A fog-centric secure cloud storage scheme

Cloud computing is now being utilized as a prospective alternative for catering storage service. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breach, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahsan, M. A. Manazir, Ali, Ihsan, Imran, Muhammad, Idris, Mohd Yamani Idna, Khan, Suleman, Khan, Anwar
Format: Article
Published: IEEE-Inst Electrical Electronics Engineers Inc 2022
Subjects:
Online Access:http://eprints.um.edu.my/42302/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.eprints.42302
record_format eprints
spelling my.um.eprints.423022023-10-12T03:27:17Z http://eprints.um.edu.my/42302/ A fog-centric secure cloud storage scheme Ahsan, M. A. Manazir Ali, Ihsan Imran, Muhammad Idris, Mohd Yamani Idna Khan, Suleman Khan, Anwar QA75 Electronic computers. Computer science T Technology (General) Cloud computing is now being utilized as a prospective alternative for catering storage service. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breach, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a fog server based three-layer architecture has been presented for secure storage employing multiple clouds. The underlying techniques used are Hash-Solomon code and customized hash algorithm in order to attain the goal. However, it resulted in loss of smaller portion of data to cloud servers and failed to provide better modification detection and data recoverability. This paper proposes a novel fog-centric secure cloud storage scheme to protect data against unauthorized access, modification, and destruction. To prevent illegitimate access, the proposed scheme employs a new technique Xor - Combination to conceal data. Moreover, Block - Management outsources the outcomes of Xor - Combination to prevent malicious retrieval and to ensure better recoverability in case of data loss. Simultaneously, we propose a technique based on hash algorithm in order to facilitate modification detection with higher probability. We demonstrate robustness of the proposed scheme through security analysis. Experimental results validate performance supremacy of the proposed scheme compared to contemporary solutions in terms of data processing time. IEEE-Inst Electrical Electronics Engineers Inc 2022-04 Article PeerReviewed Ahsan, M. A. Manazir and Ali, Ihsan and Imran, Muhammad and Idris, Mohd Yamani Idna and Khan, Suleman and Khan, Anwar (2022) A fog-centric secure cloud storage scheme. IEEE Transactions on Sustainable Computing, 7 (2). pp. 250-262. ISSN 377-3782, DOI https://doi.org/10.1109/TSUSC.2019.2914954 <https://doi.org/10.1109/TSUSC.2019.2914954>. 10.1109/TSUSC.2019.2914954
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Research Repository
url_provider http://eprints.um.edu.my/
topic QA75 Electronic computers. Computer science
T Technology (General)
spellingShingle QA75 Electronic computers. Computer science
T Technology (General)
Ahsan, M. A. Manazir
Ali, Ihsan
Imran, Muhammad
Idris, Mohd Yamani Idna
Khan, Suleman
Khan, Anwar
A fog-centric secure cloud storage scheme
description Cloud computing is now being utilized as a prospective alternative for catering storage service. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breach, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a fog server based three-layer architecture has been presented for secure storage employing multiple clouds. The underlying techniques used are Hash-Solomon code and customized hash algorithm in order to attain the goal. However, it resulted in loss of smaller portion of data to cloud servers and failed to provide better modification detection and data recoverability. This paper proposes a novel fog-centric secure cloud storage scheme to protect data against unauthorized access, modification, and destruction. To prevent illegitimate access, the proposed scheme employs a new technique Xor - Combination to conceal data. Moreover, Block - Management outsources the outcomes of Xor - Combination to prevent malicious retrieval and to ensure better recoverability in case of data loss. Simultaneously, we propose a technique based on hash algorithm in order to facilitate modification detection with higher probability. We demonstrate robustness of the proposed scheme through security analysis. Experimental results validate performance supremacy of the proposed scheme compared to contemporary solutions in terms of data processing time.
format Article
author Ahsan, M. A. Manazir
Ali, Ihsan
Imran, Muhammad
Idris, Mohd Yamani Idna
Khan, Suleman
Khan, Anwar
author_facet Ahsan, M. A. Manazir
Ali, Ihsan
Imran, Muhammad
Idris, Mohd Yamani Idna
Khan, Suleman
Khan, Anwar
author_sort Ahsan, M. A. Manazir
title A fog-centric secure cloud storage scheme
title_short A fog-centric secure cloud storage scheme
title_full A fog-centric secure cloud storage scheme
title_fullStr A fog-centric secure cloud storage scheme
title_full_unstemmed A fog-centric secure cloud storage scheme
title_sort fog-centric secure cloud storage scheme
publisher IEEE-Inst Electrical Electronics Engineers Inc
publishDate 2022
url http://eprints.um.edu.my/42302/
_version_ 1781704624677322752
score 13.149126