A Fog-Centric Secure Cloud Storage Scheme

被引:15
|
作者
Ahsan, M. A. Manazir [1 ]
Ali, Ihsan [1 ]
Imran, Muhammad [2 ]
Bin Idris, Mohd Yamani Idna [1 ]
Khan, Suleman [3 ]
Khan, Anwar [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] King Saud Univ, Coll Appl Comp Sci, Riyadh 11451, Saudi Arabia
[3] Northumbria Univ, Dept Comp & Informat Sci, Newcastle, England
[4] Univ Peshawar, Dept Elect, Peshawar 25120, Kpk, Pakistan
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2022年 / 7卷 / 02期
关键词
Cloud storage; fog server; Xor-Combination; CRH; privacy;
D O I
10.1109/TSUSC.2019.2914954
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is now being utilized as a prospective alternative for catering storage service. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breach, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a fog server based three-layer architecture has been presented for secure storage employing multiple clouds. The underlying techniques used are Hash-Solomon code and customized hash algorithm in order to attain the goal. However, it resulted in loss of smaller portion of data to cloud servers and failed to provide better modification detection and data recoverability. This paper proposes a novel fog-centric secure cloud storage scheme to protect data against unauthorized access, modification, and destruction. To prevent illegitimate access, the proposed scheme employs a new technique Xor - Combination to conceal data. Moreover, Block - Management outsources the outcomes of Xor - Combination to prevent malicious retrieval and to ensure better recoverability in case of data loss. Simultaneously, we propose a technique based on hash algorithm in order to facilitate modification detection with higher probability. We demonstrate robustness of the proposed scheme through security analysis. Experimental results validate performance supremacy of the proposed scheme compared to contemporary solutions in terms of data processing time.
引用
收藏
页码:250 / 262
页数:13
相关论文
共 50 条
  • [1] Lightweight fog-centric auditing scheme to verify integrity of IoT healthcare data in the cloud environment
    Yoosuf, Mohamed Sirajudeen
    Anitha, R.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (24):
  • [2] A Hierarchic Secure Cloud Storage Scheme based on Fog Computing
    Zhou, Jiyuan
    Wang, Tian
    Bhuiyan, Md Zakirul Alam
    Liu, Anfeng
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 470 - 477
  • [3] Fog-Centric Authenticated Key Agreement Scheme Without Trusted Parties
    Guo, Yimin
    Zhang, Zhenfeng
    Guo, Yajun
    IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5057 - 5066
  • [4] Fog-centric Localization for Ambient Assisted Living
    Bhargava, Kriti
    McManus, Gary
    Ivanov, Stepan
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING, TECHNOLOGY AND INNOVATION (ICE/ITMC), 2017, : 1424 - 1430
  • [5] Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
    Zhang, Xingjun
    Si, Wei
    IEEE ACCESS, 2021, 9 : 37951 - 37960
  • [6] Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing
    Zhang, Wenfang
    Jiao, Heng
    Yan, Zhuoqun
    Wang, Xiaomin
    Khan, Muhammad Khurram
    COMPUTERS & SECURITY, 2023, 125
  • [7] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [8] Secure Data Storage Scheme in Hybrid Cloud
    Liu X.-J.
    Ye W.
    Jiang J.-W.
    Zhang L.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (03): : 295 - 303
  • [9] A Novel Integrity Scheme for Secure Cloud Storage
    Kanmani, P.
    Anusha, S.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [10] Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case
    Nikoloudakis, Yannis
    Pallis, Evangelos
    Mastorakis, George
    Mavronnoustakis, Constandinos X.
    Skianis, Charalabos
    Markakis, Evangelos K.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (05) : 1216 - 1224