2023, Volume 7 Issue 2
A SURVEY ON EFFICIENT AUDITING SCHEME FOR SECURE DATA STORAGE IN FOG-TO-CLOUD COMPUTING
AUTHOR(S)
A.Thenmozhi, Dr.D.Vanathi
DOI: https://doi.org/10.46647/ijetms.2023.v07i02.071
ABSTRACT
With the rise of the Internet of Things, fog-to-cloud computing has emerged as a new cutting-edge approach (IoT). Except for the cloud service provider, fog-to-cloud computing necessitates the participation of additional entities, such as mobile sinks and fog nodes (CSP). As a result, fog-to-cloud storage integrity audits will differ from standard cloud storage auditing. Tian et al. has completed the first stage in developing a public auditing system for fog-to-cloud computing. However, because they employ complex public key cryptography techniques like bilinear mapping and proof of knowledge, their system becomes inefficient. We offer a more broad and efficient auditing system based on MAC and HMAC, two prominent private key cryptography algorithms in this study. By implementing MAC and HMAC, we give a real instantiation of our auditing system. Finally, theoretical analysis and actual findings show that our suggested system has lower communication and computing costs.
Page No: 615 - 626
References:
[1] J. C. Garman, I. Miers, M. W. Pagano, M. Rushanan, M. Green, and A. Akinyele "Charm: A Framework for Rapidly Prototyping Cryptosystems," D. Rubin, J. Cryptogr. English, vol. 3, no. 2, June 2013, pp. 111-128.
[2] S. D. Agrawal and Agrawal Applied Cryptography and Network Security (Lecture Notes in Computer Science), vol. 5536. Springer, Berlin, Germany, pp. 292-305, 2009.
[3] G. R. Burns, R. Curtmola, Joseph Herring, L. Kissner, Z. Peterson, and D. Ateniese "Provable data possession at untrustworthy retailers," Song, Proc. The 14th ACM Conf. Comput. Commun. 598-609, Secur., Alexandria, VA, USA, 2007.
[4] G. S. Kamara, Ateniese, and J. "Proofs of storage from homomorphic identification procedures," by Katz, published in Advances in Cryptology. Springer, Berlin, Germany, pp. 319-333, 2009.
[5] A. M. Barsoum and F. Barsoum "Provable multicopy dynamic data ownership in cloud computing systems," A. Hasan, IEEE Trans. Inf. Security Forensics, vol. 10, no. 3, March 2015, pp. 485-497
[6] F. R. Milito, J. Zhu, and S. Bonomi "Fog computing and its significance in the Internet of Things," Addepalli, Proc. 1st Ed. MCC Workshop Mobile Cloud Computing, New York, NY, USA, pp. 13-16, 2012.
[7] K. A. Juels, Bowers, and A. "Proofs of retrievability: Theory and application," Oprea, Proc. Cloud Computing ACM Workshop Secur., pp. 43-54, 2009.
[8] J. "Secure network coding from secure evidence of retrievability," Chang et al., Sci. Inf. China Science, early access, October 2020.
[9] J. H. Wang, F. Wang, A. Zhang, and Y. Chang IEEE Access, vol. 8, pp. 17833–17841, 2020.
[10] Y. S. Vadhan and D. Dodis "Proofs of retrievability by hardness amplification," by Wichs, in Proc. Cryptography Theory Conf., pp. 109-127, 2009.
[11] C. A. Küpçü, C. Papamanthou, and R. Erway "Dynamic proven data possession," Tamassia, Proc. CCS, 2009, pp. 213-222
[12] A. B. and Juels "PORs: Proofs of retrievability for huge files," J. Kaliski, Proc. The 14th ACM Conf. Comput. Commun. Secur., Alexandria, VA, USA, pp. 584-597, 2007.
[13] H. B. and Shacham "Compact proofs of retrievability," Waters, J. Cryptography, vol. 26, no. 3, pp. 442–483, 2013.
[14] J. J. Shen, X. Chen, X. Huang, and W. Shen Susilo, "An efficient public auditing technique for cloud data with a new dynamic structure," IEEE Trans. Inf. Security Forensics, vol. Oct. 2017, vol. 12, no. 10, pp. 2402-2415.
[15] H. Tian, Y. Chen, C.-C. Chang, H. Jiang, Y. Huang, Y. Chen, and J. Zhu are the authors of the paper. "Dynamic-hash-table-based public auditing for secure cloud storage," by Liu, IEEE Trans. Serv. Computer Science, vol. 10, no. 5, September 2017, pp. 701-714.
[16] Q. C. Wang, K. Ren, W. Lou, and J. Wang "Enabling Public Auditability," Li and data dynamics for cloud storage security," IEEE Trans. Distrib. in parallel Vol. of Syst. May 2011, vol. 22, no. 5, pp. 847-859.
[17] Y. Z. L. Jiang, X. Wang, S. Yiu, and P. Wu "Dynamic data," Zhang activities with deduplication in public auditing for privacy protection safe cloud storage," according to Proc. IEEE International Conf. Comput. Sci. Eng. (CSE) IEEE International Conf. Ubiquitous Computing Embedded (EUC), July 17, 2017
pp. 21–24
[18] Y. G. Ateniese, X. Huang, W. Susilo, Y. Dai, and G. Yu Min, "Identity-based remote data integrity verification with complete data privacy" IEEE Trans. on preservation for cloud storage," Inf. Security Forensics, vol. 12, no. 4, April 2017, pp. 767-778
[19] J. S. and Yuan "Public integrity auditing for dynamic data sharing with Yu," IEEE Trans. on Multiuser Modification," Inf. Security Forensics, vol. 10, no. 8, pages. 1717-1726, Aug. 2015
[20] R. H. Ma, Y. Lu, and Y. Zhang "Provably safe cloud storage for" Li "Mobile networks with lower computation and overhead," Sci. China Inf. Science, vol. 60, no. 12, 2017, p. 122104
[21] ThirumoorthyPalanisamy, D. Alghazzawi, S. Bhatia, A. A. Malibari, P. Dadheeche and colleagues, "Improved energy-based multi-sensor object recognition in wireless sensor networks," Intelligent Automation & Soft Computing, vol. 33, no.1, pp. 227–244, 2022.
[22] P. "Improved key agreement based kerberos protocol for m-health security," Thirumoorthy, K. S. Bhuvaneshwari, C. Kamalanathan, P. Sunita, E. Prabhu et al., Computer Systems Science and Engineering, vol. 42, no.2, pp. 577–587, 2022.
[23] M.Deepika, S.Prabhu, M.Parvathi, and S.Hemalatha, "Cloud Task Scheduling Using Dynamic Algorithm", Gradiva Review Journal, Vol.8, No. 11, pages 53-60, 2022.
[24] S. "A research on routing strategy for in-network aggregation in wireless sensor networks," Sudha, B. Manimegalai, and P. Thirumoorthy, in Proc, IEEE ICCCI, Coimbatore, India, pp.1-4, 2014.
[25] P. N. Thirumoorthy and Thirumoorthy "Bayes node energy polynomial distribution to optimise routing in wireless sensor networks," K. Karthikeyan, PLoS ONE, vol. 10, no. 10: e0138932, pp.1-15, 2015.
How to Cite This Article:
A.Thenmozhi, Dr.D.Vanathi
. A SURVEY ON EFFICIENT AUDITING SCHEME FOR SECURE DATA STORAGE IN FOG-TO-CLOUD COMPUTING
. ijetms;7(2):615-626. DOI: 10.46647/ijetms.2023.v07i02.071