Draft SP 800-191, the NIST Definition of Fog Computing

Draft SP 800-191, the NIST Definition of Fog Computing

The attached DRAFT document (provided here for historical purposes), released on August 21, 2017, has been superseded by the following publication: Publication Number: NIST Special Publication (SP) 500-325 Title: Fog Computing Conceptual Model Publication Date: March 2018 • Final Publication: https://doi.org/10.6028/NIST.SP.500-325 (which links to https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-325.pdf). • Related Information on CSRC: Final: https://csrc.nist.gov/publications/detail/sp/500-325/final 1 NIST Special Publication 800-191 (Draft) 2 3 The NIST Definition of Fog Computing 4 5 6 Michaela Iorga 7 Larry Feldman 8 Robert Barton 9 Michael J. Martin 10 Nedim Goren 11 Charif Mahmoudi 12 13 14 15 16 17 18 19 C O M P U T E R S E C U R I T Y 20 21 22 NIST Special Publication 800-191 (Draft) 23 24 The NIST Definition of Fog Computing 25 26 Michaela Iorga 27 Computer Security Division 28 Information Technology Laboratory 29 30 Larry Feldman 31 G2 Inc. 32 33 Robert Barton 34 Cisco 35 36 Michael J Martin 37 IBM Canada Ltd. 38 39 Nedim Goren 40 Computer Security Division 41 Information Technology Laboratory 42 43 Charif Mahmoudi 44 Advanced Network Technologies Division 45 Information Technology Laboratory 46 47 48 49 August 2017 50 51 52 53 54 55 U.S. Department of Commerce 56 Wilbur L. Ross, Jr., Secretary 57 58 National Institute of Standards and Technology 59 Kent Rochford, Acting NIST Director and Under Secretary of Commerce for Standards and Technology 60 Authority 61 This publication has been developed by NIST in accordance with its statutory responsibilities 62 under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et 63 seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security 64 standards and guidelines, including minimum requirements for federal information systems, but 65 such standards and guidelines shall not apply to national security systems without the express 66 approval of appropriate federal officials exercising policy authority over such systems. This 67 guideline is consistent with the requirements of the Office of Management and Budget (OMB) 68 Circular A-130. 69 Nothing in this publication should be taken to contradict the standards and guidelines made 70 mandatory and binding on federal agencies by the Secretary of Commerce under statutory 71 authority. Nor should these guidelines be interpreted as altering or superseding the existing 72 authorities of the Secretary of Commerce, Director of the OMB, or any other federal official. This 73 publication may be used by nongovernmental organizations on a voluntary basis and is not subject 74 to copyright in the United States. Attribution would, however, be appreciated by NIST. 75 National Institute of Standards and Technology Special Publication 800-191 76 Natl. Inst. Stand. Technol. Spec. Publ. 800-191, 13 pages (August 2017) 77 CODEN: NSPUE2 78 79 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an 80 experimental procedure or concept adequately. Such identification is not intended to imply recommendation or 81 endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best 82 available for the purpose. 83 There may be references in this publication to other publications currently under development by NIST in accordance 84 with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, 85 may be used by federal agencies even before the completion of such companion publications. Thus, until each 86 publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For 87 planning and transition purposes, federal agencies may wish to closely follow the development of these new 88 publications by NIST. 89 Organizations are encouraged to review all draft publications during public comment periods and provide feedback 90 to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at 91 http://csrc.nist.gov/publications. 92 Public comment period: August 21, 2017 through September 21, 2017 93 94 National Institute of Standards and Technology 95 Attn: Computer Security Division, Information Technology Laboratory 96 100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930 97 Email: [email protected] 98 99 All comments are subject to release under the Freedom of Information Act (FOIA). NIST SP 800-191 (DRAFT) THE NIST FOG COMPUTING DEFINITION 100 Reports on Computer Systems Technology 101 The Information Technology Laboratory (ITL) at the National Institute of Standards and 102 Technology (NIST) promotes the U.S. economy and public welfare by providing technical 103 leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test 104 methods, reference data, proof of concept implementations, and technical analysis to advance the 105 development and productive use of information technology. ITL’s responsibilities include the 106 development of technical, physical, administrative, and management standards and guidelines for 107 the cost-effective security and privacy of sensitive unclassified information in Federal computer 108 systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach 109 efforts in computer security and its collaborative activities with industry, government, and 110 academic organizations. 111 Abstract 112 Managing the data generated by Internet of Things (IoT) sensors is one of the biggest challenges 113 faced when deploying an IoT system. Traditional cloud-based IoT systems are challenged by the 114 large scale, heterogeneity, and high latency witnessed in some cloud ecosystems. One solution is 115 to decentralize applications, management, and data analytics into the network itself using a 116 distributed and federated compute model. This approach has become known as fog 117 computing. This document presents a formal definition of fog and mist computing and how they 118 relate to cloud-based computing models for IoT. This document further characterizes important 119 properties and aspects of fog computing, including service models, deployment strategies, and 120 provides a baseline of what fog computing is, and how it may be used. 121 122 Keywords 123 cloud computing; cloudlet; edge computing; fluid computing; fog computing; fluid computing; 124 Internet of Things (IoT); mist computing 125 126 127 128 129 ii NIST SP 800-191 (DRAFT) THE NIST FOG COMPUTING DEFINITION 130 Acknowledgments 131 The authors would like to thank their colleagues and the experts in industry and government who 132 contributed their thoughts to the creation and review of this definition. 133 134 Audience 135 The intended audience of this document is system planners, system architects, system engineers, 136 system managers, program managers, technologists and networking specialists that consume or 137 provide Internet of Things solutions leveraging cloud and/or fog computing services. 138 139 140 iii NIST SP 800-191 (DRAFT) THE NIST FOG COMPUTING DEFINITION 141 142 Table of Contents 143 1 Introduction ............................................................................................................ 1 144 1.1 Purpose and Scope ........................................................................................ 1 145 2 The NIST Definition of Fog Computing ................................................................ 2 146 2.1 Fog Computing Definition ............................................................................... 2 147 2.2 Fog Computing Characteristics ....................................................................... 2 148 2.3 Fog Node Definition ........................................................................................ 3 149 2.4 Fog Node Architectural Service Types ............................................................ 4 150 2.5 Fog Node Deployment Models ....................................................................... 4 151 3 Mist Computing as Lightweight Fog Layer .......................................................... 5 152 3.1 Mist Computing Definition ............................................................................... 5 153 154 List of Appendices 155 Acronyms ....................................................................................................................... 7 156 157 List of Figures 158 Figure 1 – Fog comuting supporting a cloud-based ecosystem for smart end-devices. .. 2 159 iv NIST SP 800-191 (DRAFT) THE NIST FOG COMPUTING DEFINITION 160 1 Introduction 161 Ubiquitous deployment of smart, interconnected devices is estimated to reach 50 billion units by 162 20201. This exponential increase is fueled by the proliferation of mobile devices (e.g. mobile 163 phones and tablets), smart sensors serving different vertical markets (e.g. smart power grids, 164 autonomous transportation, industrial controls, smart cities, wearables, etc), wireless sensors and 165 actuators networks. New concepts and technologies are needed to manage this growing fleet of 166 Internet of Things (IoT) devices. 167 1.1 Purpose and Scope 168 The acute need of the multitude of smart, end-user IoT devices and near-user edge devices to carry 169 out, with minimal latency, a substantial amount of data processing and to collaborate in a 170 distributed way, triggered technology advancements towards adaptive,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us