TASK 1 Annotated Bibliography Almadhor, A. (2016). A Fog Computing based Smart Grid Cloud Data Security. International Journal Of Applied Information Systems, 10(6), 1-6. http://dx.doi.org/10.5120/ijais2016451515 The authors researched about the Advanced Metering Infrastructure (AMI), to develop a smart grid that includes many advantages such as dependable, supportable to any environment and which is more efficient. As a result of this research, they found that the cloud computing holds all these features but, the security is still a major problem. So, they proposed a new technique with two way communication between more than one safe based systems. The authors proposed a new technique with two way communication between more than one safe based systems. Those advances positive simple additionally, short aggregation of various statistics, e.g. pleasant-grained readings of meter. Diverse protection and safety concerns with admire to the gathered statistics emerge, seeing that explorations has tested that it's miles practicable to Cause and extract client conduct from smart readings of meter. As a result, these meter readings are extraordinarily require and touchy correct warranty. Smart grid is bleeding part energy grid. It takes in verbal exchanges structure with information. Hajibaba, M., & Gorgin, S. (2014). A Review on Modern Distributed Computing Paradigms: Cloud Computing, Jungle Computing and Fog Computing. Journal Of Computing And Information Technology, 22(2), 69. http://dx.doi.org/10.2498/cit.1002381 The authors researched about the distributed for computing technology and how the resources are changing from end users to the centralized server. The fog computing applications have some problems in the network nodes when accessing the data. So, they proposed a new methodology with distributed computing paradigms. Because the Internet of everything (IoE) continue, engineers of cisco benefit a new computer, networking, and data storage paradigm that extends to the brink of the network. Fog computing is a new paradigm that continue cloud computing and offerings to the devices or edges of network. Like cloud computing, fog computing gives information, manner or compute, data storage, and application services to final user. The spotting fog attributes are it’s not close to final user, it’s hardly packed distribution of geographical, and its help for mobility. Hao, Z., Novak, E., Yi, S., & Li, Q. (2017). Challenges and Software Architecture for Fog Computing. IEEE Internet Computing, 21(2), 44-53. http://dx.doi.org/10.1109/mic.2017.26 The authors presented the article that explores the problems and challenges involved in the architecture of the cloud computing and fog computing. In this article, a new technology was proposed with flexible software architecture design and the name of the software is WM-FOG. The performance of the newly proposed system is analyzed. To maintain safety to cloud information from unauthorized approach from attacker of malicious we introduce a special technique to secure records in cloud device by way of the use of decoy approach. We display client data and behavior get right of entry to patterns in cloud device and identifying peculiar data approach patterns. While any unauthorized information get entry to the patterns is imagined then decoy information is supplied to the illegal client. This method save towards the misuse of the person real facts. If incase real client get captured on this device then user can ask one time password for authentication. Jia, G., Han, G., Wang, H., & Wang, F. (2017). Cost aware cache replacement policy in shared last-level cache for hybrid memory based fog computing. Enterprise Information Systems, 1-17. http://dx.doi.org/10.1080/17517575.2017.1295321 The authors proposed a new cache replacement policy to create awareness about cost for hybrid memory based fog computing technology. In this paper, the methodology to deduct the latency, and to improve the Quality of service (QoS) were proposed. The performance of this experiment is analyzed. The result shows that the performance is 43.6% which is higher than LRU memory systems. McMillin, B., & Zhang, T. (2017). Fog Computing for Smart Living. Computer, 50(2), 5-5. http://dx.doi.org/10.1109/mc.2017.57 The authors described the wide ranges of security services provided by cloud and fog computing technologies. A new approach is discussed regarding the computing architecture and further analysed that how they increased the open security for all the systems. The IoT performs a main position in healthcare programs, from controlling the diseases of chronic at one cease of the spectrum to stopping disorder at another. The IoT has made it feasible for system around the sector to gather data and save it, to be able to be capable of use it at a later level. But, this capacity opportunity is frequently no longer abused because of the excessively large interval among the information collection and the functionality to manner and analyze it. In this paper, an extreme studies has been carried out to abuse the function of IoT healthcare transmission and additionally analyze the sensible possibilities of it. Subsequently high-give up cloud computing automation based totally IoT structure is proposed to find the health answers in healthcare industry in dependable manner. Mitigating Internal Data Theft Attack In Cloud Using Fog Computing. (2017). International Journal Of Recent Trends In Engineering And Research, 3(2), 27-30. http://dx.doi.org/10.23883/ijrter.2017.3000.o6ixb The authors proposed a new methodology for migrating the internal data theft and attacking in the Cloud computing by using Fog computing. This system protects the user's real information from hacking. They have done an experiment to accomplish the data security in a remarkable level. The disadvantages of cloud computing is more abhorrent it was done by the inputter. For this problem, the security is given by the fog computing. Data Safety is the main problem of cloud computing. With fog computing, we introduce the different process of secure data in storage of cloud. The process of fog computing is actually prevent and safe our personal data with cloud data. we implement tracking information get entry to pattern into the cloud with the assist of person’s behavior pattern explore to resolve if and while malicious insiders approach someone’s files into cloud information. Sangle, P. (2016). Data Security System in Cloud by Using Fog Computing and Data Mining. International Journal Of Engineering And Computer Science. http://dx.doi.org/10.18535/ijecs/v5i12.40 The authors researched about the user behavior and the data accessing patterns which are provided for the unauthorized accessibility. As most of the organizations adopted cloud computing technology in IoT, the hackers are threatening them. To overcome this problem, they have proposed a new methodology that protects the user's data from any kind of misuse. To secure the original cloud information from unauthorized person and to give that original information to the authorized user are based the patterns of the application. To accomplish this process the internet connection is required for cloud data server. It validates the user and save the cloud data from attackers. This mechanism can be implemented with the OTP (One Time Password) which helps to verify the authorized user. If the pattern does not matching, then the access will be denied. Then the system automatically confuses the attacker by background functionality. So the data integrity and transparency is maintained in fog computing. Padmavathi, B. (2016). Implementation of IOT Based Health Care Solution Based on Cloud Computing. International Journal Of Engineering And Computer Science. http://dx.doi.org/10.18535/ijecs/v5i9.23 The author is mainly focused on the research of IoT based healthcare solutions, and how the data collection process is conducted in fog computing. The realistic opportunities and IoT frames are analyzed in a reliable manner. The computing capability of fog computing technology is analyzed. As the cloud concept has been growing in computer science technology, the IoT and cloud computing combination is needed in the field of medical-assisted environment. The primary research of the authors focused on each and individual development of the single approach and methodology. The secondary research of the authors focused on the managing service and medical monitoring field is conducted. The framework of the Cloud computing and its application in IoT is researched. The solutions for health issues are found in the reliable manner. The layered conceptual model for providing the decision support system is discussed for Smart Healthcare System. Salamah, H. (2015). FOG Computing: The new Paradigm. Communications On Applied Electronics, 3(5), 21-27. http://dx.doi.org/10.5120/cae2015651946 The new paradigm for Fog computing technology is proposed by the authors. They have researched about big data analytics and distributed computing methodology for real time information. The services of fog computing applications at critical situation are analyzed and the geographical paradigm is proposed for IoT (Internet of Things). In cloud computing, the fog computing is identified as an extended degree of important progression and new features are added. The decentralized model is investigated to improve it to more versatile and routine centralized program. In IoT, the Big Data Applications are invented with no inertia necessities. For IoT, the Exceptional Solicitations are grown and the mobile computing is also being grown advanced. These technologies are bonded together with the attractive functionalities. The transmission limit and the management framework of IoT are analyzed. Still Big data is focusing on its innovation and creative technologies and it has the responsibility to innovate things with new perspective. Sarkar, S., & Misra, S. (2016). Theoretical modelling of fog computing: a green computing paradigm to support IoT applications. IET Networks, 5(2), 23-29. http://dx.doi.org/10.1049/iet-net.2015.0034 The authors delivered their ideas about fog computing architecture theoretically. The performance of fog computing is compared with the traditional computing tools and methodologies. The result of their research says that there are 25% of IoT applications that demand at real time and provide low services. Moreover, the expenditure of this model is less than 40.48% which is below to the conventional computing methodologies. The authors mainly focused on the architecture of the fog computing and its theoretical modeling. The performance of the advanced fog computing technology is compared with the traditional approach of cloud computing model. The major principle concepts are focused towards the Internet of Things (IoT). The individual components and the business service latency are discussed. Based on the result of performance analysis the collaboration is made from both traditional and advanced computing technology. The efficient green computing application has been introduced as the real time application of IoT. The authors estimated the power energy consumed by the both technologies and derived the theory that tells about the fog computing and its business services. Shinde, D. (2017). Secured Authorized Data Using Hybrid Encryption in Cloud Computing. International Journal Of Engineering Research And Applications, 7(2), 56-58. http://dx.doi.org/10.9790/9622-0702055658 The authors of this journal researched the security issues involved in IoT technology and how to overcome these issues. In this new methodology, encryption and decryption method is applied to improve the efficiency and feasibility of the system. The circuit policy with cipher text attribute based hybrid encrypting scheme is proposed in this paper. The authors mainly focused on the research about encryption and decryption methodology. The circuit cipher is totally based on the text policy and the hybrid encryption process can be verified based on the attributes. The circuits are used to represent the accessibility control policy and shows that how it is secured. The encryption method is combined with the mac mechanism and the encryption is done before this mechanism. Then the partial decryption method is executed for the cloud server. The proposed scheme is more secure than traditional encryption method. So that the business process of cloud computing and fog computing is more secured and efficient. Thien, A., & Colomo-Palacios, R. (2016). A SYSTEMATIC LITERATURE REVIEW OF FOG COMPUTING. Bibsys Open Journal Systems, I, vol. 24, no. 1,(1894-7719). The authors reviewed fog computing technology paradigm of Internet of Things (IoT). The issues involved in this technology are analyzed by literature review. The benefits, challenges in fog computing prototype and applications are discussed in this paper. Also the authors have provided sufficient research on security and privacy of the fog computing system. When researching about the security issues, the authors reviewed many papers. The Fog computing is applied on various applications such as wireless sensor networks, IoT (Internet of Things), smart grids and Software Defined Networks (SDN). The security and privacy issues involved in business services are discussed but the fog computing has many advantages they are reliability and flexibility. Still the security issues are considered as the big thing in fog computing when compared to cloud computing.