Loading

An Approach for a Fog-centric Secure Cloud Storage Scheme
K Anuhya1, Gautam Kumar2, Mrutyunjaya S Yalawar3

1K Anuhya, Department of CSE, CMR Engineering, (CMREC) College, Hyderabad. (Telangana), India.
2Gautam Kumar, Department of CSE, CMR Engineering, (CMREC) College, Hyderabad. (Telangana), India.
3Mrutyunjaya S Yalawar, Department of CSE, CMR Engineering, (CMREC) College, Hyderabad. (Telangana), India. 

Manuscript received on 16 August 2022 | Revised Manuscript received on 23 August 2022 | Manuscript Accepted on 15 September 2022 | Manuscript published on 30 September 2022 | PP: 78-83 | Volume-11 Issue-3, September 2022. | Retrieval Number: 100.1/ijrte.C72670911322 | DOI: 10.35940/ijrte.C7267.0911322
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Currently, cloud computing is being considered as a possible replacement for providing storage services. Security concerns with cloud storage might prevent its mainstream adoption. New security hazards to cloud storage include data breaches, malicious alterations, and data loss. For safe storage employing different clouds, a three-tier architecture built on Fog servers has recently been described. Hash Solomon’s code and a specially created hash algorithm are the fundamental methods employed to accomplish the task. This does not, however, provide improved change detection and data recovery and results in the loss of a tiny amount of data to cloud servers. This research suggests a unique secure cloud storage system focused on fog to guard against illegal access, alteration, and destruction of data. The suggested strategy employs a novel method of data obscuration to prevent unwanted access. Additionally, the outcomes of Block – Management to stop unauthorised access and provide greater recovery in case of data loss. In addition, we provide a method based on a hash algorithm to make it simpler to find high-probability changes. Through security analysis, we show that the suggested approach is reliable. Experimental findings support the suggested scheme’s performance advantage over modern alternatives in terms of data processing speed. 
Keywords: Cloud storage, fog server, Xor-Combination, CRH, privacy.
Scope of the Article: Cloud Computing