Abstract

Nowadays cloud computing is being used extensively in daily life. With these new computing and communication technologies, new data security challenges arise. Privacy, integrity, and availability are the primary goals of the security structure. Many authentication schemes have been introduced over the years to ensure better security and to provide a wider range of services with a faster perspective. Each type of data is stored in the cloud and can be easily accessed anytime, anywhere. But, it lags due to location awareness when it comes to privacy in cloud computing. Improved cloud computing uses a fog-centric secure plan to ensure logs and information against unapproved access, change, and extinction. To obstruct unauthorized entry, the current scheme uses a technology called Xor-Combination to hide data. Besides, Xor-Combination results in preventing malicious recovery and ensuring better recovery capacity in case of data loss and Intermediate Fog does not provide server security. Cloud server and log files have been proposed and improved to provide higher security and intermediate security differently compared to the existing system for storing data on the fog server. Log files also contain personal information with equally critical protection and confidentiality of log data as an alternative scheme for storing logs in a cloud environment. Our proposed security to protect log files and data files on the main server on the Intermediate Fog server. We use an enhanced 3DES security method that provides better security than the Xor-combination technique.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.