Google Play icon

Meet ‘Fog Computing’ – a Potential Replacement of Cloud Storage

Posted March 21, 2017

To companies with massive amounts of data to store and those who want their files more easily accessible to remote users, cloud storage has a number of obvious advantages. However, it comes with its own technological and regulatory pitfalls.

“Fog computing” – the potential successor to the “cloud” – keeps shifting data packets around a network, which makes files effectively immaterial and therefore difficult to access by hacking a single server. Image credit: Pexels via Pixabay, CC0 Public Domain.

If a server that stores all or most of the data for a company is compromised by way of a cyber-attack, the data of thousands, or even millions, of users may be exposed in a single stroke of bad luck or a simple gap in cyber-security protocols.

To address the issue, and as a logical next step in the development of distributed computing services, a team of researchers from Italy are now proposing another climate analogy – a technique they call “fog computing”.

Whereas, under cloud storage, files are stored on a single server, “fog computing” would distribute them over a private or public network by using virtual buffers in Internet routers to endlessly relocate data packets without a file ever being complete in one place.

This would mean that there’s no single node for hackers to attack, allowing only legitimate users (or “injectors” and “extractors”, as they are called in the paper) to access the contents.

“The trend towards outsourcing of services and data on cloud architectures has triggered a number of legal questions on how to manage jurisdiction and who has jurisdiction over data and services in the event of illegal actions,” note the authors.

By making files virtually immaterial in the sense that no discrete piece of information would be stored in any particular location, “fog computing” could potentially circumvent both the legal and security-related issues by putting the contents off-limits to anyone without privileged access.

The authors likened the technique to a latter with a tracking device but an incomplete address that gets shifted around between different post offices without ever being delivered. Once the letter is needed again, however, the rightful owner would easily locate it by following the signal from the tracker.

The full details of the proposed “fog computing” system were published in the International Journal of Electronic Security and Digital Forensics.

Sources: study abstract,,

Featured news from related categories:

Technology Org App
Google Play icon
85,387 science & technology articles

Most Popular Articles

  1. New treatment may reverse celiac disease (October 22, 2019)
  2. "Helical Engine" Proposed by NASA Engineer could Reach 99% the Speed of Light. But could it, really? (October 17, 2019)
  3. New Class of Painkillers Offers all the Benefits of Opioids, Minus the Side Effects and Addictiveness (October 16, 2019)
  4. The World's Energy Storage Powerhouse (November 1, 2019)
  5. Plastic waste may be headed for the microwave (October 18, 2019)

Follow us

Facebook   Twitter   Pinterest   Tumblr   RSS   Newsletter via Email