A Fog-Centric Secure Cloud Storage Scheme

被引:15
|
作者
Ahsan, M. A. Manazir [1 ]
Ali, Ihsan [1 ]
Imran, Muhammad [2 ]
Bin Idris, Mohd Yamani Idna [1 ]
Khan, Suleman [3 ]
Khan, Anwar [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] King Saud Univ, Coll Appl Comp Sci, Riyadh 11451, Saudi Arabia
[3] Northumbria Univ, Dept Comp & Informat Sci, Newcastle, England
[4] Univ Peshawar, Dept Elect, Peshawar 25120, Kpk, Pakistan
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2022年 / 7卷 / 02期
关键词
Cloud storage; fog server; Xor-Combination; CRH; privacy;
D O I
10.1109/TSUSC.2019.2914954
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is now being utilized as a prospective alternative for catering storage service. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breach, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a fog server based three-layer architecture has been presented for secure storage employing multiple clouds. The underlying techniques used are Hash-Solomon code and customized hash algorithm in order to attain the goal. However, it resulted in loss of smaller portion of data to cloud servers and failed to provide better modification detection and data recoverability. This paper proposes a novel fog-centric secure cloud storage scheme to protect data against unauthorized access, modification, and destruction. To prevent illegitimate access, the proposed scheme employs a new technique Xor - Combination to conceal data. Moreover, Block - Management outsources the outcomes of Xor - Combination to prevent malicious retrieval and to ensure better recoverability in case of data loss. Simultaneously, we propose a technique based on hash algorithm in order to facilitate modification detection with higher probability. We demonstrate robustness of the proposed scheme through security analysis. Experimental results validate performance supremacy of the proposed scheme compared to contemporary solutions in terms of data processing time.
引用
收藏
页码:250 / 262
页数:13
相关论文
共 50 条
  • [41] FogDedupe: A Fog-Centric Deduplication Approach Using Multi-Key Homomorphic Encryption Technique
    Yoosuf, Mohamed Sirajudeen
    Muralidharan, C.
    Shitharth, S.
    Alghamdi, Mohammed
    Maray, Mohammed
    Rabie, Osama Bassam J.
    JOURNAL OF SENSORS, 2022, 2022
  • [42] SOS-FCI: a secure offloading scheme in fog–cloud-based IoT
    Yashar Salami
    Vahid Khajehvand
    Esmaeil Zeinali
    The Journal of Supercomputing, 2024, 80 : 570 - 600
  • [43] SOS-FCI: a secure offloading scheme in fog-cloud-based IoT
    Salami, Yashar
    Khajehvand, Vahid
    Zeinali, Esmaeil
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (01): : 570 - 600
  • [44] Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration
    Chaudhary, Ajay
    Peddoju, Sateesh K.
    Chouhan, Vikas
    JOURNAL OF GRID COMPUTING, 2023, 21 (03)
  • [45] Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration
    Ajay Chaudhary
    Sateesh K Peddoju
    Vikas Chouhan
    Journal of Grid Computing, 2023, 21
  • [46] Implementation and Evaluation of Secure Outsourcing Scheme for Secret Sharing Scheme on Cloud Storage Services
    Ohigashi, Toshihiro
    Nishimura, Kouji
    Aibara, Reiji
    Yoshida, Kouta
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 78 - 83
  • [47] Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing
    Fu, Jun-Song
    Liu, Yun
    Chao, Han-Chieh
    Bhargava, Bharat K.
    Zhang, Zhen-Jiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) : 4519 - 4528
  • [48] Fog-Assisted Aggregated Synchronization Scheme for Mobile Cloud Storage Applications
    Lee, Giwon
    Ko, Haneul
    Pack, Sangheon
    Pacifici, Valentino
    Dan, Gyorgy
    IEEE ACCESS, 2019, 7 : 56852 - 56863
  • [49] Secure public data auditing scheme for cloud storage in smart city
    Libing Wu
    Jing Wang
    Neeraj Kumar
    Debiao He
    Personal and Ubiquitous Computing, 2017, 21 : 949 - 962
  • [50] A probabilistic public key encryption switching scheme for secure cloud storage
    Bhat R.
    Sunitha N.R.
    Iyengar S.S.
    International Journal of Information Technology, 2023, 15 (2) : 675 - 690