For more details
Abstract:
Cloud computing is now being utilized as a prospective alternative for catering storage services. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breaches, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a fog server-based three-layer architecture has been presented for secure storage employing multiple clouds. The underlying techniques used are Hash-Solomon code and customized hash algorithm in order to attain the goal. However, it resulted in the loss of a smaller portion of data to cloud servers and failed to provide better modification detection and data recoverability. This paper proposes a novel fog-centric secure cloud storage scheme to protect data against unauthorized access, modification, and destruction. To prevent illegitimate access, the proposed scheme employs a new technique πππβπΆπππππππ‘πππ to conceal data. Moreover, π΅ππππβππππππππππ‘ outsources the outcomes of πππβπΆπππππππ‘πππ to prevent malicious retrieval and to ensure better recoverability in case of data loss. Simultaneously, we propose a technique based on the hash algorithm in order to facilitate modification detection with a higher probability. We demonstrate the robustness of the proposed scheme thorough security analysis. Experimental results validate the performance supremacy of the proposed scheme compared to contemporary solutions in terms of data processing time.
Technology:
- Java
- JDK
- Cloud Computing
- MySql
Including PackagesΒ Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β
- Supporting Softwares
- Source Code
- Documentation
- Presentation Slides
- System architecture
- Data Flow Diagram Β Β Β Β Β Β Β Β Β Β Β
- Screenshots Β Β
- Execution Procedure
- Database File
Specialization
- Video On Demand *
- Remote Connectivity *
- Code Customization *
- Document Customization *
- Online Support *
- Voice Conference*
- Video Tutorials *
- Readme File
Β Β Β Β Β Β Β Β Β *Condition Apply
Technology | Java |
---|