A SURVEY ON EFFICIENT AUDITING SCHEME FOR SECURE DATA STORAGE IN FOG-TO-CLOUD COMPUTING
نویسندگان
چکیده
With the rise of Internet Things, fog-to-cloud computing has emerged as a new cutting-edge approach (IoT). Except for cloud service provider, necessitates participation additional entities, such mobile sinks and fog nodes (CSP). As result, storage integrity audits will differ from standard auditing. Tian et al. completed first stage in developing public auditing system computing. However, because they employ complex key cryptography techniques like bilinear mapping proof knowledge, their becomes inefficient. We offer more broad efficient based on MAC HMAC, two prominent private algorithms this study. By implementing we give real instantiation our system. Finally, theoretical analysis actual findings show that suggested lower communication costs.
منابع مشابه
A Survey of Public Auditing for Secure Data Storage in Cloud Computing
Cloud computing has been popular as the IT architecture. Cloud service providers offer many services based on cloud computing. Cloud storage service is the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end users. However, cloud storage service may have data security because the users’ data is not stored in their own storage. In this ...
متن کاملAn Efficient Auditing Protocol for Secure Data Storage in Cloud Computing
Cloud Computing is a type of distributed computing whereby resources and applications are shared over the internet. These applications are stored in one location and can be accessed in different location by any authorized users where the user does not need any infrastructure. In cloud storage, while outsourcing trust worthiness of the data is a scary task in cloud. To ensure the integrity of dy...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملSecure and efficient privacy-preserving public auditing scheme for cloud storage
Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacypreserving public auditing for secure cloud the storage” is inefficient. Thus, they offered a secure and efficient-privacy public auditing scheme for cloud storage. They claimed that their system is p...
متن کاملTask Scheduling in Fog Computing: A Survey
Recently, fog computing has been introducedto solve the challenges of cloud computing regarding Internet objects. One of the challenges in the field of fog computing is the scheduling of tasks requested by Internet objects. In this study, a review of articles related to task scheduling in fog computing has been done. At first, the research questions and goals will be introduced, an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of engineering technology and management sciences
سال: 2023
ISSN: ['2581-4621']
DOI: https://doi.org/10.46647/ijetms.2023.v07i02.071