SECURE MULTI CLOUD STORAGE APPROACH FOR MULTICLOUD ENVIRONMENTS USING FOG COMPUTING

Authors

  • R Janaki Assistant Professor, Department of Computer Science and Engineering, Mahendra Engineering College, Mahendhirapuri, Mallasamudram, Namakkal-637503, Tamilnadu, India
  • Prathap S UG Student, Department of Computer Science and Engineering, Mahendra Engineering College, Mahendhirapuri, Mallasamudram, Namakkal-637503, Tamilnadu, India
  • Raman R UG Student, Department of Computer Science and Engineering, Mahendra Engineering College, Mahendhirapuri, Mallasamudram, Namakkal-637503, Tamilnadu, India
  • Tony Wilson I UG Student, Department of Computer Science and Engineering, Mahendra Engineering College, Mahendhirapuri, Mallasamudram, Namakkal-637503, Tamilnadu, India
  • Yuvaraj J UG Student, Department of Computer Science and Engineering, Mahendra Engineering College, Mahendhirapuri, Mallasamudram, Namakkal-637503, Tamilnadu, India

DOI:

https://doi.org/10.29121/shodhkosh.v4.i1.2023.2928

Keywords:

Fog Computing, Protection Security Algorithm (PSA), Data Sharing Privacy Multi Cloud Environments

Abstract [English]

The use of cloud computing is rapidly increasing in many organizations. Cloud computing offers many advantages in terms of easy access to data at low cost. In a cloud computing environment, ensuring the security of cloud computing is a key element. Users typically store sensitive information on cloud storage providers, which may be unreliable. Since a single point of attack cannot expose all information, distributing data across different cloud storage providers (CSPs) automatically provides users with a level of control over data exfiltration. The study focuses on how to make key renewals as transparent as possible to customers, using key renewal outsourcing and a method called cloud storage auditing, which verifies it according to the Protection Security Algorithm (PSA). The propose system minimizes the burden of rekeying on the client side securely outsourced to the authorized party. a client uploads a new file to the cloud, it only needs to download the encryption private key from the TPA. In addition, our design also provides the user side with the ability to further verify the validity of the encryption private key provided by the PSA. All of these notable features have been carefully designed to make the entire audit process as transparent as possible to clients with significant risk resistance. Cloud computing formalizes this paradigm's definition and security model. Good safety performance simulations demonstrate that the detailed design instantiation is safe and efficient.

References

J. Chen, C. W. Sung and T. H. Chan, "Heterogeneity Shifts the Storage-Computation Tradeoff in Secure Multi-Cloud Systems," in IEEE Transactions on Information Theory, vol. 69, no. 2, pp. 1015-1036, Feb. 2023, doi: 10.1109/TIT.2022.3206868. DOI: https://doi.org/10.1109/TIT.2022.3206868

X. Liu, G. Yang, W. Susilo, J. Tonien, R. Chen and X. Lv, "Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage," in IEEE Transactions on Services Computing, vol. 15, no. 3, pp. 1664-1677, 1 May-June 2022, doi: 10.1109/TSC.2020.3006532. DOI: https://doi.org/10.1109/TSC.2020.3006532

Y. Fu, N. Xiao, T. Chen and J. Wang, "Fog-to-MultiCloud Cooperative Ehealth Data Management With Application-Aware Secure Deduplication," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 5, pp. 3136-3148, 1 Sept.-Oct. 2022, doi: 10.1109/TDSC.2021.3086089. DOI: https://doi.org/10.1109/TDSC.2021.3086089

J. Ren, J. Li, T. Li and M. W. Mutka, "Feasible Region of Secure and Distributed Data Storage in Adversarial Networks," in IEEE Internet of Things Journal, vol. 9, no. 11, pp. 8980-8988, 1 June1, 2022, doi: 10.1109/JIOT.2021.3119031. DOI: https://doi.org/10.1109/JIOT.2021.3119031

K. Kontodimas et al., "Secure Distributed Storage Orchestration on Heterogeneous Cloud-Edge Infrastructures," in IEEE Transactions on Cloud Computing, vol. 11, no. 4, pp. 3407-3425, Oct.-Dec. 2023, doi: 10.1109/TCC.2023.3287653. DOI: https://doi.org/10.1109/TCC.2023.3287653

K. Zhang, M. Wen, R. Lu and K. Chen, "Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization," in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 6, pp. 2875-2887, 1 Nov.-Dec. 2021, doi: 10.1109/TDSC.2020.2968425. DOI: https://doi.org/10.1109/TDSC.2020.2968425

G. Hu, H. Li, G. Xu and X. Ma, "Enabling Simultaneous Content Regulation and Privacy Protection for Cloud Storage Image," in IEEE Transactions on Cloud Computing, vol. 11, no. 1, pp. 111-127, 1 Jan.-March 2023, doi: 10.1109/TCC.2021.3081564. DOI: https://doi.org/10.1109/TCC.2021.3081564

R. Maher and O. A. Nasr, "DropStore: A Secure Backup System Using Multi-Cloud and Fog Computing," in IEEE Access, vol. 9, pp. 71318-71327, 2021, doi: 10.1109/ACCESS.2021.3078887. DOI: https://doi.org/10.1109/ACCESS.2021.3078887

J. Li, J. Ma, Y. Miao, R. Yang, X. Liu and K. -K. R. Choo, "Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data," in IEEE Transactions on Cloud Computing, vol. 10, no. 3, pp. 2005-2019, 1 July-Sept. 2022, doi: 10.1109/TCC.2020.3024226. DOI: https://doi.org/10.1109/TCC.2020.3024226

C. Hahn, H. Yoon and J. Hur, "Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1169-1181, 2023, doi: 10.1109/TIFS.2023.3236178. DOI: https://doi.org/10.1109/TIFS.2023.3236178

T. Parbat and A. Chatterjee, "Authorized Update in Multi-User Homomorphic Encrypted Cloud Database," in IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 8, pp. 7796-7808, 1 Aug. 2023, doi: 10.1109/TKDE.2022.3221148. DOI: https://doi.org/10.1109/TKDE.2022.3221148

C. Wang, D. Wang, Y. Duan and X. Tao, "Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2961-2976, 2023, doi: 10.1109/TIFS.2023.3272772. DOI: https://doi.org/10.1109/TIFS.2023.3272772

S. Gao, Y. Chen, J. Zhu, Z. Sui, R. Zhang and X. Ma, "BPMS: Blockchain-Based Privacy-Preserving Multi-Keyword Search in Multi-Owner Setting," in IEEE Transactions on Cloud Computing, vol. 11, no. 3, pp. 2260-2272, 1 July-Sept. 2023, doi: 10.1109/TCC.2022.3196712. DOI: https://doi.org/10.1109/TCC.2022.3196712

F. Li, J. Ma, Y. Miao, Q. Jiang, X. Liu and K. -K. R. Choo, "Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap," in IEEE Transactions on Cloud Computing, vol. 11, no. 1, pp. 336-348, 1 Jan.-March 2023, doi: 10.1109/TCC.2021.3093304. DOI: https://doi.org/10.1109/TCC.2021.3093304

K. He, J. Chen, Q. Yuan, S. Ji, D. He and R. Du, "Dynamic Group-Oriented Provable Data Possession in the Cloud," in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1394-1408, 1 May-June 2021, doi: 10.1109/TDSC.2019.2925800. DOI: https://doi.org/10.1109/TDSC.2019.2925800

Q. Huang, Z. Zhang and Y. Yang, "Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing," in IEEE Transactions on Mobile Computing, vol. 20, no. 5, pp. 1951-1964, 1 May 2021, doi: 10.1109/TMC.2020.2970705. DOI: https://doi.org/10.1109/TMC.2020.2970705

Y. Chen, W. Li, F. Gao, Q. Wen, H. Zhang and H. Wang, "Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing," in IEEE Transactions on Services Computing, vol. 15, no. 2, pp. 724-735, 1 March-April 2022, doi: 10.1109/TSC.2019.2959306. DOI: https://doi.org/10.1109/TSC.2019.2959306

Y. Zhang, H. Geng, L. Su and L. Lu, "A Blockchain-Based Efficient Data Integrity Verification Scheme in Multi-Cloud Storage," in IEEE Access, vol. 10, pp. 105920-105929, 2022, doi: 10.1109/ACCESS.2022.3211391. DOI: https://doi.org/10.1109/ACCESS.2022.3211391

X. Li et al., "VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data," in IEEE Transactions on Services Computing, vol. 16, no. 1, pp. 698-710, 1 Jan.-Feb. 2023, doi: 10.1109/TSC.2021.3140092. DOI: https://doi.org/10.1109/TSC.2021.3140092

B. Gong et al., "SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT," in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 1299-1312, 2024, doi: 10.1109/TIFS.2023.3331566. DOI: https://doi.org/10.1109/TIFS.2023.3331566

Downloads

Published

2023-06-30

How to Cite

R, J., Prathap S, R, R., Tony Wilson I, & Yuvaraj J. (2023). SECURE MULTI CLOUD STORAGE APPROACH FOR MULTICLOUD ENVIRONMENTS USING FOG COMPUTING. ShodhKosh: Journal of Visual and Performing Arts, 4(1), 1075–1082. https://doi.org/10.29121/shodhkosh.v4.i1.2023.2928