Abstract

With the rise of the Internet of Things, fog-to-cloud computing has emerged as a new cutting-edge approach (IoT). Except for the cloud service provider, fog-to-cloud computing necessitates the participation of additional entities, such as mobile sinks and fog nodes (CSP). As a result, fog-to-cloud storage integrity audits will differ from standard cloud storage auditing. Tian et al. has completed the first stage in developing a public auditing system for fog-to-cloud computing. However, because they employ complex public key cryptography techniques like bilinear mapping and proof of knowledge, their system becomes inefficient. We offer a more broad and efficient auditing system based on MAC and HMAC, two prominent private key cryptography algorithms in this study. By implementing MAC and HMAC, we give a real instantiation of our auditing system. Finally, theoretical analysis and actual findings show that our suggested system has lower communication and computing costs.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call