Fog computing has reached new heights in the world of modern networking. However, there are multiple challenges of fog computing that impact its integration.
Though it is not a replacement for cloud computing, however, it has helped the developers to overcome the technical complexities related to cloud computing by adding some advanced features to it.
Fog computing, a.k.a. fogging or fog networking, is a term that was coined by Cisco. It is a decentralized computing structure that refers to extending cloud computing to the edge of an enterprise’s network.
Here, the resources get placed in logical locations somewhere in between the data source and the cloud, or we can say that fog computing involves bringing intelligence and processing closer to the data source.
The increase in the number of connected devices to the cloud resulted in the formation of fog computing.
We can say that it is an extension of cloud computing as it contains all the major features that are present in cloud computing, be it storage, processing, networking, or computing.
Fog computing also facilitates the operation of computing, storage, and networking services between end devices and the data centers related to cloud computing.
Don’t consider fog computing as a replacement for cloud computing; they both are related to each other and at times, both are needed to perform some analytical tasks, be they short-term or long-term.
Fog computing has inherited some features from cloud computing, but it also comprises distinct features, i.e., low latency and geo-distribution.
It is often used for Internet of Things applications as not every IOT application can run through cloud computing.
Fog computing helps in building some of the Smart Hi-Tech Cities, Buildings, Vehicle Networks, and Software Defined Networks (SDN).
Authentication is one of the most concerning issues of fog computing since these services are offered at a large scale.
Fog service providers can be different parties like cloud service providers, internet service providers, and end-users.
This flexibility complicates the whole structure and trust situation of fog. A rouge fog node is a fog device that pretends to be legal, and coaxes the end users to connect to it.
Once a user connects to it, it can manipulate the signals coming to and from the user to the cloud and can easily launch attacks.
Privacy concerns are always there when there are many networks involved. Since fog computing is based on wireless technology, there is a huge concern regarding network privacy.
There are so many fog nodes that each end-user is accessible to them, and because of this, more sensitive information passes from end-users to the fog nodes.
Fog computing security issues arise as there are many devices connected to fog nodes and at different gateways.
Each device has a different IP address, and any hacker can fake your IP address to gain access to your personal information that is stored in that particular fog node.
The right placement of fog servers should be there so that it can deliver its maximum service.
The company should analyze the demand and work done by the fog node before placing it, which will help in reducing the maintenance cost.
Energy consumption is very high in fog computing as the number of fog nodes present in the fog environment is high and requires energy to work.
Companies should try to minimize the energy requirement by the fog nodes so that they can become more energy-efficient and save costs.
Fog computing can handle massive data that arises from the IOT (Internet of Things) on the edge of the network. Because of its characteristics like low latency, mobility, and heterogeneity, it is considered to be the best platform for IoT.
Recommended for you: