A Fog-centric Secure Cloud Storage Scheme

Subscribe our YouTube channel for latest project videos and tutorials Click Here

Posted By freeproject on February 15, 2021

INTRODUCTION OF THE PROJECT

Cloud computing is now being utilized as a prospective alternative for catering storage service. Security problems with cloud storage are a possible deterrent in its widespread adoption. Privacy breach, malicious modification and data loss are emerging cyber threats against cloud storage. Recently, a fog server based three-layer architecture has been presented for secure storage employing multiple clouds. The underlying techniques used are Hash-Solomon code and customised hash algorithm so as to achieve the goal. However, it resulted in loss of smaller portion of knowledge to cloud servers and did not provide better modification detection and data recoverability. This paper proposes a completely unique fog-centric secure cloud storage scheme to guard data against unauthorized access, modification, and destruction. to stop illegitimate access, the proposed scheme employs a replacement technique Xor-Combination to hide data. Moreover, Block Management outsources the outcomes of Xor-Combination to stop malicious retrieval and to make sure better recoverability just in case of knowledge loss. Simultaneously, we propose a way supported hash algorithm so as to facilitate modification detection with higher probability. We demonstrate robustness of the proposed scheme through security analysis. Experimental results validate performance supremacy of the proposed scheme compared to contemporary solutions in terms of knowledge time interval.

EXISTING SYSTEMZissis et al. evaluated cloud security by identifying unique security requirements and presented a conceptual solution using trusted third party (TTP). As underlying cryptographic tool they used public key cryptography to make sure confidentiality, integrity and authenticity of knowledge and communication while addressing specific vulnerabilities. Wang et al. focused on integrity protection on cloud computing and proposed public auditability scheme as a counter measure. They set two goals of their work, one was the efficient public auditing without requiring local copy of knowledge and therefore the other one wasnt to cause any vulnerability of the info . They utilized homomorphic authenticator with random masking for privacy preserving public auditing of cloud data.

Proposed a mechanism titled Content Based Image Retrieval (CBIR) to guard image outsourced to cloud server counting on locality sensitive hashing (LSH) and secure k-nearest-neighbors (kNN) algorithms. its equally applicable to other data types (i.e., text) also . It preserves privacy of sensitive images and ensures efficient retrieval but doesnt guarantee integrity or elimination of a picture (or other sort of data). Arora et al. enlisted and compared some cryptographic primitives for preservation of privacy and integrity of cloud storage. This comparison is additionally befitting for other computing architecture. One recent work reported by Shen et al. used cloud infrastructure for urbanization. Their proposal illustrated cloud to share data between urban people and/or applications. to guard privacy of shared data they used attributed based encryption (ABT).

Disadvantages

  • Within the existing work, theres no Data Recoverability.
  • The systems security is extremely less thanks to lack of strong cryptography techniques.

PROPOSED SYSTEM

  • The proposed a secure cloud storage scheme supported fog computing employing Xor-Combination, Block Management and CRH operation. Xor-Combination along side Block Management contributes to take care of privacy and to stop data loss. CRH Operation ensures detection of knowledge modification.
  • Theoretical security analysis proves the privacy guarantee, data recoverability, and modification detection of the proposed scheme.
  • The system implemented a prototype version of the scheme and conducted experiments to verify its performance as compared with the contemporary scheme. Results prove its efficiency in terms of your time and memory usage.

Advantages

  • The info owner is completely trusted and can never be corrupted by any adversaries.
  • The system is more secured thanks to Sensitive data outsourced to the cloud is vulnerable to the within or outside attacker. Hence, information leakage takes place. Encryption can protect such leakage.
Technology: 
Call FreeProjectz WhatsApp FreeProjectz