A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing

Recent years witness the development of cloud computing technology. With the explosive growth of unstructured data, cloud storage technology gets more attention and better development. However, in current storage schema, user's data is totally stored in cloud servers. In other words, users lose their right of control on data and face privacy leakage risk. Traditional privacy protection schemes are usually based on encryption technology, but these kinds of methods cannot effectively resist attack from the inside of cloud server. In order to solve this problem, we propose a three-layer storage framework based on fog computing. The proposed framework can both take full advantage of cloud storage and protect the privacy of data. Besides, Hash-Solomon code algorithm is designed to divide data into different parts. Then, we can put a small part of data in local machine and fog server in order to protect the privacy. Moreover, based on computational intelligence, this algorithm can compute the distribution proportion stored in cloud, fog, and local machine, respectively. Through the theoretical safety analysis and experimental evaluation, the feasibility of our scheme has been validated, which is really a powerful supplement to existing cloud storage scheme.

[1]  Rusli Abdullah,et al.  Formulating a security layer of cloud data storage framework based on multi agent system architecture. , 2010 .

[2]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[3]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[4]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[5]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[6]  Yonggang Wen,et al.  Joint virtual machine and bandwidth allocation in software defined network (SDN) and cloud computing environments , 2014, 2014 IEEE International Conference on Communications (ICC).

[7]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[8]  Li Hui,et al.  Secure and Privacy-Preserving Data Storage Service in Public Cloud , 2014 .

[9]  Marios D. Dikaiakos,et al.  Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.

[10]  Weijia Jia,et al.  Maximizing real-time streaming services based on a multi-servers networking framework , 2015, Comput. Networks.

[11]  Yongxuan Lai,et al.  Data Delivery from WSNs to Cloud Based on a Fog Structure , 2016, 2016 International Conference on Advanced Cloud and Big Data (CBD).

[12]  Zhangjie Fu,et al.  Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.

[13]  R. J. McEliece,et al.  On sharing secrets and Reed-Solomon codes , 1981, CACM.

[14]  Ganesh K. Venayagamoorthy,et al.  Computational Intelligence in Wireless Sensor Networks: A Survey , 2011, IEEE Communications Surveys & Tutorials.

[15]  Yang Li,et al.  Efficient Data Collection in Sensor-Cloud System with Multiple Mobile Sinks , 2016, APSCC.

[16]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[17]  Tian Wang,et al.  Reliable wireless connections for fast-moving rail users based on a chained fog structure , 2017, Inf. Sci..

[18]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[20]  Jian Shen,et al.  A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..

[21]  Fu Ra Survey of Secure Cloud Storage , 2014 .

[22]  Xingming Sun,et al.  Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data , 2019, IEEE Transactions on Services Computing.

[23]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[24]  Yang Guangwen,et al.  A Method on Protection of User Data Privacy in Cloud Storage Platform , 2011 .

[25]  Md Zakirul Alam Bhuiyan,et al.  Maintaining the Balance between Privacy and Data Integrity in Internet of Things , 2017, ICMSS '17.

[26]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[27]  G. Kulkarni,et al.  Cloud storage architecture , 2012, 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA).

[28]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .

[29]  Fan Tong-rang Privacy preservation cloud storage architecture research , 2013 .