A secure cloud storage scheme on fog computing- π‘‹π‘œπ‘Ÿβˆ’πΆπ‘œπ‘šπ‘π‘–π‘›π‘Žπ‘‘π‘–π‘œπ‘›, π΅π‘™π‘œπ‘π‘˜βˆ’π‘€π‘Žπ‘›π‘Žπ‘”π‘’π‘šπ‘’π‘›π‘‘ and 𝐢𝑅𝐻 operation

A.Tejaswi Gurunath, K.V.V.L. Madhuri

Abstract


Fog server based three-layer design has been introduced for secure storage employing multiple clouds. The fundamental methods utilized are Hash-Solomon code and redid hash algorithm so as to achieve the objective. However, it brought about loss of littler part of data to cloud servers and neglected to give better change location and data recoverability. It proposes a novel haze driven secure cloud storage plan to ensure data against unapproved access, alteration, and obliteration. To forestall ill-conceived get to, the proposed plot utilizes another system π‘‹π‘œπ‘Ÿβˆ’πΆπ‘œπ‘šπ‘π‘–π‘›π‘Žπ‘‘π‘–π‘œπ‘› to cover data. Also, block management outsources the results of π‘‹π‘œπ‘Ÿβˆ’πΆπ‘œπ‘šπ‘π‘–π‘›π‘Žπ‘‘π‘–π‘œπ‘› to forestall pernicious recovery and to guarantee better recoverability if there should arise an occurrence of data misfortune. At the same time, we propose a procedure dependent on hash algorithm so as to encourage alteration detection with higher probability.


References


P. Mell and T. Grance, "The NIST definition of cloud computing," Communications of the ACM, vol. 53, no. 6, p. 50, 2010.

X. Liu, S. Zhao, A. Liu, N. Xiong, and A. V. Vasilakos, "Knowledge-aware proactive nodes selection approach for energy management in Internet of Things," Future generation computer systems, 2017.

Y. Liu, A. Liu, S. Guo, Z. Li, Y.-J. Choi, and H. Sekiya, "Context-aware collect data with energy efficient in Cyber–physical cloud systems," Future Generation Computer Systems, 2017.

J. Chase, R. Kaewpuang, W. Yonggang, and D. Niyato, "Joint virtual machine and bandwidth allocation in software defined network (SDN) and cloud computing environments," in Communications (ICC), 2014 IEEE International Conference on, 2014, pp. 2969-2974: IEEE.

B. Martini and K.-K. R. Choo, "Cloud filesystem forensics: XtreemFS as a case study," Digital Investigation, vol. 11, no. 4, pp. 295-313, 2014.

N. D. W. Cahyani, B. Martini, K. K. R. Choo, and A. Al‐Azhar, "Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case study," Concurrency and Computation: Practice and Experience, vol. 29, no. 14, 2017.

J. Fu, Y. Liu, H.-C. Chao, B. Bhargava, and Z. J. I. T. o. I. I. Zhang, "Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing," 2018.

C. F. Tassone, B. Martini, and K. K. R. Choo, "Visualizing digital forensic datasets: a proof of concept," Journal of forensic sciences, vol. 62, no. 5, pp. 1197-1204, 2017.

C. Hooper, B. Martini, and K.-K. R. Choo, "Cloud computing and its implications for cybercrime investigations in Australia," Computer Law & Security Review, vol. 29, no. 2, pp. 152-163, 2013.

D. Quick and K.-K. R. Choo, "Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+ OSINT): A timely and cohesive mix," Future Generation Computer Systems, vol. 78, pp. 558-567, 2018.

Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, and L. T. Yang, "Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study," Computers & Electrical Engineering, vol. 58, pp. 350-363, 2017.

T. Wang et al., "Fog-based storage technology to fight with cyber threat," Future Generation Computer Systems, 2018.

T. Wang, J. Zhou, X. Chen, G. Wang, A. Liu, and Y. Liu, "A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing," IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 3-12, 2018.

T. Wang et al., "Data collection from WSNs to the cloud based on mobile Fog elements," Future Generation Computer Systems, 2017.

M.Xie, U. Bhanja, J. Shao, G. Zhang, and G. Wei, "LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants," Data Sciences, vol. 420, pp. 37-48, 2017.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright Β© 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Β