INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH International Peer Reviewed & Refereed Journals, Open Access Journal ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15
Computing ability and storage space need of these devices are ever-increasing enormously, it demands the secure way of storing the data in cost efficient model. Cloud Computing has many advantages inherent in it, but yet there are several risks and constraint exists, for e.g. protection, data access control, efficiency, bandwidth, etc a novel remote data integrity checking model: CP-ABE,IDP (identity-based proxy) in multi-cloud storage. To analyze the efficiency of various well known cryptographic algorithms such as Identity-based cryptography, Proxy public key cryptography, these symmetric algorithms were implemented on cloud background and through the results derived from real time implementation of these algorithms on various handheld procedure, it is shown that which cryptographic technique can provide efficient and reliable security mechanism for information access control and security of user’s outsourced information in cloud computing. Recently , fog server based three-layer architecture has been presented for secure storage employing multiple clouds. The essential techniques used are Hash-Solomon code and customized hash algorithm in order to attain the goal. Implementation loss of smaller portion of data to cloud server and failed to provide better modification detection and data recoverability. This project proposes a novel fog-centric secure cloud storage scheme to protect data against unauthorized access, modification, and destruction. To prevent illegitimate access, the proposed scheme employs a new technique Or-Combination to conceal data. Moreover, Block-Management outsources the outcomes of Or-Combination to prevent malicious retrieval and to ensure better recoverability in case of data loss. Simultaneously, this proposes a technique based on hash algorithm in order to facilitate modification detection with higher probability. It also explains a robustness of the proposed scheme through security analysis
Keywords:
Data security, Cryptographic techniques; Identity-based cryptography, Proxy public key cryptographic-ABE
Cite Article:
"A FOG-CENTRIC SECURE CLOUD STORAGE SCHEME", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.5, Issue 6, page no.756 - 764, June-2020, Available :http://www.ijsdr.org/papers/IJSDR2006127.pdf
Downloads:
000337070
Publication Details:
Published Paper ID: IJSDR2006127
Registration ID:192080
Published In: Volume 5 Issue 6, June-2020
DOI (Digital Object Identifier):
Page No: 756 - 764
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631
Facebook Twitter Instagram LinkedIn