Language:EN
Pages: 1
Words: 83
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
the rogue fog node captures and sends the parent r

The rogue fog node captures and sends the parent rogue server

Itc571 Emerging Technology And Innovations Assessment Answers

Questions:

1.Start your writing by providing background information about the topic and its current/existing solution
2.Continue your writing to set the need for the research
3.Continue your writing to set the Motivation for the research as a starting point
4.Why your research is significant or Why is it an interesting or useful problem?
5.What are the researchers in the area were trying to find out?
6.What is the aim or objective of your research?

Answers:

Introduction

One of the most emerging technologies in the field of information and communication technology is Fog Computing. After the development of online storage systems, several technologies were invented that were able to store large amounts of data in the online storage interface. Cloud computing and big data fall under this category [3]. While cloud computing provided the online storage interface, Big Data provided the online storage space for vast amounts of data. The online storage system is considered to be one of the best technical inventions and are used extensively by large commercial organizations all over the world. However, the problem arose when the data processing was not done efficiently by these technologies. Moreover, the data distribution in these storage spaces was not done accurately. Hence, there was a need for a new technology to solve these problems. Fog Computing solves this problem and provides data processing solutions for those using cloud computing services [7]. Fog computing system acts as an intermediate between the physical operational device and the cloud computing system. It processes the data from the users’ devices and then sends the processed data to respective storage spaces in the cloud.

Rationale Of Research

B. Purpose and Justification

While some researchers might argue about why should the issues with fog have to be addressed while there are still sufficient rooms for newer and better technologies, the research on addressing the security and privacy issues of fog computing can be justified by the following reasons.

  • Internet of Things is an extremely popular technology nowadays with its popularity increasing every day. In order to manage all the data used by Internet of Things, fog computing is a necessary technology to process all the data.
  • With the increasing popularity of Internet of Things, data traffic is increasing significantly. In order to manage all the data and reduce the traffic, fog computing is extremely necessary.
  • Due to the data traffic, the network bandwidth changes frequently to catch all types of data from different sources. Fog computing can be used to solve this issue and maintain a standard network bandwidth while also capturing all the data.
  • Fog computing also aids the improvement of system response time.

C. Research Questions

Before conducting any research, a list of research questions is to be prepared. These research questions are to be addressed during the course of the project. The research questions for this project are as follows.

  1. What is fog computing and what are its advantages?
  2. What types of data are processed through fog computing?
  3. What are the vulnerabilities of fog computing?
  4. What are the main security and privacy threats of fog computing?
  5. How can the security and privacy issues of fog computing be addressed?

D. Conceptual Framework

III. Materials and Methods

B. Data Collection

Data will be collected from two sources – primary data will be obtained from the review of literature and secondary data will be obtained from experimental results. After the experiment is complete, the two types of data will be compared for parity and the final test results will be published accordingly. It is to be ensured that the final data is sufficient to address the security and privacy issues of fog computing.

C. Ethical Issues

In different research activities, several ethical issues are associated especially in this research, where the project involves handling users’ personal information through fog computing. Moreover, there are certain ethical guidelines of software usage by the local government. Hence, while conducting the research, it is to be ensured that the privacy of the user information is maintained and the ethical guidelines of software usage is followed while implementing and operating fog computing system.

D. Compliance Requirements

E. Data Analysis

IV. Rerearch and Project Plan

  • An in-depth analysis of fog computing service and its benefits
  • Analysis of vulnerabilities in fog computing system
  • Analysis of the security and privacy issues in fog computing
  • Final document containing the plans for addressing the security and privacy issues of fog computing

B. Risk Analysis

The main objective of the research is to identify and address the threats associated with fog computing system. Hence, there are a lot of risks and threats that are needed to be addressed in course of the research. The first main risk associated with fog computing is the privacy risk. Fog computing deals with processing of a huge amount of personal information of the users and as a result, the privacy has to be maintained at all costs [6]. Cyber security threats like hackers and malwares seek this type of personal information of the common users and use it for unethical activities like masked transactions, fraud cases and others. This is exactly the main reason why many users still do not rely on fog computing. If this issue can be addressed and minimized, it will raise the potential of fog computing and the business organizations will extensively use fog computing services. Another main risk associated with this is the network security. Fog computing is completely based online, wireless network security is a significant risk. Wireless network security issues include sniffer attacks, jamming attacks and others [4]. Finally, another major risk in the fog system is the rogue fog node. Sometimes, some unethical hackers prepare and attach rogue fog nodes to a fog system. These rogue fog nodes can act as regular fog node and once the user provides personal information, the rogue fog node captures it and sends it to the parent rogue server. In this way, huge amounts of personal information of users have been lost through the fog computing system.

D. Research Duration

Task Name Duration Start Finish
Fog Computing Security Development Research Project 95 days Mon 27-03-17 Fri 04-08-17
   Project Planning Phase 12 days Mon 27-03-17 Tue 11-04-17
      Preparation of Research Plan 5 days Mon 27-03-17 Fri 31-03-17
      Analysis of the Research Plan 5 days Mon 03-04-17 Fri 07-04-17
      Scheduling of Research Period and Resource Requirements 2 days Mon 10-04-17 Tue 11-04-17
   Project Initiation Phase 3 days Mon 10-04-17 Wed 12-04-17
      Verification of Project Plan against Research Requirements 1 day Mon 10-04-17 Mon 10-04-17
      Approval of Research Plan 1 day Tue 11-04-17 Tue 11-04-17
      Initiation of the Research 1 day Wed 12-04-17 Wed 12-04-17
   Project Execution Phase 59 days Wed 12-04-17 Mon 03-07-17
      Survey of Existing Literature 20 days Thu 13-04-17 Wed 10-05-17
      Primary Data Collection 3 days Thu 11-05-17 Mon 15-05-17
      Primary Data Analysis 5 days Tue 16-05-17 Mon 22-05-17
      Application of Technical Upgrades 15 days Wed 12-04-17 Tue 02-05-17
      System Planning and Development 15 days Wed 03-05-17 Tue 23-05-17
      Implementation of Proposed System Model 10 days Wed 24-05-17 Tue 06-06-17
      Subscription of Cloud Storage Server 4 days Wed 07-06-17 Mon 12-06-17
      Implementation of Fog Server 3 days Tue 13-06-17 Thu 15-06-17
      Secondary Data Collection 5 days Tue 13-06-17 Mon 19-06-17
      Secondary Data Analysis 10 days Tue 20-06-17 Mon 03-07-17
   Project Closing Phase 36 days Fri 16-06-17 Fri 04-08-17
      Comparison of Primary and Secondary Data 10 days Tue 20-06-17 Mon 03-07-17
      Development of System Usage Protocol 5 days Tue 04-07-17 Mon 10-07-17
      Implementation of Fog Privacy and Security System 10 days Fri 16-06-17 Thu 29-06-17
      Final Analysis and Testing 5 days Fri 30-06-17 Thu 06-07-17
      Analysis of Further Risks and Issues 5 days Fri 07-07-17 Thu 13-07-17
      Mitigation of Risks and Debugging 5 days Fri 14-07-17 Thu 20-07-17
      Completion of Research and Documentation 10 days Fri 21-07-17 Thu 03-08-17
      Researchers Signoff 1 day Fri 04-08-17 Fri 04-08-17

V. Conclusion

In this research, fog computing is to be explored and its security and privacy issues are to be analyzed and addressed. One of the most emerging technologies in the field of information and communication technology is Fog Computing. After the development of online storage systems, several technologies were invented that were able to store large amounts of data in the online storage interface. Cloud computing and big data fall under this category. While cloud computing provided the online storage interface, Big Data provided the online storage space for vast amounts of data. The online storage system is considered to be one of the best technical inventions and are used extensively by large commercial organizations all over the world. There are a lot of risks and threats that are needed to be addressed in course of the research. The first main risk associated with fog computing is the privacy risk. Fog computing deals with processing of a huge amount of personal information of the users and as a result, the privacy has to be maintained at all costs. Cyber security threats like hackers and malwares seek this type of personal information of the common users and use it for unethical activities like masked transactions, fraud cases and others. In this research, all the associated privacy and security issues of fog computing will be addressed.

VI. References

  • Stojmenovic, I. and Wen, S. The fog computing paradigm: Scenarios and security issues. In Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on(pp. 1-8). IEEE, 2014, September.
  • Mahmud, R. and Buyya, R. Fog Computing: A Taxonomy, Survey and Future Directions. arXiv preprint arXiv:1611.05539, 2016.
  • Yi, S., Qin, Z. and Li, Q. Security and privacy issues of fog computing: A survey. In International Conference on Wireless Algorithms, Systems, and Applications(pp. 685-695). Springer International Publishing, 2015, August.
  • Sehgal, V.K., Patrick, A., Soni, A. and Rajput, L. Smart human security framework using internet of things, cloud and fog computing. In Intelligent distributed computing(pp. 251-263). Springer International Publishing, 2015.
  • Dsouza, C., Ahn, G.J. and Taguinod, M. Policy-driven security management for fog computing: Preliminary framework and a case study. In Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on(pp. 16-23). IEEE, 2014, August.
  • Vaquero, L.M. and Rodero-Merino, L. Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Computer Communication Review, 44(5), pp.27-32, 2014.
  • Aazam, M. and Huh, E.N. Fog computing and smart gateway based communication for cloud of things. In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on(pp. 464-470). IEEE, 2014, August.
  • Luan, T.H., Gao, L., Li, Z., Xiang, Y., We, G. and Sun, L. Fog Computing: Paradigm, Protocol and Security Issues. arXiv preprint arXiv:1502.01815, 2015.
  • Bonomi, F., Milito, R., Natarajan, P. and Zhu, J. Fog computing: A platform for internet of things and analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments(pp. 169-186). Springer International Publishing, 2014.
  • Dastjerdi, A.V., Gupta, H., Calheiros, R.N., Ghosh, S.K. and Buyya, R. Fog computing: Principles, architectures, and applications. arXiv preprint arXiv:1601.02752, 2016.
  • Yannuzzi, M., Milito, R., Serral-Gracià, R., Montero, D. and Nemirovsky, M. Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing. In Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2014 IEEE 19th International Workshop on(pp. 325-329). IEEE, 2014, December.
  • Alrawais, A., Alhothaily, A., Hu, C. and Cheng, X. Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE Internet Computing, 21(2), pp.34-42, 2017.
  • Lee, K., Kim, D., Ha, D., Rajput, U. and Oh, H. On security and privacy issues of fog computing supported Internet of Things environment. In Network of the Future (NOF), 2015 6th International Conference on the(pp. 1-3). IEEE, 2015, September.
  • Syed, M.H., Fernandez, E.B. and Ilyas, M. A pattern for Fog Computing. In Proceedings of the 10th Travelling Conference on Pattern Languages of Programs(p. 13). ACM, 2016, April.
  • Salonikias, S., Mavridis, I. and Gritzalis, D. Access control issues in utilizing fog computing for transport infrastructure. In International Conference on Critical Information Infrastructures Security(pp. 15-26). Springer International Publishing, 2015, October.
  • Shenoy, K., Bhokare, P. and Pai, U. Fog Computing Future of Cloud Computing. International Journal of Science and Research, 4(6), pp.55-56, 2015.
  • Firdhous, M., Ghazali, O. and Hassan, S. Fog computing: Will it be the future of cloud computing?. In Third International Conference on Informatics & Applications, Kuala Terengganu, Malaysia(pp. 8-15) , 2014.
  • Kanna, T.R., Nagaraju, M. and Bhaskar, C.V. Secure Fog Computing: Providing Data Security. IJRCCT, 4(1), pp.053-055, 2015.
  • Madsen, H., Burtschy, B., Albeanu, G. and Popentiu-Vladicescu, F.L. Reliability in the utility computing era: Towards reliable fog computing. In Systems, Signals and Image Processing (IWSSIP), 2013 20th International Conference on(pp. 43-46). IEEE, 2013, July.
  • Botta, A., De Donato, W., Persico, V. and Pescapé, A. On the integration of cloud computing and internet of things. In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on(pp. 23-30). IEEE, 2014, August.

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Parinaaz Chadha

PageId: DOCBA16105