Could fog computing be more important than the cloud?
Cloud computing has become an extremely important way for businesses to store information. It offers advantages like reduced cost, increased collaboration and the ability to recover data after a disaster.
With those benefits, among others, it is little wonder why some companies have made the cloud their preferred way of operating.
Now, though, a group of researchers have developed a new form of remote data storage, saying that it offers more security than the cloud.
With the cloud, there have always been concerns about how secure information is. The fact everything is stored off premises has caused anxiety in some. Because cloud data is stored on one remote server, there have been fears that if it is compromised then all of that information can be accessed by the wrong people.
So Maria Concetta De Vivo and Rosario Culmone, computer scientists at Italy’s University of Camerino, have developed the concept of ‘fog computing’, which involves storing information across several servers.
Fog computing uses standard networking protocols in an unconventional way, exploiting what the developers call “virtual buffers” in internet routers to endlessly relocate data packets without a file ever residing in its entirety on a single computer server.
The researchers explained: “Our proposal is based on this idea of a service which renders information completely immaterial in the sense that for a given period of time, there is no place on earth that contains information complete in its entirety.”
They said that the technological and regulatory aspects of the cloud offer both opportunity and risk. In developing fog computing, they aimed to provide the benefits without the drawbacks.
According to Ms De Vivo and Ms Culmone, they “want to realise a fog of files, rather than a cloud”.
In using multiple servers, they said, there is no target for hackers and information can only be accessed by legitimate users. With hacking been the primary concern over cloud computing, the researchers feel that fog computing will offer real benefits to users.
They said: “The trend towards outsourcing of services and data on cloud architectures has triggered a number of legal questions on how to manage jurisdiction and who has jurisdiction over data and services in the event of illegal actions.”
It is hoped that fog computing has the potential to circumvent security and legal problems by ensuring files are off-limits to hackers. The researchers compared fog computing to sending a letter with a tracking device but an incomplete address, resulting in it simply being sent from post office to post office without ever being delivered.
With the ever-expanding Internet of Things and the upcoming launch of 5G, remote storage will have to be in the best position possible for businesses to capitalise on what is being offered. If fog computing can offer a more secure version of this, it could end up being more important than the cloud.
Share This Post, Choose Your Platform!
With over 25 years in the business telecoms industry and an unrivalled reputation of delivering excellent, personal customer service, Arrow is one of very few companies in the UK able to provide a full telecoms, IT and energy consultancy and service proposition.
Savings through automation, scale, improved service. We’ve got that covered. But the true value comes with empathy, through empowerment, collaboration. It’s connecting people that drives us forward. It’s people that make tomorrow happen.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.