Abstract
With the dawn of computing era in the enterprise business, the methodologies for business have changed significantly. The enterprise information in the form of multimedia data is now being created and extensively shared over the internet. On the other side, the rapid and continuous growth of enterprises is causing the computing systems to evolve rapidly and continuously to match the pace of growth. This has led to the evolution of new technologies related to the enterprise environment. The advent of Internet of Things (IoT) and Cloud Computing in the enterprise environment is the result of its rapid and continuous requirement. But, their use has increased the complexity of enterprise computing systems especially in the domain of Enterprises Multimedia Security (EMS). In Cloud-IoT environment, the Enterprise Multimedia Data (EMD) stored at remote Cloud premises and subject to various kinds of vulnerabilities like data leakage, data modification and confidentiality breach. Hence, this paper proposes a distinctive EMS approach using Fog and Cloud to store different types of data and maintains their co-relation to prevent various EMD security breaches. In this paper, a Mobile Fog based Cloud-IoT framework for EMS has been designed in which only encrypted data is stored at the Cloud and its keys are securely stored at the enterprise premises on the Fog layer. It uses Advanced Encryption Standard (AES) for encryption, Message Authentication Code (MAC) for data integrity, Secure Socket Layer (SSL) for safe data transmission, tokenizer, hashing and data pointers for easy data search on Fog and Cloud. It stores the encryption/decryption and MAC keys encrypted with Master Encryption Key (MEK) securely at the enterprise premises on the Fog layer. For assured security of keys, the framework doesn’t store MEK at any place on the network. The experimental result analyses acknowledge the highest level of security, better scalability and storage management as well as searching time efficiency in the proposed framework. The overall results analysis show that the proposed framework is highly secure to protect the multimedia data of an enterprise from the inside and outside threats and access of data is provided to the authorized enterprise users.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.