A Fog-Centric Secure Cloud Storage Scheme

被引:15
|
作者
Ahsan, M. A. Manazir [1 ]
Ali, Ihsan [1 ]
Imran, Muhammad [2 ]
Bin Idris, Mohd Yamani Idna [1 ]
Khan, Suleman [3 ]
Khan, Anwar [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] King Saud Univ, Coll Appl Comp Sci, Riyadh 11451, Saudi Arabia
[3] Northumbria Univ, Dept Comp & Informat Sci, Newcastle, England
[4] Univ Peshawar, Dept Elect, Peshawar 25120, Kpk, Pakistan
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2022年 / 7卷 / 02期
关键词
Cloud storage; fog server; Xor-Combination; CRH; privacy;
D O I
10.1109/TSUSC.2019.2914954
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is now being utilized as a prospective alternative for catering storage service. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breach, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a fog server based three-layer architecture has been presented for secure storage employing multiple clouds. The underlying techniques used are Hash-Solomon code and customized hash algorithm in order to attain the goal. However, it resulted in loss of smaller portion of data to cloud servers and failed to provide better modification detection and data recoverability. This paper proposes a novel fog-centric secure cloud storage scheme to protect data against unauthorized access, modification, and destruction. To prevent illegitimate access, the proposed scheme employs a new technique Xor - Combination to conceal data. Moreover, Block - Management outsources the outcomes of Xor - Combination to prevent malicious retrieval and to ensure better recoverability in case of data loss. Simultaneously, we propose a technique based on hash algorithm in order to facilitate modification detection with higher probability. We demonstrate robustness of the proposed scheme through security analysis. Experimental results validate performance supremacy of the proposed scheme compared to contemporary solutions in terms of data processing time.
引用
收藏
页码:250 / 262
页数:13
相关论文
共 50 条
  • [21] Fog-Centric IoT Based Framework for Healthcare Monitoring, Management and Early Warning System
    Hussain, Afzaal
    Zafar, Kashif
    Baig, Abdul Rauf
    IEEE ACCESS, 2021, 9 (09): : 74168 - 74179
  • [22] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    SENSORS, 2017, 17 (07)
  • [23] Anonymous and secure aggregation scheme in fog-based public cloud computing
    Wang, Huaqun
    Wang, Zhiwei
    Domingo-Ferrer, Josep
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 712 - 719
  • [24] Certificateless Aggregated Signcryption Scheme (CLASS) for Cloud-Fog Centric Industry 4.0
    Dohare, Indu
    Singh, Karan
    Ahmadian, Ali
    Mohan, Senthilkumar
    Reddy, Praveen Kumar M.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6349 - 6357
  • [25] A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
    Tian, Junfeng
    Jing, Xuan
    IEEE ACCESS, 2019, 7 : 68071 - 68082
  • [26] A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
    Singh, Premlata
    Saroj, Sushil Kr
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 695 - 700
  • [27] Secure Big Data Storage and Sharing Scheme for Cloud Tenants
    CHENG Hongbing
    RONG Chunming
    HWANG Kai
    WANG Weihong
    LI Yanyan
    中国通信, 2015, 12 (06) : 106 - 115
  • [28] Public data integrity verification scheme for secure cloud storage
    Ping Y.
    Zhan Y.
    Lu K.
    Wang B.
    Ping, Yuan (pyuan.lhn@xcu.edu.cn); Wang, Baocang (bcwang79@aliyun.com), 1600, MDPI AG (11):
  • [29] A Secure Client Side Deduplication Scheme in Cloud Storage Environments
    Kaaniche, Nesrine
    Laurent, Maryline
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [30] Public Data Integrity Verification Scheme for Secure Cloud Storage
    Ping, Yuan
    Zhan, Yu
    Lu, Ke
    Wang, Baocang
    INFORMATION, 2020, 11 (09)