Draft SP 800-191, the NIST Definition of Fog Computing

Total Page:16

File Type:pdf, Size:1020Kb

Draft SP 800-191, the NIST Definition of Fog Computing The attached DRAFT document (provided here for historical purposes), released on August 21, 2017, has been superseded by the following publication: Publication Number: NIST Special Publication (SP) 500-325 Title: Fog Computing Conceptual Model Publication Date: March 2018 • Final Publication: https://doi.org/10.6028/NIST.SP.500-325 (which links to https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-325.pdf). • Related Information on CSRC: Final: https://csrc.nist.gov/publications/detail/sp/500-325/final 1 NIST Special Publication 800-191 (Draft) 2 3 The NIST Definition of Fog Computing 4 5 6 Michaela Iorga 7 Larry Feldman 8 Robert Barton 9 Michael J. Martin 10 Nedim Goren 11 Charif Mahmoudi 12 13 14 15 16 17 18 19 C O M P U T E R S E C U R I T Y 20 21 22 NIST Special Publication 800-191 (Draft) 23 24 The NIST Definition of Fog Computing 25 26 Michaela Iorga 27 Computer Security Division 28 Information Technology Laboratory 29 30 Larry Feldman 31 G2 Inc. 32 33 Robert Barton 34 Cisco 35 36 Michael J Martin 37 IBM Canada Ltd. 38 39 Nedim Goren 40 Computer Security Division 41 Information Technology Laboratory 42 43 Charif Mahmoudi 44 Advanced Network Technologies Division 45 Information Technology Laboratory 46 47 48 49 August 2017 50 51 52 53 54 55 U.S. Department of Commerce 56 Wilbur L. Ross, Jr., Secretary 57 58 National Institute of Standards and Technology 59 Kent Rochford, Acting NIST Director and Under Secretary of Commerce for Standards and Technology 60 Authority 61 This publication has been developed by NIST in accordance with its statutory responsibilities 62 under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et 63 seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security 64 standards and guidelines, including minimum requirements for federal information systems, but 65 such standards and guidelines shall not apply to national security systems without the express 66 approval of appropriate federal officials exercising policy authority over such systems. This 67 guideline is consistent with the requirements of the Office of Management and Budget (OMB) 68 Circular A-130. 69 Nothing in this publication should be taken to contradict the standards and guidelines made 70 mandatory and binding on federal agencies by the Secretary of Commerce under statutory 71 authority. Nor should these guidelines be interpreted as altering or superseding the existing 72 authorities of the Secretary of Commerce, Director of the OMB, or any other federal official. This 73 publication may be used by nongovernmental organizations on a voluntary basis and is not subject 74 to copyright in the United States. Attribution would, however, be appreciated by NIST. 75 National Institute of Standards and Technology Special Publication 800-191 76 Natl. Inst. Stand. Technol. Spec. Publ. 800-191, 13 pages (August 2017) 77 CODEN: NSPUE2 78 79 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an 80 experimental procedure or concept adequately. Such identification is not intended to imply recommendation or 81 endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best 82 available for the purpose. 83 There may be references in this publication to other publications currently under development by NIST in accordance 84 with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, 85 may be used by federal agencies even before the completion of such companion publications. Thus, until each 86 publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For 87 planning and transition purposes, federal agencies may wish to closely follow the development of these new 88 publications by NIST. 89 Organizations are encouraged to review all draft publications during public comment periods and provide feedback 90 to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at 91 http://csrc.nist.gov/publications. 92 Public comment period: August 21, 2017 through September 21, 2017 93 94 National Institute of Standards and Technology 95 Attn: Computer Security Division, Information Technology Laboratory 96 100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930 97 Email: [email protected] 98 99 All comments are subject to release under the Freedom of Information Act (FOIA). NIST SP 800-191 (DRAFT) THE NIST FOG COMPUTING DEFINITION 100 Reports on Computer Systems Technology 101 The Information Technology Laboratory (ITL) at the National Institute of Standards and 102 Technology (NIST) promotes the U.S. economy and public welfare by providing technical 103 leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test 104 methods, reference data, proof of concept implementations, and technical analysis to advance the 105 development and productive use of information technology. ITL’s responsibilities include the 106 development of technical, physical, administrative, and management standards and guidelines for 107 the cost-effective security and privacy of sensitive unclassified information in Federal computer 108 systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach 109 efforts in computer security and its collaborative activities with industry, government, and 110 academic organizations. 111 Abstract 112 Managing the data generated by Internet of Things (IoT) sensors is one of the biggest challenges 113 faced when deploying an IoT system. Traditional cloud-based IoT systems are challenged by the 114 large scale, heterogeneity, and high latency witnessed in some cloud ecosystems. One solution is 115 to decentralize applications, management, and data analytics into the network itself using a 116 distributed and federated compute model. This approach has become known as fog 117 computing. This document presents a formal definition of fog and mist computing and how they 118 relate to cloud-based computing models for IoT. This document further characterizes important 119 properties and aspects of fog computing, including service models, deployment strategies, and 120 provides a baseline of what fog computing is, and how it may be used. 121 122 Keywords 123 cloud computing; cloudlet; edge computing; fluid computing; fog computing; fluid computing; 124 Internet of Things (IoT); mist computing 125 126 127 128 129 ii NIST SP 800-191 (DRAFT) THE NIST FOG COMPUTING DEFINITION 130 Acknowledgments 131 The authors would like to thank their colleagues and the experts in industry and government who 132 contributed their thoughts to the creation and review of this definition. 133 134 Audience 135 The intended audience of this document is system planners, system architects, system engineers, 136 system managers, program managers, technologists and networking specialists that consume or 137 provide Internet of Things solutions leveraging cloud and/or fog computing services. 138 139 140 iii NIST SP 800-191 (DRAFT) THE NIST FOG COMPUTING DEFINITION 141 142 Table of Contents 143 1 Introduction ............................................................................................................ 1 144 1.1 Purpose and Scope ........................................................................................ 1 145 2 The NIST Definition of Fog Computing ................................................................ 2 146 2.1 Fog Computing Definition ............................................................................... 2 147 2.2 Fog Computing Characteristics ....................................................................... 2 148 2.3 Fog Node Definition ........................................................................................ 3 149 2.4 Fog Node Architectural Service Types ............................................................ 4 150 2.5 Fog Node Deployment Models ....................................................................... 4 151 3 Mist Computing as Lightweight Fog Layer .......................................................... 5 152 3.1 Mist Computing Definition ............................................................................... 5 153 154 List of Appendices 155 Acronyms ....................................................................................................................... 7 156 157 List of Figures 158 Figure 1 – Fog comuting supporting a cloud-based ecosystem for smart end-devices. .. 2 159 iv NIST SP 800-191 (DRAFT) THE NIST FOG COMPUTING DEFINITION 160 1 Introduction 161 Ubiquitous deployment of smart, interconnected devices is estimated to reach 50 billion units by 162 20201. This exponential increase is fueled by the proliferation of mobile devices (e.g. mobile 163 phones and tablets), smart sensors serving different vertical markets (e.g. smart power grids, 164 autonomous transportation, industrial controls, smart cities, wearables, etc), wireless sensors and 165 actuators networks. New concepts and technologies are needed to manage this growing fleet of 166 Internet of Things (IoT) devices. 167 1.1 Purpose and Scope 168 The acute need of the multitude of smart, end-user IoT devices and near-user edge devices to carry 169 out, with minimal latency, a substantial amount of data processing and to collaborate in a 170 distributed way, triggered technology advancements towards adaptive,
Recommended publications
  • Fog Computing: a Platform for Internet of Things and Analytics
    Fog Computing: A Platform for Internet of Things and Analytics Flavio Bonomi, Rodolfo Milito, Preethi Natarajan and Jiang Zhu Abstract Internet of Things (IoT) brings more than an explosive proliferation of endpoints. It is disruptive in several ways. In this chapter we examine those disrup- tions, and propose a hierarchical distributed architecture that extends from the edge of the network to the core nicknamed Fog Computing. In particular, we pay attention to a new dimension that IoT adds to Big Data and Analytics: a massively distributed number of sources at the edge. 1 Introduction The “pay-as-you-go” Cloud Computing model is an efficient alternative to owning and managing private data centers (DCs) for customers facing Web applications and batch processing. Several factors contribute to the economy of scale of mega DCs: higher predictability of massive aggregation, which allows higher utilization with- out degrading performance; convenient location that takes advantage of inexpensive power; and lower OPEX achieved through the deployment of homogeneous compute, storage, and networking components. Cloud computing frees the enterprise and the end user from the specification of many details. This bliss becomes a problem for latency-sensitive applications, which require nodes in the vicinity to meet their delay requirements. An emerging wave of Internet deployments, most notably the Internet of Things (IoTs), requires mobility support and geo-distribution in addition to location awareness and low latency. We argue that a new platform is needed to meet these requirements; a platform we call Fog Computing [1]. We also claim that rather than cannibalizing Cloud Computing, F. Bonomi R.
    [Show full text]
  • Openfog Reference Architecture for Fog Computing
    OpenFog Reference Architecture for Fog Computing Produced by the OpenFog Consortium Architecture Working Group www.OpenFogConsortium.org February 2017 1 OPFRA001.020817 © OpenFog Consortium. All rights reserved. Use of this Document Copyright © 2017 OpenFog Consortium. All rights reserved. Published in the USA. Published February 2017. This is an OpenFog Consortium document and is to be used in accordance with the terms and conditions set forth below. The information contained in this document is subject to change without notice. The information in this publication was developed under the OpenFog Consortium Intellectual Property Rights policy and is provided as is. OpenFog Consortium makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of fitness for a particular purpose. This document contains content that is protected by copyright. Copying or distributing the content from this document without permission is prohibited. OpenFog Consortium and the OpenFog Consortium logo are registered trademarks of OpenFog Consortium in the United States and other countries. All other trademarks used herein are the property of their respective owners. Acknowledgements The OpenFog Reference Architecture is the product of the OpenFog Architecture Workgroup, co-chaired by Charles Byers (Cisco) and Robert Swanson (Intel). It represents the collaborative work of the global membership of the OpenFog Consortium. We wish to thank these organizations for contributing
    [Show full text]
  • Fog Computing and the Internet of Things: a Review
    Review Fog Computing and the Internet of Things: A Review Hany F. Atlam 1,2,* ID , Robert J. Walters 1 and Gary B. Wills 1 1 Electronic and Computer Science Department, University of Southampton, Southampton SO17 1BJ, UK; [email protected] (R.J.W.); [email protected] (G.B.W.) 2 Computer Science and Engineering Department, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt * Correspondence: [email protected]; Tel.: +44-074-2252-3772 Received: 4 March 2018; Accepted: 5 April 2018; Published: 8 April 2018 Abstract: With the rapid growth of Internet of Things (IoT) applications, the classic centralized cloud computing paradigm faces several challenges such as high latency, low capacity and network failure. To address these challenges, fog computing brings the cloud closer to IoT devices. The fog provides IoT data processing and storage locally at IoT devices instead of sending them to the cloud. In contrast to the cloud, the fog provides services with faster response and greater quality. Therefore, fog computing may be considered the best choice to enable the IoT to provide efficient and secure services for many IoT users. This paper presents the state-of-the-art of fog computing and its integration with the IoT by highlighting the benefits and implementation challenges. This review will also focus on the architecture of the fog and emerging IoT applications that will be improved by using the fog model. Finally, open issues and future research directions regarding fog computing and the IoT are discussed. Keywords: Internet of Things; cloud of things; fog computing; fog as a service; IoT with fog computing; cloud computing 1.
    [Show full text]
  • All One Needs to Know About Fog Computing and Related Edge Computing ☆,☆☆ Paradigms: a Complete Survey
    Journal of Systems Architecture 98 (2019) 289–330 Contents lists available at ScienceDirect Journal of Systems Architecture journal homepage: www.elsevier.com/locate/sysarc All one needs to know about fog computing and related edge computing ☆,☆☆ paradigms: A complete survey Ashkan Yousefpour a,∗, Caleb Fung b, Tam Nguyen c, Krishna Kadiyala b, Fatemeh Jalali d, Amirreza Niakanlahiji e, Jian Kong b, Jason P. Jue b a University of California Berkeley, Berkeley, USA b University of Texas at Dallas, Richardson, USA c Georgia Institute of Technology, Atlanta, USA d IBM Research, Melbourne, Australia e University of North Carolina at Charlotte, Charlotte, USA a r t i c l e i n f o a b s t r a c t Keywords: With the Internet of Things (IoT) becoming part of our daily life and our environment, we expect rapid growth in Fog computing the number of connected devices. IoT is expected to connect billions of devices and humans to bring promising Edge computing advantages for us. With this growth, fog computing, along with its related edge computing paradigms, such as Cloud computing multi-access edge computing (MEC) and cloudlet, are seen as promising solutions for handling the large volume Internet of things (IoT) of security-critical and time-sensitive data that is being produced by the IoT. In this paper, we first provide a Cloudlet Mobile edge computing tutorial on fog computing and its related computing paradigms, including their similarities and differences. Next, Multi-access edge computing we provide a taxonomy of research topics in fog computing, and through a comprehensive survey, we summarize Mist computing and categorize the efforts on fog computing and its related computing paradigms.
    [Show full text]
  • Linuxvilag-54.Pdf 4301KB 9 2012-05-28 10:24:50
    Beköszöntõ © Kiskapu Kft. Minden jog fenntartva Ahogy azt ígértük... össze, másrészt pedig lehetõséget is Megváltozunk. Ígérem. Na, nem úgy, biztosítunk egymás megismerésére. ahogy Bajor Imre ígérte tíz éve egy Az új „nyílt” szerkesztés jegyében kabaréban, hogy új életet kezd, de kialakítottunk tehát egy weboldalt mivel a piát szereti, ezért az új életé- ( linuxvilag.hu/szerzoknek), ahol ben is inni fog. Mi inkább azon tulaj- bárki jelentkezhet, aki szívesen írna donságainkat igyekszünk átmenteni, cikket, vagy elmondaná, hogy milyen melyeket olvasóink is a lap értékének cikket látna örömmel az újságban. tartanak. A cikkírók itt további anyagot is találnak a leadandó cikkekkel kap- Az elmúlt idõszakban folytatott piac- csolatban. kutatások és olvasói levelek alapján három fõbb változási cél rajzolódott Reményeink szerint a szeptemberi ki elõttünk. Olvasóink szerint: számtól már egy teljesen új arculattal indul, mindhárom célterületen változ- • A cikkek túl tömörek, nehezen va, olvasóink igényéhez jobban alkal- olvashatóak mazkodva. Mint mindig, most is örömmel várunk bármilyen véle- • Kevés a kezdõknek, próbálkozó ményt, ötletet, kritikát! kedvûeknek szóló cikk A „mostani generáció” utolsó két lap- • Több hazai vonatkozású, olvasmá- számához is kellemes olvasást kívánok! nyos cikkre van igény A tervek megvitatása közben még egy Szy György gondolat folyamatosan felvetõdött: fõszerkesztõ valahogy jobban be szeretnénk vonni a hazai szakembereket a Linuxvilág szerkesztésébe. Ezzel egyrészt egy érdekesebb, színesebb anyag állhat Hír-lelõ Kütyüimádóknak Táblájuk még nem volt Titkos biztonság A Nokia újfajta, internet tábla névre Az IBM PC-s üzletágát nemrég átve- Minden adatra kiterjedõ, hardveres keresztelt mobil eszközt mutatott be. võ Lenovo bemutatta az elsõ ThinkPad titkosítást végzõ, hordozható számító- A teljes nevén Nokia 770 Internet Tablet tábla PC-t.
    [Show full text]
  • Distributed Fog Computing for Internet of Things (Iot) Based Ambient Data Processing and Analysis
    electronics Article Distributed Fog Computing for Internet of Things (IoT) Based Ambient Data Processing and Analysis Mehreen Ahmed 1 , Rafia Mumtaz 1 , Syed Mohammad Hassan Zaidi 1, Maryam Hafeez 2,*, Syed Ali Raza Zaidi 3 and Muneer Ahmad 4 1 School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad 44000, Pakistan; [email protected] (M.A.); rafi[email protected] (R.M.); [email protected] (S.M.H.Z.) 2 Department of Engineering and Technology, School of Computing and Engineering, University of Huddersfield, Queensgate, Huddersfield HD1 3DH, UK 3 School of Electronic and Electrical Engineering University of Leeds, Leeds L2 9JT, UK; [email protected] 4 Department of Information Systems, Faculty of Computer Science & Information Technology, Universiti Malaya, Kaula Lumpur 50603, Malaysia; [email protected] * Correspondence: [email protected] Received: 24 September 2020; Accepted: 19 October 2020; Published: 22 October 2020 Abstract: Urban centers across the globe are under immense environmental distress due to an increase in air pollution, industrialization, and elevated living standards. The unmanageable and mushroom growth of industries and an exponential soar in population has made the ascent of air pollution intractable. To this end, the solutions that are based on the latest technologies, such as the Internet of things (IoT) and Artificial Intelligence (AI) are becoming increasingly popular and they have capabilities to monitor the extent and scale of air contaminants and would be subsequently useful for containing them. With centralized cloud-based IoT platforms, the ubiquitous and continuous monitoring of air quality and data processing can be facilitated for the identification of air pollution hot spots.
    [Show full text]
  • On Using Micro-Clouds to Deliver the Fog
    On Using Micro-Clouds to Deliver the Fog Yehia Elkhatib,♠ Barry Porter,♠ Heverson B. Ribeiro,z Mohamed Faten Zhani,? Junaid Qadir,} and Etienne Rivièrez ♠ Lancaster University, United Kingdom z University of Neuchâtel, Switzerland ? École de Technologie Supérieure, Montreal, Canada } Information Technology University, Punjab, Pakistan Email: [email protected] This is a pre-print The final version is available on IEEEXplore Abstract Cloud computing has demonstrated itself to be a scalable and cost-efficient solution for many real-world applications. However, its modus operandi is not ideally suited to resource-constrained environments that are characterized by limited network bandwidth and high latencies. With the increasing proliferation and sophistication of edge devices, the idea of fog computing proposes to offload some of the computation to the edge. To this end, micro-clouds—which are modular and portable assemblies of small single-board computers—have started to gain attention as infrastructures to support fog computing by offering isolated resource provisioning at the edge in a cost-effective way. We investigate the feasibility and readiness of micro-clouds for delivering the vision of fog computing. Through a number of experiments, we showcase the potential of micro-clouds formed by collections of Raspberry Pi computers to host a range of fog-related applications, particularly for locations where there is limited network bandwidths and long latencies. 1. Introduction Fog computing is coming. This paradigm allows devices at the edge of the network to become arXiv:1703.00375v1 [cs.DC] 6 Feb 2017 proactive in hosting as well as consuming data and services [1]. This has great potential for interconnecting the swarm of such edge devices: wearables, sensors, smart traffic controllers, inter- active displays, etc.
    [Show full text]
  • Iot Technologies for Embedded Computing
    IoT Technologies for Embedded Computing: A Survey Farzad Samie, Lars Bauer, Jörg Henkel Chair for Embedded Systems (CES), Karlsruhe Institute of Technology (KIT), Germany {farzad.samie, lars.bauer, joerg.henkel}@kit.edu ABSTRACT systems. In a broader sense and vision, IoT is a global Emergence of Internet-of-Things brings a whole new infrastructure of heterogeneous, networked embedded class of applications and higher efficiency for existing devices and objects [8]. Communication ability, and services. Application-specific requirements, as well as in particular the Internet connectivity, lets devices and connectivity and communication ability of devices have smart objects (also known as machines) communicate introduced new challenges for IoT applications. and interact with (i) other machines and devices, or (ii) This paper provides an overview of IoT technologies humans [4, 9, 10]. required from an embedded design perspective and spe- IoT covers diverse application domains that include cific properties associated with IoT in embedded sys- wireless sensor networks (WSN), machine-to-machine tems’ landscape. We investigate essential technologies (M2M), RFID, Cyber Physical Systems (CPS), Mobile for development of IoT systems, existing trends, and its Computing (MC), etc. [9, 10, 11]. There have been distinguishing properties. By discussing the key charac- many research efforts on IoT from the perspective of teristics, main application domains, and major research networking, object identification, data access (security issues in IoT, this paper provides a comprehensive IoT and privacy) [3, 5], however, it has gained less attention perspective for embedded system design. from the perspective of embedded computing. 1 Introduction The diversity of IoT applications and technologies The Internet of Things (IoT) is a multidisciplinary makes it difficult to present a general comprehensive paradigm in which many of the objects that surround statement for the requirements of IoT in hardware and us will be networked and connected to the Internet software.
    [Show full text]
  • Hardware Security of Fog End-Devices for the Internet of Things
    sensors Review Hardware Security of Fog End-Devices for the Internet of Things Ismail Butun 1,2,∗,† , Alparslan Sari 3,∗,† and Patrik Österberg 4 1 Department of Computer Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden 2 Department of Computer Engineering, Konya Food and Agriculture University, 42080 Konya, Turkey 3 Department of Electrical and Computer Engineering, University of Delaware, Newark, DE 19716, USA 4 Department of Information Systems and Technology, Mid Sweden University, 851 70 Sundsvall, Sweden; [email protected] * Correspondence: [email protected] (I.B.); [email protected] (A.S.) † These authors have contributed equally to this work. Received: 1 August 2020; Accepted: 3 October 2020; Published: 9 October 2020 Abstract: The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.
    [Show full text]
  • Picasso: a Lightweight Edge Computing Platform
    PiCasso: A Lightweight Edge Computing Platform Adisorn Lertsinsrubtavee, Anwaar Ali, Carlos Molina-Jimenez, Arjuna Sathiaseelan and Jon Crowcroft Computer Laboratory, University of Cambridge, UK Email: fi[email protected] Abstract—Recent trends show that deploying low cost devices deploy multiple instances of a given service opportunistically with lightweight virtualisation services is an attractive alternative to ensure that it complies with service requirements. The core for supporting the computational requirements at the network of PiCasso is the orchrestration engine that deploys services edge. Examples include inherently supporting the computational needs for local applications like smart homes and applications on the basis of the service specifications and the status of with stringent Quality of Service (QoS) requirements which are the resources of the hosting devices. Although PiCasso is still naturally hard to satisfy by traditional cloud infrastructures or under development, this paper offers insights into the building supporting multi-access edge computing requirements of network of service deployment platforms (its main contribution). We in the box type solutions. The implementation of such platform demonstrate that the effort involves the execution of practical demands precise knowledge of several key system parameters, including the load that a service can tolerate and the number experiments to yield results to identified the parameters that of service instances that a device can host. In this paper, we the orchrestration engine needs to take into account. introduce PiCasso, a platform for lightweight service orchestra- tion at the edges, and discuss the benchmarking results aimed II. RELATED WORK at identifying the critical parameters that PiCasso needs to take Several works [3]–[6] have explored the benefits of into consideration.
    [Show full text]
  • Fog Computing and Its Role in the Internet of Things
    Fog Computing and Its Role in the Internet of Things Flavio Bonomi, Rodolfo Milito, Jiang Zhu, Sateesh Addepalli Cisco Systems Inc. 170 W Tasman Dr. San Jose, CA 95134, USA {flavio, romilito, jiangzhu, sateeshk}@cisco.com ABSTRACT nodes in the vicinity to meet their delay requirements. An Fog Computing extends the Cloud Computing paradigm to emerging wave of Internet deployments, most notably the the edge of the network, thus enabling a new breed of ap- Internet of Things (IoTs), requires mobility support and plications and services. Defining characteristics of the Fog geo-distribution in addition to location awareness and low are: a) Low latency and location awareness; b) Wide-spread latency. We argue that a new platform is needed to meet geographical distribution; c) Mobility; d) Very large number these requirements; a platform we call Fog Computing [1], of nodes, e) Predominant role of wireless access, f) Strong or, briefly, Fog, simply because the fog is a cloud close to presence of streaming and real time applications, g) Het- the ground. We also claim that rather than cannibalizing erogeneity. In this paper we argue that the above charac- Cloud Computing, Fog Computing enables a new breed of teristics make the Fog the appropriate platform for a num- applications and services, and that there is a fruitful inter- ber of critical Internet of Things (IoT) services and appli- play between the Cloud and the Fog, particularly when it cations, namely, Connected Vehicle, Smart Grid , Smart comes to data management and analytics. Cities, and, in general, Wireless Sensors and Actuators Net- This paper is organized as follows.
    [Show full text]
  • EFFICIENT LIVE MIGRATION of EDGE SERVICES LEVERAGING CONTAINER LAYERED STORAGE 2021 Services Are Running Inside Docker Containers
    2020 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 18, NO. 9, SEPTEMBER 2019 Efficient Live Migration of Edge Services Leveraging Container Layered Storage Lele Ma , Shanhe Yi , Student Member, IEEE, Nancy Carter , and Qun Li, Fellow, IEEE Abstract—Mobile users across edge networks require seamless migration of offloading services. Edge computing platforms must smoothly support these service transfers and keep pace with user movements around the network. However, live migration of offloading services in the wide area network poses significant service handoff challenges in the edge computing environment. In this paper, we propose an edge computing platform architecture which supports seamless migration of offloading services while also keeping the moving mobile user “in service” with its nearest edge server. We identify a critical problem in the state-of-the-art tool for Docker container migration. Based on our systematic study of the Docker container storage system, we propose to leverage the layered nature of the storage system to reduce file system synchronization overhead, without dependence on the distributed file system. In contrast to the state-of-the-art service handoff method in the edge environment, our system yields a 80 percent (56 percent) reduction in handoff time under 5 Mbps (20 Mbps) network bandwidth conditions. Index Terms—Docker container, container migration, service handoff, edge computing Ç 1INTRODUCTION DGE computing has become a prominent concept in target server instead of the whole VM image volume. This Emany leading studies and technologies in recent significantly reduces data transfer size during migration. years [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12].
    [Show full text]