Anomaly Detection for IOT/Cloud-Based Model in Fog Computing Using Machine Learning


  • Suraj Nayak
  • Shadab Pasha Khan



Fog Computing, Cloud Computing, Internet Of Things, Intrusion Detection, Anomaly Detection


We know that the key technologies that are involved in the Internet of Things are wireless sensor networks and cloud computing, big data, embedded systems, and the internet. It is a giant network with connected devices. These devices gather and share data. But many IoT devices have poor security and cybercriminals are taking benefit of this. The two techniques cloud and fog computing both combined can be used to transfer secure data in IoT devices as cloud computing provides storage of data on cloud servers and fog computing offers us various services to access data and provides support for cloud servers. This research work presents various techniques to detect an intruder and anomaly detection in IoT-based cloud systems. Also, a comparison of all the techniques used to detect intruders and anomalies are compared on various parameters like accuracy, performance, efficiency, precision, recall, the detection rate.


Download data is not yet available.


Metrics Loading ...

Author Biographies

Suraj Nayak

M.Tech Scholar

Oriental Institute of Science & Technology

Bhopal, Madhya Pradesh, India

Shadab Pasha Khan

Assistant Professor

Oriental Institute of Science & Technology

Bhopal, Madhya Pradesh, India


J. P. Anderson, “Computer security threat monitoring and surveillance,” Tech. Rep. James P Anderson Co Fort Washingt. Pa, p. 56, 1980, doi: citeulike-article-id:592588.

R. Heady, G. Luger, A. Maccabe, and M. Servilla, “The architecture of a network level intrusion detection system,” 1990, doi: 10.2172/425295.

G. Sai Nikhil, A. S. Rajasekaran, M. Parimala, and S. Velliangiri, “Applications of Machine Learning in Anomaly Detection,” Lect. Notes Electr. Eng., vol. 834, pp. 491–499, 2022, doi: 10.1007/978-981-16-8484-5_48.

M. Hasan, M. Islam, I. Islam, and M. M. A. Hashem, “Attack and Anomaly Detection in IoT Sensors in IoT Sites Using Machine Learning Approaches,” p. 100059, 2019, doi: 10.1016/j.iot.2019.100059.

E. Biermann, E. Cloete, and L. M. Venter, “A comparison of Intrusion Detection systems,” Comput. Secur., vol. 20, no. 8, pp. 676–683, 2001, doi:

Z. Yang, N. Chen, Y. Chen, and N. Zhou, “A Novel PMU Fog Based Early Anomaly Detection for an Efficient Wide Area PMU Network,” in 2018 IEEE 2nd International Conference on Fog and Edge Computing (ICFEC), 2018, pp. 1–10. doi: 10.1109/CFEC.2018.8358730.

R. Jaiswal, A. Chakravorty, and C. Rong, “Distributed Fog Computing Architecture for Real-Time Anomaly Detection in Smart Meter Data,” in 2020 IEEE Sixth International Conference on Big Data Computing Service and Applications (BigDataService), 2020, pp. 1–8. doi: 10.1109/BigDataService49289.2020.00009.

R. El-Awadi, A. Fernández-Vilas, and R. P. Díaz Redondo, “Fog Computing Solution for Distributed Anomaly Detection in Smart Grids,” in 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, pp. 348–353. doi: 10.1109/WiMOB.2019.8923222.

Q. Shafi, A. Basit, S. Qaisar, A. Koay, and I. Welch, “Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network,” IEEE Access, vol. 6, pp. 73713–73723, 2018, doi: 10.1109/ACCESS.2018.2884293.

N. Moustafa, K.-K. R. Choo, I. Radwan, and S. Camtepe, “Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog,” IEEE Trans. Inf. Forensics Secur., vol. 14, no. 8, pp. 1975–1987, 2019, doi: 10.1109/TIFS.2018.2890808.

M. Savic et al., “Deep Learning Anomaly Detection for Cellular IoT with Applications in Smart Logistics,” IEEE Access, vol. 9, no. 833828, pp. 59406–59419, 2021, doi: 10.1109/ACCESS.2021.3072916.

L. Lyu, J. Jin, S. Rajasegarar, X. He, and M. Palaniswami, “Fog-Empowered Anomaly Detection in IoT Using Hyperellipsoidal Clustering,” IEEE Internet Things J., vol. 4, no. 5, pp. 1174–1184, 2017, doi: 10.1109/JIOT.2017.2709942.

K. Chatterjee and N. R. Chaudhuri, “Distributed Anomaly Detection and PMU Data Recovery in a Fog-computing-WAMS Paradigm,” in 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2020, pp. 1–6. doi: 10.1109/SmartGridComm47815.2020.9302971.

A. Yahyaoui, T. Abdellatif, S. Yangui, and R. Attia, “READ-IoT: Reliable Event and Anomaly Detection Framework for the Internet of Things,” IEEE Access, vol. 9, pp. 24168–24186, 2021, doi: 10.1109/ACCESS.2021.3056149.

S. Manimurugan, “IoT-Fog-Cloud model for anomaly detection using improved Naïve Bayes and principal component analysis,” J. Ambient Intell. Humaniz. Comput., 2021, doi: 10.1007/s12652-020-02723-3.

D. A. B. Moreira, H. P. Marques, W. L. Costa, J. Celestino, R. L. Gomes, and M. Nogueira, “Anomaly Detection in Smart Environments using AI over Fog and Cloud Computing,” in 2021 IEEE 18th Annual Consumer Communications Networking Conference (CCNC), 2021, pp. 1–2. doi: 10.1109/CCNC49032.2021.9369449.




How to Cite

Nayak, S. ., & Khan, S. P. . (2022). Anomaly Detection for IOT/Cloud-Based Model in Fog Computing Using Machine Learning. SMART MOVES JOURNAL IJOSCIENCE, 8(7), 8–12.