A Fog-Centric Secure Cloud Storage Scheme

被引:15
|
作者
Ahsan, M. A. Manazir [1 ]
Ali, Ihsan [1 ]
Imran, Muhammad [2 ]
Bin Idris, Mohd Yamani Idna [1 ]
Khan, Suleman [3 ]
Khan, Anwar [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] King Saud Univ, Coll Appl Comp Sci, Riyadh 11451, Saudi Arabia
[3] Northumbria Univ, Dept Comp & Informat Sci, Newcastle, England
[4] Univ Peshawar, Dept Elect, Peshawar 25120, Kpk, Pakistan
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2022年 / 7卷 / 02期
关键词
Cloud storage; fog server; Xor-Combination; CRH; privacy;
D O I
10.1109/TSUSC.2019.2914954
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is now being utilized as a prospective alternative for catering storage service. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breach, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a fog server based three-layer architecture has been presented for secure storage employing multiple clouds. The underlying techniques used are Hash-Solomon code and customized hash algorithm in order to attain the goal. However, it resulted in loss of smaller portion of data to cloud servers and failed to provide better modification detection and data recoverability. This paper proposes a novel fog-centric secure cloud storage scheme to protect data against unauthorized access, modification, and destruction. To prevent illegitimate access, the proposed scheme employs a new technique Xor - Combination to conceal data. Moreover, Block - Management outsources the outcomes of Xor - Combination to prevent malicious retrieval and to ensure better recoverability in case of data loss. Simultaneously, we propose a technique based on hash algorithm in order to facilitate modification detection with higher probability. We demonstrate robustness of the proposed scheme through security analysis. Experimental results validate performance supremacy of the proposed scheme compared to contemporary solutions in terms of data processing time.
引用
收藏
页码:250 / 262
页数:13
相关论文
共 50 条
  • [31] A secure and efficient remote data auditing scheme for cloud storage
    El Ghoubach, Imad
    Ben Abbou, Rachid
    Mrabti, Fatiha
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (05) : 593 - 599
  • [32] A Mixed Homomorphic Encryption Scheme for Secure Data Storage in Cloud
    Kangavalli, R.
    Vagdevi, S.
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1062 - 1066
  • [33] A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    Sakurai, Kouichi
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2016, : 524 - 531
  • [34] Secure Big Data Storage and Sharing Scheme for Cloud Tenants
    Cheng Hongbing
    Rong Chunming
    Hwang Kai
    Wang Weihong
    Li Yanyan
    CHINA COMMUNICATIONS, 2015, 12 (06) : 106 - 115
  • [35] An Efficient Provable Secure Public Auditing Scheme for Cloud Storage
    Xu, Chunxiang
    Zhang, Yuan
    Yu, Yong
    Zhang, Xiaojun
    Wen, Junwei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4226 - 4241
  • [36] One secure data integrity verification scheme for cloud storage
    Fan, Yongkai
    Lin, Xiaodong
    Tan, Gang
    Zhang, Yuqing
    Dong, Wei
    Lei, Jing
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 376 - 385
  • [37] Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Kencl, Lukas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 694 - 707
  • [38] A Group Based Identity Anonymity and Secure Cloud Storage Scheme
    Liu, Fan
    Jiang, Rui
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 238 - 241
  • [39] Secure and Efficient Traffic Obfuscation Scheme for Deduplicated Cloud Storage
    Dave, Jay
    Choudhurya, Nikumani
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2024, 58 (02) : 153 - 165
  • [40] User-Centric Key Management Scheme for Personal Cloud Storage
    Yoo, SeongMin
    Park, PyungKoo
    Shin, JinSeop
    Oh, JinSeok
    Ryu, HoYong
    Ryou, JaeCheol
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,