Skip to main content

Detection of Data Anomalies in Fog Computing Architectures

  • Conference paper
  • First Online:
Smart Trends in Computing and Communications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 165))

  • 681 Accesses

Abstract

Fog computing architectures provide a new platform for distributed stream processing in Internet of Things (IoT) applications. In a hierarchical infrastructure, processing of stream data arriving from sensors starts at the lowest level edge nodes and proceeds to the intermediate level fog nodes and eventually to the top-level cloud node. The goal is to do as much processing as possible at the lower level nodes and react to unexpected or interesting input values as early as possible. The unexpected values are referred to as anomalies. They may occur due to malfunctioning of sensors, which may be due to accidents or intentional attacks, or changes in the environment. The anomalies must be detected and proper actions must be taken quickly to bring the application to a steady state. We describe a generic framework for detection of data anomalies in a fog hierarchy in this paper. Our framework can be adapted to any application and other fog architectures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Atif, Y., Ding, J., Jeusfeld, M.A.: Internet of things approach to cloud-based smart car parking. In: The 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks EUSPN 2016, 19–22 Sept 2016, London, United Kingdom, pp. 193–198 (2016). https://doi.org/10.1016/j.procs.2016.09.031

    Article  Google Scholar 

  2. Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, MCC’12, pp. 13–16. ACM, New York, NY, USA (2012). https://doi.org/10.1145/2342509.2342513

  3. Chang, C., Srirama, S.N., Buyya, R.: Indie fog: an efficient fog-computing infrastructure for the internet of things. Computer 50(9), 92–98 (2017)

    Article  Google Scholar 

  4. Dastjerdi, A.V., Buyya, R.: Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)

    Article  Google Scholar 

  5. Jones, A., Subrahmanian, E., Hamins, A., Grant, C.: Humans’ critical role in smart systems: a smart firefighting example. IEEE Internet Comput. 19(3), 28–31 (2015). https://doi.org/10.1109/MIC.2015.54

    Article  Google Scholar 

  6. Lyu, L., Jin, J., Rajasegarar, S., He, X., Palaniswami, M.: Fog-empowered anomaly detection in internet of things using hyperellipsoidal clustering. IEEE Internet Things J. 4(5), 1174–1184 (2017)

    Article  Google Scholar 

  7. Porter, M.E., Heppelmann, J.E.: How smart, connected products are transforming competition. Harvard Bus. Rev. 1–23 (2014)

    Google Scholar 

  8. Rassam, M.A., Zainal, A., Maarof, M.A.: Advancements of data anomaly detection research in wireless sensor networks: a survey and open issues. Sensors 13, 10087–10122 (2013)

    Article  Google Scholar 

  9. Santos, J., Leroux, P., Wauters, T., Volckaert, B., Turck, F.D.: Anomaly detection for smart city applications over 5g low power wide area networks. In: Proceedings of NOMS 2018—IEEE/IFIP Network Operations and Management Symposium. IEEE Xplore (2018)

    Google Scholar 

  10. Satyanarayanan, M.: The emergence of edge computing. Computer 50(1), 30–39 (2017)

    Article  Google Scholar 

  11. Sebestyen, G., Hangan, A.: Anomaly detection techniques in cyber-physical systems. Acta Univ. Sapientiae, Informatica 9(2), 101–118 (2017)

    Article  Google Scholar 

  12. Tang, B., Chen, Z., Hefferman, G., Wei, T., He, H., Yang, Q.: A hierarchical distributed fog computing architecture for big data analysis in smart cities. In: Proceedings of the ASE BigData & SocialInformatics 2015, ASE BD&SI’15, pp. 28:1–28:6. ACM, New York, NY, USA (2015). https://doi.org/10.1145/2818869.2818898

  13. Vidyasankar, K.: Consistency of continuous queries in fog computing. In: Proceedings of the 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2018), Procedia Computer Science. Elsevier (2018)

    Google Scholar 

  14. Vidyasankar, K.: Distributing computations in fog architectures. In: TOPIC’18 Proceedings. Association for Computing Machinery (2018). https://doi.org/10.1145/3229774.3229775

Download references

Acknowledgements

This work is supported in part by an NSERC (Natural Sciences and Engineering Research Council of Canada) Discovery Grant 3182.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Vidyasankar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vidyasankar, K. (2020). Detection of Data Anomalies in Fog Computing Architectures. In: Zhang, YD., Mandal, J., So-In, C., Thakur, N. (eds) Smart Trends in Computing and Communications. Smart Innovation, Systems and Technologies, vol 165. Springer, Singapore. https://doi.org/10.1007/978-981-15-0077-0_15

Download citation

Publish with us

Policies and ethics