(function(doc, html, url) { var widget = doc.createElement("div"); widget.innerHTML = html; var script = doc.currentScript; // e = a.currentScript; if (!script) { var scripts = doc.scripts; for (var i = 0; i < scripts.length; ++i) { script = scripts[i]; if (script.src && script.src.indexOf(url) != -1) break; } } script.parentElement.replaceChild(widget, script); }(document, '

An Approach for Data integrity authentication and protection in fog computing

What is it about?

The data integrity verification process in cloud has become more promising research area in several Internet of Things (IoT) applications. The traditional data verification approaches use encryption in order to preserve data. Moreover, fog computing is considered as extensively employed virtualized platform and it affords various services including storage as well as services interconnected to computing and networking between user and data center based on standard cloud computing. Moreover, fog computing is an extensive description of cloud computing. Thus, fog servers effectively decrease the latency by integrating fog servers. In this paper, novel model for data integrity authentication and protection is designed in IoT cloud-fog model. This method mainly comprises fog nodes, cloud server, IoT nodes, and key distribution center. Here, dynamic and secure key is produced based on the request to key distribution center based on hashing, Exclusive OR (XOR), homomorphic encryption and polynomial. The fog nodes are employed to encrypt the data gathered from IoT nodes as well as allocate the nearby nodes based on Artificial Bee Colony-based Fuzzy-C-Means (ABC FCM)-based partitioning approach. The proposed data integrity authentication approach in IoT fog cloud system outperformed than other existing methods with respect to detection rate, computational time and memory usage respectively.

Why is it important?

. The combination of IoT network and cloud has significantly enhanced the people’s lives and work effectiveness, and it has been preferred by more number of peoples . However, obtaining data integrity verification model for huge scale IoT data in cloud storage has become as modern topic for further applications in IoT. The combination of cloud and IoT eradicates the trouble of regulation and local storage. Accordingly, cloud service providers can definitely gain the user control data, which critically threatens data security . Consequently, IoT data integrity verification model is great significance for effectual cloud storage [13]. Furthermore, individual users select to accumulate their data on cloud owing to the rapid development of information sharing and trade. However, users misplace the control of the data, while the data’s are accumulated on cloud. Hence, how to authenticate the integrity of data accumulated on cloud becomes as more significant concern .

Read more on Kudos…
The following have contributed to this page:
BABITHA MN
' ,"url"));