Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing

نویسندگان

چکیده

Fog-to-cloud computing has now become a new cutting-edge technique along with the rapid popularity of Internet Things (IoT). Unlike traditional cloud computing, fog-to-cloud needs more entities to participate in, including mobile sinks and fog nodes except for service provider (CSP). Hence, integrity auditing in storage will also be different from that storage. In recent work Tian et al., they took first step design public system computing. However, their scheme becomes very inefficient since uses intricate key cryptographic techniques, bilinear mapping, proof knowledge etc. this paper, we general efficient based on MAC HMAC, both which are popular private techniques. By implementing give concrete instantiation our system. Finally, theoretical analysis experiment results show proposed efficiency terms communication computational costs.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Auditing Protocol for Secure Data Storage in Cloud Computing

Cloud Computing is a type of distributed computing whereby resources and applications are shared over the internet. These applications are stored in one location and can be accessed in different location by any authorized users where the user does not need any infrastructure. In cloud storage, while outsourcing trust worthiness of the data is a scary task in cloud. To ensure the integrity of dy...

متن کامل

Secure and efficient privacy-preserving public auditing scheme for cloud storage

Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacypreserving public auditing for secure cloud the storage” is inefficient. Thus, they offered a secure and efficient-privacy public auditing scheme for cloud storage. They claimed that their system is p...

متن کامل

A Survey of Public Auditing for Secure Data Storage in Cloud Computing

Cloud computing has been popular as the IT architecture. Cloud service providers offer many services based on cloud computing. Cloud storage service is the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end users. However, cloud storage service may have data security because the users’ data is not stored in their own storage. In this ...

متن کامل

Secure Data Storage in Mobile Cloud Computing

In cloud computing highly scalable computing resources are supplied as an outer service through internet on pay-as-usability basis. Portio research [1] estimates that mobile subscribers will reach 6.5 billion by the end of 2012, 6.9 billion by the end of 2013. Due to increasing use of mobile devices the requirement of cloud computing in mobile devices arise, which gave birth to Mobile Cloud Com...

متن کامل

Efficient Data Mining with Evolutionary Algorithms for Cloud Computing Application

With the rapid development of the internet, the amount of information and data which are produced, are extremely massive. Hence, client will be confused with huge amount of data, and it is difficult to understand which ones are useful. Data mining can overcome this problem. While data mining is using on cloud computing, it is reducing time of processing, energy usage and costs. As the speed of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2020.2971630