Data Protection for Files and Logs in Fog Cloud Storage Using 3DES

Authors

  • D. Vannur Vali  M. Tech Scholar, Department of CSE, JNTUA, Ananthapuramu, Andhra Pradesh, India

DOI:

https://doi.org/10.32628/CSEIT217135

Keywords:

Cloud Storage, Fog Security, 3DES Technique, Log Files, Cloud Service Provider.

Abstract

Nowadays cloud computing is being used extensively in daily life. With these new computing and communication technologies, new data security challenges arise. Privacy, integrity, and availability are the primary goals of the security structure. Many authentication schemes have been introduced over the years to ensure better security and to provide a wider range of services with a faster perspective. Each type of data is stored in the cloud and can be easily accessed anytime, anywhere. But, it lags due to location awareness when it comes to privacy in cloud computing. Improved cloud computing uses a fog-centric secure plan to ensure logs and information against unapproved access, change, and extinction. To obstruct unauthorized entry, the current scheme uses a technology called Xor-Combination to hide data. Besides, Xor-Combination results in preventing malicious recovery and ensuring better recovery capacity in case of data loss and Intermediate Fog does not provide server security. Cloud server and log files have been proposed and improved to provide higher security and intermediate security differently compared to the existing system for storing data on the fog server. Log files also contain personal information with equally critical protection and confidentiality of log data as an alternative scheme for storing logs in a cloud environment. Our proposed security to protect log files and data files on the main server on the Intermediate Fog server. We use an enhanced 3DES security method that provides better security than the Xor-combination technique.

References

  1. J. Shen, D. Liu, J. Shen, Q. Liu, X. Sun, A secure cloud-assisted urban data sharing framework for ubiquitous cities, Pervasive mobile-Computing(2017),http://dx.doi.org/10.1016/j. pmcj.2017.3.013
  2. Fu, J., Liu, Y., Chao, H.-C., Bhargava, B., & Zhang, Z.(2018). Secure Data Storage and Searching for IndustrialIoT by Integrating Fog Computing and Cloud Computing.IEEE Transactions on Industrial Informatics, 1–1.doi:10.1109/tii.2018.2793350
  3. P. Mell and T. Grance, "The NIST definition of cloud computing," Nat. Inst. Stand. Technol., vol. 53, no. 6, pp.50–50, 2009.
  4. H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing:Architecture, applications, and approaches," Wireless Commun. Mobile Comput., vol. 13, no. 18, pp. 1587–1611, 2013.
  5. J. Chase, R. Kaewpuang, W. Yonggang, and D. Niyato, "Joint virtual machine and bandwidth allocation in a software-defined network(Sdn) and cloud computing environments," in Proc. IEEE Int. Conf. Commun.,2014, pp. 2969–2974.
  6. H. Li, W. Sun, F. Li, and B. Wang, "Secure and privacy-preserving data storage service in the public cloud," J.Comput. Res. Develop., vol. 51, no. 7, pp. 1397–1409,2014.
  7. L. Xiao, Q. Li, and J. Liu, "Survey on secure cloud storage," J. Data Acquis. Process., vol. 31, no. 3, pp. 464–472, 2016.
  8. J. Hou, C. Piao, and T. Fan, "Privacy preservation cloud storage architecture research," J. Hebei Acad. Sci., vol. 30, no. 2, pp. 45–48, 2013.
  9. G. Feng, "A data privacy protection scheme of cloud storage," vol. 14, no. 12, pp. 174–176, 2015.
  10. Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distribution System., vol. 27, no. 2, pp. 340–352, Feb. 2016.

Downloads

Published

2021-02-28

Issue

Section

Research Articles

How to Cite

[1]
D. Vannur Vali, " Data Protection for Files and Logs in Fog Cloud Storage Using 3DES" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 1, pp.174-181, January-February-2021. Available at doi : https://doi.org/10.32628/CSEIT217135