Paper Title : Efficient Auditing Scheme for Secure Data Storage in Fog to Cloud Computing
ISSN : 2394-2231
Year of Publication : 2022
10.5281/zenodo.6397126
MLA Style: Efficient Auditing Scheme for Secure Data Storage in Fog to Cloud Computing " Dr.E.K VellingiriRaj , Thasleema Nasreen " Volume 9 - Issue 2 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: Efficient Auditing Scheme for Secure Data Storage in Fog to Cloud Computing " Dr.E.K VellingiriRaj , Thasleema Nasreen " Volume 9 - Issue 2 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Abstract
Fog-to-cloud computing has now become a new cutting-edge technique along with the rapid popularity of Internet of Things (IoT). Unlike traditional cloud computing, fog-to-cloud computing needs more entities to participate in, including mobile sinks and fog nodes except for cloud service provider (CSP). Hence, the integrity auditing in fog-to-cloud storage will also be different from that of traditional cloud storage. In the recent work of Tian et al., they took the first step to design public auditing system for fog-to-cloud computing. However, their scheme becomes very inefficient since they use intricate public key cryptographic techniques, including bilinear mapping, proof of knowledge etc. In this paper, we design a general and more efficient auditing system based on MAC and HMAC, both of which are popular private key cryptographic techniques. By implementing MAC and HMAC, we give a concrete instantiation of our auditing system. Finally, the theoretical analysis and experiment results show that our proposed system has more efficiency in terms of communication and computational costs
Reference
[1] J. A. Akinyele, C. Garman, I. Miers, M. W. Pagano, M. Rushanan, M. Green, and A. D. Rubin, ‘‘Charm: A framework for rapidly prototyping cryptosystems,’’ J. Cryptogr. Eng., vol. 3, no. 2, pp. 111–128, Jun. 2013. [2] S. Agrawal and D. Boneh, ‘‘Homomorphic MACs: MAC-based integrity for network coding,’’ in Applied Cryptography and Network Security, (Lecture Notes in Computer Science), vol. 5536. Berlin, Germany: Springer, 2009, pp. 292–305. [3] G. Ateniese, R. Burns, R. Curtmola, Joseph Herring, L. Kissner, Z. Peterson, and D. Song, ‘‘Provable data possession at untrusted stores,’’ in Proc. 14th ACM Conf. Comput. Commun. Secur., Alexandria, VA, USA, 2007, pp. 598– 609. [4] G. Ateniese, S. Kamara, and J. Katz, ‘‘Proofs of storage from homomorphic identification protocols,’’ in Advances in Cryptology. Berlin, Germany: Springer, 2009, pp. 319–333. [5] A. F. Barsoum and M. A. Hasan, ‘‘Provable multicopy dynamic data possession in cloud computing systems,’’ IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 485–497, Mar. 2015. [20] H. Shacham and B. Waters, ‘‘Compact proofs of retrievability,’’ J. Cryptol., vol. 26, no. 3, pp. 442–483, 2013. [21] J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, ‘‘An efficient public auditing protocol with novel dynamic structure for cloud data,’’ IEEE Trans. Inf. Forensics Security, vol. 12, no. 10, pp. 2402–2415, Oct. 2017. [22] H. Tian, Y. Chen, C.-C. Chang, H. Jiang, Y. Huang, Y. Chen, and J. Liu, ‘‘Dynamic-hashtable based public auditing for secure cloud storage,’’ IEEE Trans. Serv. Comput., vol. 10, no. 5, pp. 701–714, Sep. 2017. [23] H. Tian, F. Nan, C.-C. Chang, Y. Huang, J. Lu, and Y. Du, ‘‘Privacypreserving public auditing for secure data storage in fog-to-cloud computing,’’ J. Netw. Comput. Appl., vol. 127, pp. 59–69, Feb. 2019. [24] T. Wang, Y. Li, G. Wang, J. Cao, M. Z. A. Bhuiyan, and W. Jia, ‘‘Sustainable and efficient data collection from WSNs to cloud,’’ IEEE Trans. Sustain. Comput., vol. 4, no. 2, pp. 252– 262, Apr. 2019. [25] C. Wang, K. Ren, W. Lou, and J. Li, ‘‘Toward publicly auditable secure cloud data storage services,’’ in IEEE Netw., vol. 24, no. 4, pp. 19–24, Jul./Aug. 2010.
Keywords
— Secure Data Storage in Fog to Cloud Computing.