Published September 30, 2022 | Version CC BY-NC-ND 4.0
Journal article Open

An Approach for a Fog-centric Secure Cloud Storage Scheme

  • 1. Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.
  • 2. Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.

Contributors

Contact person:

  • 1. Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.

Description

Abstract: Currently, cloud computing is being considered as a possible replacement for providing storage services. Security concerns with cloud storage might prevent its mainstream adoption. New security hazards to cloud storage include data breaches, malicious alterations, and data loss. For safe storage employing different clouds, a three-tier architecture built on Fog servers has recently been described. Hash Solomon's code and a specially created hash algorithm are the fundamental methods employed to accomplish the task. This does not, however, provide improved change detection and data recovery and results in the loss of a tiny amount of data to cloud servers. This research suggests a unique secure cloud storage system focused on fog to guard against illegal access, alteration, and destruction of data. The suggested strategy employs a novel method of data obscuration to prevent unwanted access. Additionally, the outcomes of Block - Management to stop unauthorised access and provide greater recovery in case of data loss. In addition, we provide a method based on a hash algorithm to make it simpler to find high-probability changes. Through security analysis, we show that the suggested approach is reliable. Experimental findings support the suggested scheme's performance advantage over modern alternatives in terms of data processing speed.

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

C72670911322.pdf

Files (890.3 kB)

Name Size Download all
md5:568a617be141c1721aafd3f52557b49d
890.3 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2277-3878 (ISSN)

References

  • P. Mell and T. Grance, "The NIST definition of cloud computing," Communications of the ACM, vol. 53, no. 6, p. 50, 2010.
  • X. Liu, S. Zhao, A. Liu, N. Xiong, and A. V. Vasilakos, "Knowledge-aware proactive nodes selection approach for energy management in Internet of Things," Future generation computer systems, 2017.
  • Y. Liu, A. Liu, S. Guo, Z. Li, Y.-J. Choi, and H. Sekiya, "Context-aware collect data with energy efficient in Cyber–physical cloud systems," Future Generation Computer Systems, 2017.
  • J. Chase, R. Kaewpuang, W. Yonggang, and D. Niyato, "Joint virtual machine and bandwidth allocation in software defined network (SDN) and cloud computing environments," in Communications (ICC), 2014 IEEE International Conference on, 2014, pp. 2969-2974: IEEE.
  • B. Martini and K.-K. R. Choo, "Distributed filesystem forensics: XtreemFS as a case study," Digital Investigation, vol. 11, no. 4, pp. 295-313, 2014.
  • N. D. W. Cahyani, B. Martini, K. K. R. Choo, and A. Al‐Azhar, "Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case study," Concurrency and Computation: Practice and Experience, vol. 29, no. 14, 2017.
  • J. Fu, Y. Liu, H.-C. Chao, B. Bhargava, and Z. J. I. T. o. I. I. Zhang, "Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing," 2018.
  • C. F. Tassone, B. Martini, and K. K. R. Choo, "Visualizing digital forensic datasets: a proof of concept," Journal of forensic sciences, vol. 62, no. 5, pp. 1197-1204, 2017.
  • C. Hooper, B. Martini, and K.-K. R. Choo, "Cloud computing and its implications for cybercrime investigations in Australia," Computer Law & Security Review, vol. 29, no. 2, pp. 152-163, 2013.
  • D. Quick and K.-K. R. Choo, "Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+ OSINT): A timely and cohesive mix," Future Generation Computer Systems, vol. 78, pp. 558-567, 2018.

Subjects

ISSN: 2277-3878 (Online)
https://portal.issn.org/resource/ISSN/2277-3878
Retrieval Number: 100.1/ijrte.C72670911322
https://www.ijrte.org/portfolio-item/C72670911322/
Journal Website: www.ijrte.org
https://www.ijrte.org/
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org/