An Approach for a Fog-centric Secure Cloud Storage Scheme

  • et al.
N/ACitations
Citations of this article
N/AReaders
Mendeley users who have this article in their library.
Get full text

Abstract

Currently, cloud computing is being considered as a possible replacement for providing storage services. Security concerns with cloud storage might prevent its mainstream adoption. New security hazards to cloud storage include data breaches, malicious alterations, and data loss. For safe storage employing different clouds, a three-tier architecture built on Fog servers has recently been described. Hash Solomon's code and a specially created hash algorithm are the fundamental methods employed to accomplish the task. This does not, however, provide improved change detection and data recovery and results in the loss of a tiny amount of data to cloud servers. This research suggests a unique secure cloud storage system focused on fog to guard against illegal access, alteration, and destruction of data. The suggested strategy employs a novel method of data obscuration to prevent unwanted access. Additionally, the outcomes of Block - Management to stop unauthorised access and provide greater recovery in case of data loss. In addition, we provide a method based on a hash algorithm to make it simpler to find high-probability changes. Through security analysis, we show that the suggested approach is reliable. Experimental findings support the suggested scheme's performance advantage over modern alternatives in terms of data processing speed.

Cite

CITATION STYLE

APA

Anuhya, K., Kumar, G., & S Yalawar, M. (2022). An Approach for a Fog-centric Secure Cloud Storage Scheme. International Journal of Recent Technology and Engineering (IJRTE), 11(3), 78–83. https://doi.org/10.35940/ijrte.c7267.0911322

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free