Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 4 von 17
KSII Transactions on Internet and Information Systems, 2020, 14(9), , pp.3870-3884
2020

Details

Autor(en) / Beteiligte
Titel
A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge
Ist Teil von
  • KSII Transactions on Internet and Information Systems, 2020, 14(9), , pp.3870-3884
Ort / Verlag
KSII, the Korean Society for Internet Information
Erscheinungsjahr
2020
Link zum Volltext
Quelle
EZB Electronic Journals Library
Beschreibungen/Notizen
  • The proposed framework of Four Layer Robust Storage in Cloud (FLRSC) architecture involves host server, local host and edge devices in addition to Virtual Machine Monitoring (VMM). The goal is to protect the privacy of stored data at edge devices. The computational intelligence (CI) part of our algorithm distributes blocks of data to three different layers by partially encoded and forwarded for decoding to the next layer using hash and greed Solomon algorithms. VMM monitoring uses snapshot algorithm to detect intrusion. The proposed system is compared with Tiang Wang method to validate efficiency of data transfer with security. Hence, security is proven against the indexed efficiency. It is an important study to integrate communication between local host software and nearer edge devices through different channels by verifying snapshot using lamport mechanism to ensure integrity and security at software level thereby reducing the latency. It also provides thorough knowledge and understanding about data communication at software level with VMM. The performance evaluation and feasibility study of security in FLRSC against three-layered approach is proven over 232 blocks of data with 98% accuracy. Practical implications and contributions to the growing knowledge base are highlighted along with directions for further research. Keywords: Fog Computing, Edge Computing, Malicious Attacks, distributed computing, Solomon code algorithm, VM-Monitoring and Computing Intelligence.
Sprache
Englisch
Identifikatoren
ISSN: 1976-7277
eISSN: 1976-7277
DOI: 10.3837/tiis.2020.09.017
Titel-ID: cdi_nrf_kci_oai_kci_go_kr_ARTI_9585331

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX