep data mining, searching and financial algorithms along with
ecommerce. Web applications are the software frameworks needed for cloud computing. Scalability, security and
availability are the key requirements for making the connection and migration efficient. Enterprise, individuals are
the actors who can make this migration possible [2].
When the data is to be migrated from cloud to fog some key use cases are very useful that are mobile content
delivery, geo-distribution sensors, actuator networks and distributed systems for large scale working. Streaming the
videos, different gaming facilities, smart cities, environmental monitoring, Space construction vehicles, smart grid
and transportation are the areas where this is required. Software frameworks consist of rendering, fusion and control
loops. Low latency, geo-distribution, security, privacy, partitioning, are the key requirements of fog computing [57].
End subscribers, service providers, utilities, federal/state agencies and manufactures are the end users and providers
of this computing system.
XXV. CONCLUSION
It works better than fog cloud computing to meet the demands of the new paradigm. There is no cloud computing,
because it has always been a high level of employment treatment too late related technology very common IT and
questions raised about the quality of service in new business opportunities and challenges in the fog, interface,
resource management, security and privacy of relief. computer fog promote the rapid development of advanced
computer equipment to form the basis of radio access techniques, SDN, NFV, VM and moving clouds. It is believed
that there is a promising technique but still requires the joint efforts of collecting the underlying technology for "Fog
Computing". Edge IT plays an important role in the Internet of Things. In fact, there are studies on safety, privacy
and computer fog platform research equipment reliability found system. Raking fog to speed up congestion and
awareness of computers and respond to events in a journey through the solution for the analysis solution for the
cloud. This helps in degrading the gigabyte bandwidth rate that is for core network traffic. It along with this also
protects the IOT data analysis in the walls of the company. Ultimately, the benefits organizations make deeper and
faster to preview the fog greater flexibility, service levels and send more security. Fog computing is also an IOT
intelligent platform for the distribution and management of real-time infrastructure will arise naturally. To develop
services on the board operators to lead the new network that is fog computer for business models and opportunities.
Fog Computing paradigm of the growing network to help the thresholds that require faster with less delay and
treatment jitter, cloud computing can help companies reduce the needs of high-end pay the cost of a model-based
utility pricing.
XXVI. REFERENCES