5 research outputs found

    A secure cloud storage scheme on fog computing- βˆ’, βˆ’ and operation

    Get PDF
    Fog server based three-layer design has been introduced for secure storage employing multiple clouds. The fundamental methods utilized are Hash-Solomon code and redid hash algorithm so as to achieve the objective. However, it brought about loss of littler part of data to cloud servers and neglected to give better change location and data recoverability. It proposes a novel haze driven secure cloud storage plan to ensure data against unapproved access, alteration, and obliteration. To forestall ill-conceived get to, the proposed plot utilizes another system βˆ’ to cover data. Also, block management outsources the results of βˆ’ to forestall pernicious recovery and to guarantee better recoverability if there should arise an occurrence of data misfortune. At the same time, we propose a procedure dependent on hash algorithm so as to encourage alteration detection with higher probability

    An extensive research survey on data integrity and deduplication towards privacy in cloud storage

    Get PDF
    Owing to the highly distributed nature of the cloud storage system, it is one of the challenging tasks to incorporate a higher degree of security towards the vulnerable data. Apart from various security concerns, data privacy is still one of the unsolved problems in this regards. The prime reason is that existing approaches of data privacy doesn't offer data integrity and secure data deduplication process at the same time, which is highly essential to ensure a higher degree of resistance against all form of dynamic threats over cloud and internet systems. Therefore, data integrity, as well as data deduplication is such associated phenomena which influence data privacy. Therefore, this manuscript discusses the explicit research contribution toward data integrity, data privacy, and data deduplication. The manuscript also contributes towards highlighting the potential open research issues followed by a discussion of the possible future direction of work towards addressing the existing problems

    A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing

    No full text

    A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing

    No full text
    corecore