Post on 23-Jan-2018
FOG COMPUTING -SCENARIOS AND ITS ROLE IN CLOUD SECURITY
Presented by:
Anjana M. Shivangi (2GI11IS006)
Ashwini A. Patil (2GI11IS012)
1
Under the Guidance of:
Prof. K.S. Mathad
Contents
1. Introduction
2. Security Issues in Cloud
3. Why do we need Fog Computing?
4. Securing Cloud using Fog
5. Fog Computing Architecture
6. What can we do with Fog Computing?
7. Security and Privacy Issues in Fog Computing
8. Conclusion
9. References
2
Introduction
Internet of Things ( IoT)
The Internet of Things (IoTs) can be described as connecting everyday objects like smart-phones, Internet TVs, sensors and actuators to the Internet where the devices are intelligently linked together enabling new forms of communication between things and people, and between things themselves.
Now anyone, from anywhere and anytime can have connectivity for anything and it is expected that these connections will extend and create an entirely advanced dynamic network of IoTs.
3
Cloud computing (Existing system)
Cloud is basically a cluster of multiple dedicated servers attached within a network.
It has provided many opportunities for enterprises by offering their customers a range of computing services.
Current “Pay-as-you-Use” Cloud computing model becomes an efficient alternative to owning and managing private data centers for customers facing Web applications.
4
Fog computing
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network.
Like Cloud, Fog provides data computation, storage and application services for end users.
Fog computing concept is actually a Cloud computing close to the “ground”.
5
Security issues in cloud
1. Abuse and Nefarious use of Cloud Computing
2. Insecure Application Programming Interfaces(API’s)
3. Malicious Insiders
4. Shared Technology Vulnerabilities
5. Data Loss/Leakage
6. Account, Service and Traffic Hijacking
7. Unknown Risk Profile
6
Why do we need fog computing?
Existing data protection mechanisms such as encryption, failed in securing the data from the attackers.
The most evident bottleneck seen, is because of Limited Bandwidth problem.
With the proliferation of cloud computing placing added demands on Internet speed and connectivity, latency is becoming a more critical concern for everyone, from the end user to the enterprise.
Another prominent limitations of cloud computing includes requirement of high speed reliable Internet connectivity and sometimes multi-homing to avoid link outages and high latency, but would be very expensive and complex.
7
Securing cloud using fog8
User behavior profiling
User profiling is a well-knowntechnique that can be applied hereto model how, when, and howmuch a user accesses theirinformation in the Cloud.
Simple user specific features canserve to detect abnormal Cloudaccess based partially upon thescale and scope of data transferred.
9
Decoy system
Decoy data, such as decoy documents, honey pots and other bogus information can be generated on demand and used for detecting unauthorized access to information and to poison the thief’s ex-filtrated information.
Serving decoys will confuse an attacker into believing they have ex-filtrated useful information, when they have actually not.
10
Combining the two technologies11
USER PROFILING
USER PROFILING
DECOY DOCUMEN
T
ORIGINAL DOCUMEN
T
SYSTEM
Fog computing architecture
ADMINADMIN
OPERATIONS
ANSWER TO QUESTIONS
LOGIN
USER
LOGIN
SIGN UP
ANSWER TO QUESTIONS
ENTER USERNAME
ENTER PASSWORD
VIEW MY FILES
SEND MAIL
DOWNLOAD FILES
UPLOAD FILES
ORIGINAL DOCUMENT
DECOY DOCUMENT
FOG COMPUTING
12
What can we do with fog computing?13
Smart grid
Smart Traffic Lights
Software Defined
Networks
Scenarios
Wireless Sensor
Decentralized Smart
Building Control
Internet of Things
Security and privacy issues in fog computing
i) Security Issues:
The main security issues are authentication at different levels of gateways as well as (in case of smart grids) at the smart meters installed in the consumer’s home. Each smart meter and smart appliance has an IP address. A malicious user can either tamper with its own smart meter, report false readings, or spoof IP addresses.
ii) Privacy Issues
In smart grids, privacy issues deal with hiding details, such as what appliance was used at what time, while allowing correct summary information for accurate charging.
14
Security and privacy issues in fog computing
iii) An Example: Man-in-the-Middle Attack
In this subsection, we take man-in-the-middle attack as an example to expose the security problems in Fog computing.
In this attack, gateways serving as Fog devices may be compromised or replaced by fake ones.
15
conclusion
• With the increase of data theft attacks the security of user data is becoming a serious issue for cloud service providers for which Fog Computing is a paradigm which helps in monitoring the behavior of the user and providing security to the user’s data.
• By using decoy technique in Fog can minimize insider attacks in cloud. • Fog provides unprecedented levels of security in the Cloud and in social
networks. • The usage of fog computing can accelerate the innovation process in ways
that has never been seen before. This includes self-healing, self-organizing and self-learning applications for industrial networks products.
16
References [1] Ivan Stojmenovic and Sheng Wen, “The Fog Computing Paradigm: Scenarios and Security
Issues”, 2014 IEEE Federated Conference on Computer Science and Information Systems.
[2] Salvatore J. Stolfo, Malek Ben Salem and Angelos D. Keromytis, “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud”, 2014 IEEE CS Security and Privacy Workshop.
[3] Mohammad Aazam, Eui-Nam Huh, “Fog Computing and Smart Gateway Based Communication for Cloud of Things”, 2014 International Conference on Future Internet of Things and Cloud.
[4] Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online].Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
[5] http://en.wikipedia.org/wiki/Fog_computing
[6] Cisco Cloud Computing -Data Center Strategy, Architecture, and Solutions http://www.cisco.com/web/strategy/docs/gov/CiscoCloudComputing_WP.pdf.
[7] http://www.slideshare.net/priyankareddy14/fog-computing-provide-security-to-the-data-in-cloud?related=1
17
18
19