Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-898X
Online ISSN:
0976-8998


  About JNT
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Networking Technology
 

A Secure Privacy-preserving Three-layer Framework for Cloud Storage Based on Fog Computing
Kousalya, A , Karpagavadivu, K
Sri Krishna College of Engineering and Technology Coimbatore, India, Dr. N.G.P Institute of Technology Coimbatore, India
Abstract: Witnessing the rapid growth in technology development in recent years, there is a need to store the huge amounts of data generated and stored. Cloud storage is widely used for storing large, structured, unstructured data. Cloud computing services are provided by third-party authorities to store all the data in a distributed framework. Data stored in the cloud has to be protected to guarantee the security of its clients. However, Cloud Service Providers (CSP) control the data stored by the users, thus separating ownership and management of data. The current schema uses traditional encryption technology, which is not effective in handling the user’s data without privacy leakage. Hence, we propose a three-layer framework based on fog computing, an extension of cloud computing that carries out a substantial amount of computation, storage, and communication locally and routed over the internet. In this framework, we implement the Hash-Solomon code algorithm to isolate the data into several parts stored in a local machine, fog server and cloud server. This can ensure security from internal attackers. Moreover, Computational Intelligence computes the distribution proportion in each server. The plausibility has been validated through experimental analysis, a ground-breaking supplement to existing distributed storage conspire.
Keywords: Cloud Computing, Security, Fog Computing A Secure Privacy-preserving Three-layer Framework for Cloud Storage Based on Fog Computing
DOI:https://doi.org/10.6025/jnt/2024/15/1/11-21
Full_Text   PDF 1.03 MB   Download:   31  times
References:

[1] Wang, Tian, Zhou Jiyuan, Chen Xinlei, Wang Guojun, Liu Anfeng, and Liu Yang. (2018). A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence
in Fog Computing. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 1-16.

[2] An, Yongkai, Lin Xiaodong, Liang Wei, Tan Gang, and Nanda Priyadarsi. (2019). A Secure Privacy Preserving Deduplication Scheme for Cloud Computing. Future Generation Computer Systems, 13(1), 68–96.

[3] Xia, X., Wang, L., Zhang, Z., Qin, X., Sun, X., and Ren, K. (2016). A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–2608.

[4] Kulkarni, R., Forster, A., and Vinayagamoorthy, G. (2010). Computational Intelligence in Wireless Sensor Networks: A Survey. IEEE Communication Surveys & Tutorials.

[5] Li, Y., Wang, T., Wang, G., Liang, J., and Chen, H. (2016). Efficient Data Collection in Sensor-Cloud System with Multiple Mobile Sinks. In Proceedings of the 10th Asia-Pacific  Services Computing Conference.

[6] McEliece, R. J., and Sarwate, D. V. (1981). On Sharing Secrets and Reed-Solomon Codes. Communications of the ACM, 24(9), 583–584.

[7] Li Hui, Sun Wenhai, Li Fenghua, and Wang Boyang. (2014). Secure and Privacy-Preserving Data Storage Service in Public Cloud. Journal on Computer Research and Development, 51(7), ISSN: 1397–1409.

[8] Xiao, L., Li, Q., and Liu, J. (2016). Survey on Secure Cloud Storage. Journal of Data Acquisition and Processing, 31(3), ISSN: 464–472.

[9] Rezapour, R., Asghari, P., Seyyed Javadi, H. H., and Ghanbari, S. (2021). Security in Fog Computing: A Systematic Review on Issues, Challenges and Solutions. Computer Science Review, 41, 100421.

[10] Kaur, Jasleen, Agrawal, Alka, and Khan, Raees Ahmad. (2020). Security Issues in Fog Environment: A Systematic Literature Review. International Journal of Wireless Information
Networks, 27(3), 467-483.

[11] Ometov, A., Molua, O. L., Komarov, M., and Nurmi, J. (2022). A Survey of Security in Cloud, Edge, and Fog Computing. Sensors, 22, 927.

[12] Saad Khan., Parkinson, Simon., Qin, Yongrui. (2017). Fog Computing Security: A Review of Current Applications and Security Solutions. Journal of Cloud Computing, 6(19).


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info