2021
DOI: 10.1109/access.2020.2971630
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing

Abstract: Fog-to-cloud computing has now become a new cutting-edge technique along with the rapid popularity of Internet of Things (IoT). Unlike traditional cloud computing, fog-to-cloud computing needs more entities to participate in, including mobile sinks and fog nodes except for cloud service provider (CSP). Hence, the integrity auditing in fog-to-cloud storage will also be different from that of traditional cloud storage. In the recent work of Tian et al., they took the first step to design public auditing system f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…To maintain the reputation of the cloud service, the fog nodes may send fraudulent auditing results to the data owners. Existing public auditing schemes 6,12,[18][19][20][21] do not allow the data owners to perform cross-verification on the public auditing results. To address this issue, the proposed auditing scheme has allowed the IoT device coordinator to verify the integrity of the healthcare data.…”
Section: Importance Of Cross-examining the Integrity Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…To maintain the reputation of the cloud service, the fog nodes may send fraudulent auditing results to the data owners. Existing public auditing schemes 6,12,[18][19][20][21] do not allow the data owners to perform cross-verification on the public auditing results. To address this issue, the proposed auditing scheme has allowed the IoT device coordinator to verify the integrity of the healthcare data.…”
Section: Importance Of Cross-examining the Integrity Resultsmentioning
confidence: 99%
“…To overcome the security issues in Tian et al, 19,20 Zhang et al 21 proposed a fog-centric public auditing scheme based on the Message Authentication Code (MAC) and HMAC (Keyed Hash Message Authentication Code). It uses homomorphic MAC-based tags to conduct public auditing on the fog nodes.…”
Section: Existing Fog-centric Auditing Schemesmentioning
confidence: 99%
“…* Corresponding author. E-mail address: ku.cse09@gmail.com (2) Audit phase: During the time of the verification, the TPA sends a challenge message to the cloud server. After executing the GenProof algorithm, the cloud server will generate a response message from the stored data file.…”
Section: The Traditional Data Integrity Verification Technique Consis...mentioning
confidence: 99%
“…Their system utilized the advantages of multicloud storage to ensure users' data protection and reliability. Zhang et al [10] designed an auditing system based on two private key cryptographic techniques, namely message authentication code (MAC) and homomorphic MAC, for secure data storage in fog-to-cloud computing. Krishnan et al [83] enhanced a clustering methodology with multiple mobile sinks for efficient data collection.…”
Section: E Data Utility Based Algorithmsmentioning
confidence: 99%
“…The serverless architecture is delegated to third-party providers in charge of dynamically provisioning and allocating resources. Another alternative execution model is the FC (or sometimes referred to as edge computing) [6]- [10]. The FC acts as a mediator between remote servers and hardware.…”
Section: Introductionmentioning
confidence: 99%