Title | A Hierarchic Secure Cloud Storage Scheme Based on Fog Computing |
Creator | |
Date Issued | 2018-03-29 |
Conference Name | 15th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017 |
Source Publication | Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017
![]() |
ISBN | 978-153861955-1 |
Volume | 2018-January |
Pages | 470-477 |
Conference Date | NOV 6-11, 2017 |
Conference Place | Orlando, U.S.A. |
Abstract | Since the cloud computing technology was proposed, it has developed rapidly. Cloud computing demonstrated that it was a major driver of change in the IT industry and there are a lot of cloud-based technologies deriving from cloud computing. With the Cloud computing development and global growth of data, cloud storage technology gets more attention and better development and attracts a large number of users. Users depend on the powerful storage capacity of cloud storage. However, in this storage schema, users' data is all stored in cloud servers. In other word, users lose their right of control on data and face privacy leakage risk. Traditional privacy protection schemes are usually based on encryption technology, but these kinds of methods cannot effectively resist attack from the inside of cloud server. Once the password gets compromised, users' data will be exposed to public. In order to solve this problem, we propose a hierarchic storage method based on fog computing model and design a Hash-Solomon code algorithm. We put a small part of data in local machine and fog server, which can take full advantage of cloud storage and protect the privacy of data. Through the theoretical safety analysis and experimental evaluation, the feasibility of our scheme is validated, which is really a powerful supplement to existing cloud storage scheme. |
Keyword | cloud storage fog computing privacy protection |
DOI | 10.1109/DASC-PICom-DataCom-CyberSciTec.2017.90 |
URL | View source |
Indexed By | CPCI-S |
Language | 英语English |
WOS Research Area | Automation & Control Systems ; Computer Science ; Engineering |
WOS Subject | Automation & Control Systems ; Computer Science, Artificial IntelligenceComputer Science, Theory & Methods ; Engineering, Electrical & Electronic |
WOS ID | WOS:000942819400114 |
Scopus ID | 2-s2.0-85048115097 |
Citation statistics | |
Document Type | Conference paper |
Identifier | http://repository.uic.edu.cn/handle/39GCC9TT/7189 |
Collection | Research outside affiliated institution |
Corresponding Author | Wang, Tian |
Affiliation | 1.College of Computer Science, Huaqiao University, Xiamen, China 2.Department of Computer and Information Sciences, Fordham University, New York, United States 3.School of Information Science and Engineering, Central South University, Changsha, China |
Recommended Citation GB/T 7714 | Zhou, Jiyuan,Wang, Tian,Bhuiyan, Md Zakirul Alamet al. A Hierarchic Secure Cloud Storage Scheme Based on Fog Computing[C], 2018: 470-477. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment