Details of Research Outputs

TitleA Hierarchic Secure Cloud Storage Scheme Based on Fog Computing
Creator
Date Issued2018-03-29
Conference Name15th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017
Source PublicationProceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017
ISBN978-153861955-1
Volume2018-January
Pages470-477
Conference DateNOV 6-11, 2017
Conference PlaceOrlando, U.S.A.
Abstract

Since the cloud computing technology was proposed, it has developed rapidly. Cloud computing demonstrated that it was a major driver of change in the IT industry and there are a lot of cloud-based technologies deriving from cloud computing. With the Cloud computing development and global growth of data, cloud storage technology gets more attention and better development and attracts a large number of users. Users depend on the powerful storage capacity of cloud storage. However, in this storage schema, users' data is all stored in cloud servers. In other word, users lose their right of control on data and face privacy leakage risk. Traditional privacy protection schemes are usually based on encryption technology, but these kinds of methods cannot effectively resist attack from the inside of cloud server. Once the password gets compromised, users' data will be exposed to public. In order to solve this problem, we propose a hierarchic storage method based on fog computing model and design a Hash-Solomon code algorithm. We put a small part of data in local machine and fog server, which can take full advantage of cloud storage and protect the privacy of data. Through the theoretical safety analysis and experimental evaluation, the feasibility of our scheme is validated, which is really a powerful supplement to existing cloud storage scheme.

Keywordcloud storage fog computing privacy protection
DOI10.1109/DASC-PICom-DataCom-CyberSciTec.2017.90
URLView source
Indexed ByCPCI-S
Language英语English
WOS Research AreaAutomation & Control Systems ; Computer Science ; Engineering
WOS SubjectAutomation & Control Systems ; Computer Science, Artificial IntelligenceComputer Science, Theory & Methods ; Engineering, Electrical & Electronic
WOS IDWOS:000942819400114
Scopus ID2-s2.0-85048115097
Citation statistics
Cited Times:6[WOS]   [WOS Record]     [Related Records in WOS]
Document TypeConference paper
Identifierhttp://repository.uic.edu.cn/handle/39GCC9TT/7189
CollectionResearch outside affiliated institution
Corresponding AuthorWang, Tian
Affiliation
1.College of Computer Science, Huaqiao University, Xiamen, China
2.Department of Computer and Information Sciences, Fordham University, New York, United States
3.School of Information Science and Engineering, Central South University, Changsha, China
Recommended Citation
GB/T 7714
Zhou, Jiyuan,Wang, Tian,Bhuiyan, Md Zakirul Alamet al. A Hierarchic Secure Cloud Storage Scheme Based on Fog Computing[C], 2018: 470-477.
Files in This Item:
There are no files associated with this item.
Related Services
Usage statistics
Google Scholar
Similar articles in Google Scholar
[Zhou, Jiyuan]'s Articles
[Wang, Tian]'s Articles
[Bhuiyan, Md Zakirul Alam]'s Articles
Baidu academic
Similar articles in Baidu academic
[Zhou, Jiyuan]'s Articles
[Wang, Tian]'s Articles
[Bhuiyan, Md Zakirul Alam]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Zhou, Jiyuan]'s Articles
[Wang, Tian]'s Articles
[Bhuiyan, Md Zakirul Alam]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.