Trust Management in Fog Computing: A Survey

Trust Management in Fog Computing: A Survey

Sunilkumar S. Manvi, Naveen Chandra Gowda
DOI: 10.4018/978-1-5225-8295-3.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Fog computing is an encouraging computational model that extends distributed cloud computing to the edge of systems. It varies to cloud computing with some of the attributes. Fog computing has new challenges while building and maintaining the trust among the fog nodes and with edge devices. The solutions applied for the various cloud challenges cannot be directly applied for fog computing. This chapter gives an overview of these difficulties and relates solutions in a concise way. It also highlights the open challenges that still exist in fog computing.
Chapter Preview
Top

Introduction

Distributed Cloud Computing has definitely changed the scene of data/information technology by giving some real advantages to IT clients, including dispensing with forthright IT venture, scalability, relative expenses and so on (Ghahramani, 2017; Zheng, 2017). In Wojciech Burakowski (2018), the idea of distributed cloud computing frameworks reaching out to Cloud Federation (CF) by combining various clouds into one framework is presented. Cloud service providers work in geologically distributed fashion where different servers take on client requests like calamity recuperation and multi-site reinforcements which ended up across the board. Figure 1 depicts the CF where 5 clouds are connected to it.

Figure 1.

Ideal CF with of 5 clouds connected by network

978-1-5225-8295-3.ch002.f01

Processing resources in a cloud based framework can be effortlessly worked out and can discharge with negligible administration association. Along these lines, the cloud foundation develops a two layer stage, where fundamental information gathering undertakings are done in the edge gadgets, and after that the examination related tasks are performed in the cloud.

Distributed cloud computing has numerous favorable circumstances including on-request self-benefit, interminable scaling, putting away of expansive measure of information and so forth. The computation in a cloud has its own issues while performing administration, for example, vast reaction time for exchanging the crude information to the cloud and afterward preparing it there, disturbance in the basic correspondence organization, issues identified with information security and protection. Keeping in mind the end goal to conquer these issues, the idea of fog computing (Bonomi, 2012) has been risen as of late, which discusses doing the play between the edge gadgets and the cloud servers.

The rest of the paper is organized as follows. Section 2 introduces the fog computing with its working architecture and characteristics. Section 3 summarizes the different security and privacy issues in fog computing. Section 4 discusses the trust issues and the works carried out by the researchers. Section 5 presents the open challenges so that better solutions can be worked out. Finally, section 6 concludes the paper.

Top

Fog Computing

Fog computing is a platform where the edge gadgets, i.e. switches, routers, sensor hubs and nodes with gateways, interchange with the cloud servers keeping in mind the end goal to give administrations. Fog computing was first started by Cisco to stretch out the distributed computing to the edge of a system (Cisco, 2017). Cloudlet (Satyanarayanan, 2014) was worked before the proposition of fog, yet intrinsically agrees fog computing idea. Figure 2 represents the three-tier engineering (Sarkar, 2018), which is one of the fundamental and broadly utilized models in fog computing. Correspondences between Fog-Fog, Fog-Cloud, and Fog-Edge are all bi-directional.

Figure 2.

Fog computing architecture

978-1-5225-8295-3.ch002.f02

The tiers are discussed as follows:

Complete Chapter List

Search this Book:
Reset