A Fog-centric Secure Cloud Storage Scheme| Java | Cloud Computing | IEEE

5,000 4,500

+ -

For more details 7338345250 , skstech.in@gmail.com

Abstract:

Cloud computing is now being utilized as a prospective alternative for catering storage services. Security issues of cloud storage are a potential deterrent in its widespread adoption. Privacy breaches, malicious modification, and data loss are emerging cyber threats against cloud storage. Recently, a fog server-based three-layer architecture has been presented for secure storage employing multiple clouds. The underlying techniques used are Hash-Solomon code and customized hash algorithm in order to attain the goal. However, it resulted in the loss of a smaller portion of data to cloud servers and failed to provide better modification detection and data recoverability. This paper proposes a novel fog-centric secure cloud storage scheme to protect data against unauthorized access, modification, and destruction. To prevent illegitimate access, the proposed scheme employs a new technique π‘‹π‘œπ‘Ÿβˆ’πΆπ‘œπ‘šπ‘π‘–π‘›π‘Žπ‘‘π‘–π‘œπ‘› to conceal data. Moreover, π΅π‘™π‘œπ‘π‘˜βˆ’π‘€π‘Žπ‘›π‘Žπ‘”π‘’π‘šπ‘’π‘›π‘‘ outsources the outcomes of π‘‹π‘œπ‘Ÿβˆ’πΆπ‘œπ‘šπ‘π‘–π‘›π‘Žπ‘‘π‘–π‘œπ‘› to prevent malicious retrieval and to ensure better recoverability in case of data loss. Simultaneously, we propose a technique based on the hash algorithm in order to facilitate modification detection with a higher probability. We demonstrate the robustness of the proposed scheme thorough security analysis. Experimental results validate the performance supremacy of the proposed scheme compared to contemporary solutions in terms of data processing time.

Technology:

  • Java
  • JDK
  • Cloud Computing
  • MySql

Including PackagesΒ Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β 

  • Supporting Softwares
  • Source Code
  • Documentation
  • Presentation Slides
  • System architecture
  • Data Flow Diagram Β Β Β Β Β Β Β Β Β Β Β 
  • Screenshots Β  Β 
  • Execution Procedure
  • Database File

Specialization

  • Video On Demand *
  • Remote Connectivity *
  • Code Customization *
  • Document Customization *
  • Online Support *
  • Voice Conference*
  • Video Tutorials *
  • Readme File

Β Β Β Β Β Β Β Β Β  *Condition Apply

Technology

Java

Category:
Navigation
Close

My Cart

Close

Wishlist

Recently Viewed

Close

Great to see you here!

A password will be sent to your email address.

Your personal data will be used to support your experience throughout this website, to manage access to your account, and for other purposes described in our privacy policy.

Already got an account?

Close

Categories