Security Storage Based on Fountain Code and XOR Encryption in Edge Computing

Edge computing has obvious advantages in heterogeneity, low latency and dense network access. Meanwhile, edge device has complex structure and weak storage capacity. A lot of security threats still exist in the process of storing sensitive data. This paper proposes a method of combining fountain code and XOR encryption to the data storage in edge devices. First, the source file is encrypted by XOR encryption. Then we divide the ciphertext into multiple ciphertext data blocks. After encoding ciphertext data blocks, we mix them with coding blocks and distribute them on multiple edge devices. When we receive enough data blocks, we can recover the source file. The combination of XOR encryption and fountain code improves reliability and security of storage.