A Hierarchic Secure Cloud Storage Scheme based on Fog Computing

被引:6
|
作者
Zhou, Jiyuan [1 ]
Wang, Tian [1 ]
Bhuiyan, Md Zakirul Alam [2 ]
Liu, Anfeng [3 ]
机构
[1] Huaqiao Univ, Coll Comp Sci, Xiamen, Peoples R China
[2] Fordham Univ, Dept Comp & Informat Sci, New York, NY 10023 USA
[3] Cent South Univ, Sch Informat Sci & Engn, Changsha, Peoples R China
来源
2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI | 2017年
关键词
cloud storage; fog computing; privacy protection; KEY MANAGEMENT SCHEME; SENSOR; DEFINITION;
D O I
10.1109/DASC-PICom-DataCom-CyberSciTec.2017.90
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the cloud computing technology was proposed, it has developed rapidly. Cloud computing demonstrated that it was a major driver of change in the IT industry and there are a lot of cloud-based technologies deriving from cloud computing. With the Cloud computing development and global growth of data, cloud storage technology gets more attention and better development and attracts a large number of users. Users depend on the powerful storage capacity of cloud storage. However, in this storage schema, users' data is all stored in cloud servers. In other word, users lose their right of control on data and face privacy leakage risk. Traditional privacy protection schemes are usually based on encryption technology, but these kinds of methods cannot effectively resist attack from the inside of cloud server. Once the password gets compromised, users' data will be exposed to public. In order to solve this problem, we propose a hierarchic storage method based on fog computing model and design a Hash-Solomon code algorithm. We put a small part of data in local machine and fog server, which can take full advantage of cloud storage and protect the privacy of data. Through the theoretical safety analysis and experimental evaluation, the feasibility of our scheme is validated, which is really a powerful supplement to existing cloud storage scheme.
引用
收藏
页码:470 / 477
页数:8
相关论文
共 50 条
  • [1] Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
    Zhang, Xingjun
    Si, Wei
    IEEE ACCESS, 2021, 9 : 37951 - 37960
  • [2] A Fog-Centric Secure Cloud Storage Scheme
    Ahsan, M. A. Manazir
    Ali, Ihsan
    Imran, Muhammad
    Bin Idris, Mohd Yamani Idna
    Khan, Suleman
    Khan, Anwar
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2022, 7 (02): : 250 - 262
  • [3] Anonymous and secure aggregation scheme in fog-based public cloud computing
    Wang, Huaqun
    Wang, Zhiwei
    Domingo-Ferrer, Josep
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 712 - 719
  • [4] Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing
    Zhang, Wenfang
    Jiao, Heng
    Yan, Zhuoqun
    Wang, Xiaomin
    Khan, Muhammad Khurram
    COMPUTERS & SECURITY, 2023, 125
  • [5] Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing
    Fu, Jun-Song
    Liu, Yun
    Chao, Han-Chieh
    Bhargava, Bharat K.
    Zhang, Zhen-Jiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) : 4519 - 4528
  • [6] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    SENSORS, 2017, 17 (07)
  • [7] Secure architecture for Cloud/Fog computing based on firewalls and controllers
    Kamoun-Abid, F.
    Rekik, M.
    Meddeb-Makhlouf, A.
    Zarai, F.
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 822 - 833
  • [8] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [9] An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
    Tian, Jun-Feng
    Wang, Hao-Ning
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [10] A Cryptographic Scheme for Secure Cloud Computing
    Llamas, Alejandro
    Ernesto Gonzalez, Raul
    2013 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2013, : 221 - 226