A fog-centric secure cloud storage scheme
Cloud computing is now being utilized as a prospective alternative for catering storage service. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breach, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Published: |
IEEE-Inst Electrical Electronics Engineers Inc
2022
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/42302/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.um.eprints.42302 |
---|---|
record_format |
eprints |
spelling |
my.um.eprints.423022023-10-12T03:27:17Z http://eprints.um.edu.my/42302/ A fog-centric secure cloud storage scheme Ahsan, M. A. Manazir Ali, Ihsan Imran, Muhammad Idris, Mohd Yamani Idna Khan, Suleman Khan, Anwar QA75 Electronic computers. Computer science T Technology (General) Cloud computing is now being utilized as a prospective alternative for catering storage service. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breach, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a fog server based three-layer architecture has been presented for secure storage employing multiple clouds. The underlying techniques used are Hash-Solomon code and customized hash algorithm in order to attain the goal. However, it resulted in loss of smaller portion of data to cloud servers and failed to provide better modification detection and data recoverability. This paper proposes a novel fog-centric secure cloud storage scheme to protect data against unauthorized access, modification, and destruction. To prevent illegitimate access, the proposed scheme employs a new technique Xor - Combination to conceal data. Moreover, Block - Management outsources the outcomes of Xor - Combination to prevent malicious retrieval and to ensure better recoverability in case of data loss. Simultaneously, we propose a technique based on hash algorithm in order to facilitate modification detection with higher probability. We demonstrate robustness of the proposed scheme through security analysis. Experimental results validate performance supremacy of the proposed scheme compared to contemporary solutions in terms of data processing time. IEEE-Inst Electrical Electronics Engineers Inc 2022-04 Article PeerReviewed Ahsan, M. A. Manazir and Ali, Ihsan and Imran, Muhammad and Idris, Mohd Yamani Idna and Khan, Suleman and Khan, Anwar (2022) A fog-centric secure cloud storage scheme. IEEE Transactions on Sustainable Computing, 7 (2). pp. 250-262. ISSN 377-3782, DOI https://doi.org/10.1109/TSUSC.2019.2914954 <https://doi.org/10.1109/TSUSC.2019.2914954>. 10.1109/TSUSC.2019.2914954 |
institution |
Universiti Malaya |
building |
UM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaya |
content_source |
UM Research Repository |
url_provider |
http://eprints.um.edu.my/ |
topic |
QA75 Electronic computers. Computer science T Technology (General) |
spellingShingle |
QA75 Electronic computers. Computer science T Technology (General) Ahsan, M. A. Manazir Ali, Ihsan Imran, Muhammad Idris, Mohd Yamani Idna Khan, Suleman Khan, Anwar A fog-centric secure cloud storage scheme |
description |
Cloud computing is now being utilized as a prospective alternative for catering storage service. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breach, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a fog server based three-layer architecture has been presented for secure storage employing multiple clouds. The underlying techniques used are Hash-Solomon code and customized hash algorithm in order to attain the goal. However, it resulted in loss of smaller portion of data to cloud servers and failed to provide better modification detection and data recoverability. This paper proposes a novel fog-centric secure cloud storage scheme to protect data against unauthorized access, modification, and destruction. To prevent illegitimate access, the proposed scheme employs a new technique Xor - Combination to conceal data. Moreover, Block - Management outsources the outcomes of Xor - Combination to prevent malicious retrieval and to ensure better recoverability in case of data loss. Simultaneously, we propose a technique based on hash algorithm in order to facilitate modification detection with higher probability. We demonstrate robustness of the proposed scheme through security analysis. Experimental results validate performance supremacy of the proposed scheme compared to contemporary solutions in terms of data processing time. |
format |
Article |
author |
Ahsan, M. A. Manazir Ali, Ihsan Imran, Muhammad Idris, Mohd Yamani Idna Khan, Suleman Khan, Anwar |
author_facet |
Ahsan, M. A. Manazir Ali, Ihsan Imran, Muhammad Idris, Mohd Yamani Idna Khan, Suleman Khan, Anwar |
author_sort |
Ahsan, M. A. Manazir |
title |
A fog-centric secure cloud storage scheme |
title_short |
A fog-centric secure cloud storage scheme |
title_full |
A fog-centric secure cloud storage scheme |
title_fullStr |
A fog-centric secure cloud storage scheme |
title_full_unstemmed |
A fog-centric secure cloud storage scheme |
title_sort |
fog-centric secure cloud storage scheme |
publisher |
IEEE-Inst Electrical Electronics Engineers Inc |
publishDate |
2022 |
url |
http://eprints.um.edu.my/42302/ |
_version_ |
1781704624677322752 |
score |
13.149126 |