1611Ict Emerging Technologies For Fog Assessment Answer

Questions:

I. What is fog computing and what are its advantages?
II. What types of data are processed through fog computing?
III. What are the vulnerabilities of fog computing?
IV. What are the main security and privacy threats of fog computing?
V.  How can the security and privacy issues of fog computing be addressed?

Answers:

Introduction

Fog Computing is considered as one of the technically sound and advanced technologies involved within this development era. This technology is mainly used for storing large amount of data for different data related operations [1]. Big data applications are uses large amount of data sets to be stored for future usages. Fog Computing technology is helpful in solving issues related to storages of data sets. This report is presenting literature review for elaborating the usages of Fog Computing technology within the technical era of operations. 

Literature Review Blog

Fog Computing technology is considered as effective solution for managing different storage issues involved within any big data application structures. There are various large systems architectures that are managed with respect to different data storage management facilities available for big data applications [2]. Therefore, fog computing should be considered important element in solving issues associated with the data sets involved within any data storage management system. This technology is capable of providing solutions in mitigating storage issues of computing solutions. Fog computing system act as an intermediate stage between operational device and cloud computing system architecture. This technology generally processes the data that are collected from user’s devices. These processed data are send to the respective spaces within cloud set up.  

Issues highlighted in research         

Fog computing technology is directly related to the concept of internet of things and cloud computing. Fog computing services are generally used for processing of personal information of users, which are sent to cloud networks. The main problem associated with this technological advancement is the security issues associated with this technology. Fog computing technology is using large amount of data for different operations on it. Fog computing manages large amount of data involved within any database management system; therefore there are chances of security threats that destroys the security and privacy of information [3]. Additionally, Fog Computing is entirely based on online information sharing platforms that includes large number of information security threats which make serious damages for all data involved within the database server. Henceforth, the security and privacy issues involved within Fog Computing technology needs to be identified in order to mitigate those issues and problems. If these security issues are mitigated then the IoT users as well as cloud computing users are able to use these solutions for managing their cloud computing operations within organizations  [4].  

Purpose of Research

This research is conducted for identifying the security and privacy issues and problems involved within the Fog Cloud Computing technology. The main threat associated with the Fog Computing technology is that cyber agents those deals with stealing of personal and authenticated information from any sources, that needs to be identified in order to manage the security threats involved within the fog computing system architecture. The concerned research process related to identifications of vulnerabilities involved within fog computing technology are analyzed with respect to the impacts of this technological advancements  [5]. According to the suitable measures and functional aspects involved within fog computing processes the system architectures are deployed with respect to different sources of technology and these are mainly analyzed for identifying the significant security issues and functional blockages of this technology.

Conceptual Framework for analyzing the security issues of Fog Computing Technology

The concept of Fog Computing Technology is related to the management as well as processing of different information that is stored within the data base servers. Cloud is virtual interface that manages information inside of virtual storage interface. Therefore, for identifying the security issues of Fog Computing Technology a physical capacity management framework is required for managing the storage management functionality involved within the Fog Computing services [6]. Therefore, expanding the internet of things applications within organizational structures are very important for managing significant applications of Fog Computing technology. Numerous technological developments are considered for managing the advantages of IoT and big data applications.

Methodological Approach

The entire research process is conducted by dividing it into two stages of research process. These are review of existing literature and evaluation of practical applications involved within this literature. The research questions are analyzed with respect to different resources that are introduced into different literatures. In addition to this, form different literature surveys primary data are collected and analyzed with respect to the Fog computing technology. This is system development model that is concerned for managing secondary and primary data involved within this research.

Data Collection

Data collection is managed with respect to different review of literatures. In addition to this, there are various results and information that are published within different literatures for managing information selection and collection for effectively conducting the research. Ethical consideration is also managed and considered within this research process while collecting the data sets and information from different literatures for maintaining right choice of decision making during the entire research process. After collecting these data, these are analyzed with respect to different functional aspects and activates within the research process. 

Risks Analysis

The main objective of this research is the identification and addressing of threats that are associated with fog computing technologies. Privacy is the main risks associated with this technology. These are considered as major risk involved within this technological advancement. Cyber security threats are considered as another major security threat of this technological advancement [7]. Another issue in this technology is rouge fog node. Some unethical hackers attach rouge nodes within Fog system that includes security issues with the personal information shared within this network. This risk analysis process is helpful in solving issues involved within the fog computing technology.

Conclusion                                                                 

This can be concluded that the fog computing approaches are effective in resolving the issues of storage problems caused by big data applications. This literature review is presenting different consequences about fog computing applications involved within organizational structure. Different research consequences are being elaborated within this literature review section in order to highlight the issues and their mitigation policies involved within organizational structures. Therefore, this literature review is helpful in identifying the major risks involved within Fog Computing technology for managing significant  development of cloud computing and internet of things applications within network architectures.

References

[1] Vaquero, L. M., & Rodero-Merino, L. (2014). Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Computer Communication Review, 44(5), 27-32.

[2] Stojmenovic, I., & Wen, S. (2014, September). The fog computing paradigm: Scenarios and security issues. In Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on (pp. 1-8). IEEE.

[3] Bonomi, F., Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments (pp. 169-186). Springer International Publishing.

[4] Luan, T. H., Gao, L., Li, Z., Xiang, Y., Wei, G., & Sun, L. (2015). Fog computing: Focusing on mobile users at the edge. arXiv preprint arXiv:1502.01815.

[5] Yannuzzi, M., Milito, R., Serral-Gracià, R., Montero, D., & Nemirovsky, M. (2014, December). Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing. In Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2014 IEEE 19th International Workshop on (pp. 325-329). IEEE.

[6] Stojmenovic, I., Wen, S., Huang, X., & Luan, H. (2015). An overview of Fog computing and its security issues. Concurrency and Computation: Practice and Experience.

[7] Dastjerdi, A. V., Gupta, H., Calheiros, R. N., Ghosh, S. K., & Buyya, R. (2016). Fog computing: Principles, architectures, and applications. arXiv preprint arXiv:1601.02752.

[8] Peng, M., Yan, S., Zhang, K., & Wang, C. (2016). Fog-computing-based radio access networks: issues and challenges. IEEE Network, 30(4), 46-53.

[9] Dastjerdi, A. V., Gupta, H., Calheiros, R. N., Ghosh, S. K., & Buyya, R. (2016). Fog computing: Principles, architectures, and applications. arXiv preprint arXiv:1601.02752

[10] Peng, M., Yan, S., Zhang, K., & Wang, C. (2016). Fog-computing-based radio access networks: issues and challenges. IEEE Network, 30(4), 46-53.

[11] Madsen, H., Burtschy, B., Albeanu, G., & Popentiu-Vladicescu, F. L. (2013, July). Reliability in the utility computing era: Towards reliable fog computing. In Systems, Signals and Image Processing (IWSSIP), 2013 20th International Conference on (pp. 43-46). IEEE.

[12] Jalali, F., Hinton, K., Ayre, R., Alpcan, T., & Tucker, R. S. (2016). Fog computing may help to save energy in cloud computing. IEEE Journal on Selected Areas in Communications, 34(5), 1728-1739.


Buy 1611Ict Emerging Technologies For Fog Assessment Answers Online

Talk to our expert to get the help with 1611Ict Emerging Technologies For Fog Assessment Answers from Assignment Hippo Experts to complete your assessment on time and boost your grades now

The main aim/motive of the finance assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignment help Australia. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at www.assignmenthippo.com are so much skilled, capable, talented, and experienced in their field and use our best and free Citation Generator and cite your writing assignments, so, for this, they can effectively write the best economics assignment help services.

Get Online Support for 1611Ict Emerging Technologies For Fog Assessment Answer Assignment Help Online

Want to order fresh copy of the Sample 1611Ict Emerging Technologies For Fog Assessment Answers? online or do you need the old solutions for Sample 1611Ict Emerging Technologies For Fog Assessment Answer, contact our customer support or talk to us to get the answers of it.

Assignment Help Australia
Want latest solution of this assignment

Want to order fresh copy of the 1611Ict Emerging Technologies For Fog Assessment Answers? online or do you need the old solutions for Sample 1611Ict Emerging Technologies For Fog Assessment Answer, contact our customer support or talk to us to get the answers of it.