An Approach for a Fog-centric Secure Cloud Storage Scheme

  • et al.
Citations of this article
Mendeley users who have this article in their library.
Get full text


Currently, cloud computing is being considered as a possible replacement for providing storage services. Security concerns with cloud storage might prevent its mainstream adoption. New security hazards to cloud storage include data breaches, malicious alterations, and data loss. For safe storage employing different clouds, a three-tier architecture built on Fog servers has recently been described. Hash Solomon's code and a specially created hash algorithm are the fundamental methods employed to accomplish the task. This does not, however, provide improved change detection and data recovery and results in the loss of a tiny amount of data to cloud servers. This research suggests a unique secure cloud storage system focused on fog to guard against illegal access, alteration, and destruction of data. The suggested strategy employs a novel method of data obscuration to prevent unwanted access. Additionally, the outcomes of Block - Management to stop unauthorised access and provide greater recovery in case of data loss. In addition, we provide a method based on a hash algorithm to make it simpler to find high-probability changes. Through security analysis, we show that the suggested approach is reliable. Experimental findings support the suggested scheme's performance advantage over modern alternatives in terms of data processing speed.




Anuhya, K., Kumar, G., & S Yalawar, M. (2022). An Approach for a Fog-centric Secure Cloud Storage Scheme. International Journal of Recent Technology and Engineering (IJRTE), 11(3), 78–83.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free