This paper is published in Volume-6, Issue-2, 2020
Area
Computer Science Engineering
Author
M. Sai Poojitha
Co-authors
P. Jyothsna Vani, K. Yaseswini, L. Tejaswini
Org/Univ
Andhra University College of Engineering for Women, Visakhapatnam, Andhra Pradesh, India
Pub. Date
17 April, 2020
Paper ID
V6I2-1410
Publisher
Keywords
Cloud computing, Fog computing, cloud storage, fog server, privacy protection, Hash-Solomon algorithm

Citationsacebook

IEEE
M. Sai Poojitha, P. Jyothsna Vani, K. Yaseswini, L. Tejaswini. A three-layer privacy scheme for storing data using fog computing along with cloud computing, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
M. Sai Poojitha, P. Jyothsna Vani, K. Yaseswini, L. Tejaswini (2020). A three-layer privacy scheme for storing data using fog computing along with cloud computing. International Journal of Advance Research, Ideas and Innovations in Technology, 6(2) www.IJARIIT.com.

MLA
M. Sai Poojitha, P. Jyothsna Vani, K. Yaseswini, L. Tejaswini. "A three-layer privacy scheme for storing data using fog computing along with cloud computing." International Journal of Advance Research, Ideas and Innovations in Technology 6.2 (2020). www.IJARIIT.com.

Abstract

Nowadays, we often listen to the word of cloud computing. In our technological world, we care a lot about our privacy, so we use cloud computing to achieve it. For the time being, there are many people who are interested in others life and are always try to get other data. Recently, We came to know that this cloud computing storage system also been crashed. In order to decrease the risk of losing data, we introduced a new technology called Fog computing. In this new storage system, we have used a theory of the Hash-Solomon code of algorithm which helps in dividing data into three parts. And fog computing we use is to store the three parts of data into cloud, fog and in secondary storage or main memory of the device/system. The composition of data that divided into is 95%, 4%, and 1% respectively. As it is dived into three parts it’ll be difficult for the hacker to crash into fog server and get the data stored in it. We all know about cloud storage is secured externally whereas fog server is secured both in and out of it. That means fog storage system is secured both internally and externally. Here Hash-Solomon ensures the data to be encoded first before dividing the data and even encodes each part after the division of data. For retrieving this data when the owner needed then it is decoded by Hash-Solomon itself, if we use another algorithm it will only do encode or decode but not both. So, we use this algorithm for flexibility, compatibility and also for better efficiency. So, we can say that this increases privacy protection.
Paper PDF