Fog computing has reached new heights in the world of modern networking.
Though it is not a replacement to cloud computing, however, it has helped the developers to overcome the technical complexities related to cloud computing by adding some advanced features to it.
Fog computing aka fogging or fog networking is a term that is coined by Cisco. It is a decentralized computing structure that refers to extending cloud computing to the edge of an enterprise’s network.
Here, the resources get placed in logical locations somewhere in between the data source and the cloud, or we can say that fog computing involves bringing intelligence and processing closer to the data source.
The increase in the number of connected devices with cloud resulted in the formation of fog computing.
We can say that it is an extension of cloud computing as it contains all the major features which are present in cloud computing be it storage, processing, networking, or computing.
Fog computing also facilitates the operation of computing, storage, and networking services between end devices and the data centers related to cloud computing.
Don’t consider fog computing as a replacement for cloud computing, they both are related to each other, and at times both are needed to perform some analytical tasks, be it, short-term and long-term.
Fog computing has inherited some features from cloud computing, but it comprises distinct features too, i.e. low latency and geo-distribution.
It is often used for the Internet of things applications as not every IOT application can run through cloud computing.
Fog computing helps in building some of the Smart Hi-Tech Cities, Buildings, Vehicle networks and Software Defined Networks (SDN).
Also Read: Role of Fog Computing in the Internet of Things Explained
Authentication is one of the most concerning issues of fog computing since these services are offered at a large scale.
Fog service providers can be different parties like cloud service providers, internet service providers, and end-users.
This flexibility complicates the whole structure and trust situation of fog. A rouge fog node is a fog device which pretends to be legal and coaxes end user to connect to it.
Once a user connects to it, it can manipulate the signals coming to and from the user to the cloud and can easily launch attacks.
Privacy concern is always there when there are many networks involved. Since fog computing is based on wireless technology, there is a huge concern regarding network privacy.
There are so many fog nodes that each end-user is accessible to them and because of this more sensitive information passes from end-users to the fog nodes.
Fog computing security issues arise as there are many devices connected to fog nodes and at different gateways.
Each device has a different IP address, and any hacker can fake your IP address to gain access to your personal information that is stored in that particular fog node.
The right placement of fog servers should be there so that it can deliver its maximum service.
The company should analyze the demand and work done by the fog node before placing it will help in reducing the maintenance cost.
Energy consumption is very high in fog computing as the number of fog nodes present in the fog environment are high and require energy to work.
Companies should try to minimize the energy requirement by the fog nodes so that they should become more energy-efficient and save costs.
Conclusion:
Fog computing can handle massive data that arises from the IOT (Internet of Things) on the edge of the network. Because of its characteristics like low latency, mobility, heterogeneity it is considered to be the best platform for IOT.
Recommended for you:
Fog Computing Advantages Across Different Sectors
Cloud Computing with AWS – An Introduction to Amazon Web Services