International Journal of Scientific Research and Engineering Development( International Peer Reviewed Open Access Journal ) ISSN [ Online ] : 2581 - 7175 |
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational Intelligence in Fog Computing
International Journal of Scientific Research and Engineering Development (IJSRED) | ||
Published Issue : Volume-3 Issue-4 | ||
Year of Publication : 2020 | ||
Unique Identification Number : IJSRED-V3I4P43 | ||
Authors : Lakshmi Prasad, Ajeesh S, Smita C Thomas |
MLA Style: Lakshmi Prasad, Ajeesh S, Smita C Thomas "A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational Intelligence in Fog Computing" International Journal of Scientific Research and Engineering Development (IJSRED) Vol3-Issue4 | 312-317.
APA Style: Lakshmi Prasad, Ajeesh S, Smita C Thomas. A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational Intelligence in Fog Computing. International Journal of Scientific Research and Engineering Development (IJSRED) Vol3-Issue4 | 312-317.
Abstract :
Distributed computing and capacity gives clients to store and procedure their information in server farms. At the point when an association chooses to store information in cloud, it loses its entitlement to access to servers facilitating its data. Along these lines there is an opportunity of insider assaults. Existing security insurance systems are typically founded on encryption innovation, yet these sorts of techniques can't viably oppose assault from the cloud. To determine this issue, here proposes a three-layer stockpiling structure which depends on haze registering. The proposed engineering can both exploit distributed storage and secure the protection of information. In addition, Hash-Solomon code calculation is intended to partition information into sections. At that point, we can place a little piece of information in neighborhood machine and haze server so as to ensure the security and other in cloud. Additionally, in light of computational knowledge, this calculation can figure the dissemination extent put away in cloud, haze, and neighborhood machine, separately. By the hypothetical security investigation and trials, the possibility of our plan has been approved, which is actually a successful outcome to existing distributed storage plot.