A SURVEY ON EFFICIENT AUDITING SCHEME FOR SECURE DATA STORAGE IN FOG-TO-CLOUD COMPUTING

نویسندگان

چکیده

With the rise of Internet Things, fog-to-cloud computing has emerged as a new cutting-edge approach (IoT). Except for cloud service provider, necessitates participation additional entities, such mobile sinks and fog nodes (CSP). As result, storage integrity audits will differ from standard auditing. Tian et al. completed first stage in developing public auditing system computing. However, because they employ complex key cryptography techniques like bilinear mapping proof knowledge, their becomes inefficient. We offer more broad efficient based on MAC HMAC, two prominent private algorithms this study. By implementing we give real instantiation our system. Finally, theoretical analysis actual findings show that suggested lower communication costs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Public Auditing for Secure Data Storage in Cloud Computing

Cloud computing has been popular as the IT architecture. Cloud service providers offer many services based on cloud computing. Cloud storage service is the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end users. However, cloud storage service may have data security because the users’ data is not stored in their own storage. In this ...

متن کامل

An Efficient Auditing Protocol for Secure Data Storage in Cloud Computing

Cloud Computing is a type of distributed computing whereby resources and applications are shared over the internet. These applications are stored in one location and can be accessed in different location by any authorized users where the user does not need any infrastructure. In cloud storage, while outsourcing trust worthiness of the data is a scary task in cloud. To ensure the integrity of dy...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Secure and efficient privacy-preserving public auditing scheme for cloud storage

Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacypreserving public auditing for secure cloud the storage” is inefficient. Thus, they offered a secure and efficient-privacy public auditing scheme for cloud storage. They claimed that their system is p...

متن کامل

Task Scheduling in Fog Computing: A Survey

Recently, fog computing has been introducedto solve the challenges of cloud computing regarding Internet objects. One of the challenges in the field of fog computing is the scheduling of tasks requested by Internet objects. In this study, a review of articles related to task scheduling in fog computing has been done. At first, the research questions and goals will be introduced, an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of engineering technology and management sciences

سال: 2023

ISSN: ['2581-4621']

DOI: https://doi.org/10.46647/ijetms.2023.v07i02.071