Integration of Cloud Computing with Internet of Things. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Integration of Cloud Computing with Internet of Things - Группа авторов страница 22

Integration of Cloud Computing with Internet of Things - Группа авторов

Скачать книгу

2014.

      11. Rakic-Skokovic, M., Guidelines for Overcoming some IoT Security Issues, XVII International Scientific Conference on Industrial Systems, 1–6, 2017, Retrieved from http://www.iim.ftn.uns.ac.rs/is17.

      12. OWASP Application Security – Building and Breaking Applications, OWASP, https://owasp.org/www-community/OWASP_Application_Security_FAQ

      13. FTC. (2017). Privacy & Data Security Update, | Federal Trade Commission, 2016. Retrieved from https://www.ftc.gov/reports/privacy-data-security-update-2016.

      1 *Corresponding author: [email protected]

      3

      An Efficient Fog-Based Model for Secured Data Communication

       V. Lakshman Narayana1* and R. S. M. Lakshmi Patibandla2†

       1Department of IT, Vignan’s Nirula Institute of Technology & Science for Women. Peda Palakaluru, Guntur, Andhra Pradesh, India

       2Department of IT, Vignan’s Foundation for Science, Technology and Research, Guntur, Andhra Pradesh, India

       Abstract

      Fog Computing is an effective computing model that expands Cloud Computing administrations to the edge of the system to provide security for the data. The new features offered by Fog Computing if effectively applied for time-sensitive applications that can possibly quicken the revelation of early crisis circumstances to help smart dynamic applications. While promising, how to plan and grow certifiable fog registering based information checking frameworks is as yet an open issue. As an initial step to address this issue, in the proposed work, a fog based model for Secured data communication is developed and shows the functional relevance and centrality of such a framework. In this work, a unique Fog Based elevated level programming model for sensitive applications that are geospatially circulated, enormous scope is designed. The fog registering system gives the model to oversee IoT benefits in the fog prospect by methods for a certifiable proving position. Moreover, the system encourages the communication between the gadgets, fog gadget arrangements, IoT administration and dynamic asset provisioning in a secured way. The proposed model overcomes communication issues in IoT gadgets to build up a powerful programming condition with fog computing method in performing resource handling, validations and IoT device arrangements. The proposed Fog Computing model effectively establishes communication among IoT devices and provides security to the data during communication.

      Keywords: Secure data transmission, data empowerment, communication, security, IoT device security, resource handling

Schematic illustration of the comparison of cloud computing and fog computing.

      Figure 3.1 Cloud computing vs fog computing.

      Fog computing is also termed as fogging, but, is that the expansion or bring of cloud computing capacity along with the edge of the system and so on grant closer ICT administrations to the less clients. Along these lines, what identify Fog Computing from cloud computing is it’s more rapidly proximity to modest end-clients, its further pervasive customer attainment, and better portability [3]. As against expectant gadgets to expertise the scheme of main framework, Fog Computing grants gadgets to edge straightforwardly and permits them to affect their associations and errands any way they esteem fit. Accordingly, Fog Computing improves the character of supervision, diminishes attacks, and provides a gradually agreeable consumer practice [4].

      Fog computing simply sustains the expanding internet of things (IoT)—properties (vehicles, home machines, and even outfits) that are inserted with sensors to allow them to retrieve information [5]. Fog Computing can be actualized utilizing a fundamental association structure instead of being executed utilizing an awesome spike organizes [6]. Accordingly, it has a denser inclusion. This bit of flexibility makes it simpler to run an ongoing, large information activity with the capacity to help millions of hubs in profoundly unique, different conditions.

      3.1.1 Fog Computing Model

      The fog hub is the center segment of the fog computing engineering. Fog hubs are either physical segments (for example passages, switches, switches, servers, and so forth.) or virtual parts (for example virtualized switches, virtual machines, cloudlets, and so on.) that are firmly combined with the confidence end-gadgets or access arranges, and give computing assets to these gadgets. A fog hub knows about its topographical dissemination and legitimate area inside the setting of its cluster [9]. Also, fog hubs give some type of information the board and correspondence administrations between the system’s edge layer where end-gadgets reside, and the fog computing administration or the brought together (cloud computing) assets, when required. To convey a given fog computing ability, fog hubs work in a brought together or decentralized way and can be arranged as independent fog hubs that impart among them to convey the administration or can be united to frame groups that give level adaptability over scatter geo areas, through reflecting

Скачать книгу