Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
Secure Data Storage in Fog to Cloud Computing Based on Efficient Auditing Scheme
Author Name : P Kirankumar, C.Bhanu Prakash
ABSTRACT
Fog-to-cloud computing has now become a novel important technique combined with the rapid development of Internet of Things (IoT). Unlike existing cloud computing, fog-to-cloud computing needs more attributes to involve in, that includes mobile sinks and fog elements except for Data service provider (DSP). So, the integrity auditing in fog-to-cloud storage will also be differ from that of existing cloud storage. In the work of Tina., they consider the first move to develop public auditing system for fog-to-cloud computing. However, their scheme becomes very complex since they utilizesymmetric public key cryptographic techniques, that includes bilinear mapping, proof of knowledge etc. In this paper, we developmost efficient auditing system that can be based on Hash based MAC, both of which are most populative private key cryptographic techniques. By considering HMAC, we consider a concrete exploration of our auditing system. Finally, the theoretical analysis and experiment results show that our proposed system has mostefficient in terms of processing costs.