Browse > Article
http://dx.doi.org/10.3837/tiis.2020.09.017

A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge  

Nirmala, E. (Department of Computer Technology, Madras Institute of Technology Campus, Anna University)
Muthurajkumar, S. (Department of Computer Technology, Madras Institute of Technology Campus, Anna University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.9, 2020 , pp. 3870-3884 More about this Journal
Abstract
The proposed framework of Four Layer Robust Storage in Cloud (FLRSC) architecture involves host server, local host and edge devices in addition to Virtual Machine Monitoring (VMM). The goal is to protect the privacy of stored data at edge devices. The computational intelligence (CI) part of our algorithm distributes blocks of data to three different layers by partially encoded and forwarded for decoding to the next layer using hash and greed Solomon algorithms. VMM monitoring uses snapshot algorithm to detect intrusion. The proposed system is compared with Tiang Wang method to validate efficiency of data transfer with security. Hence, security is proven against the indexed efficiency. It is an important study to integrate communication between local host software and nearer edge devices through different channels by verifying snapshot using lamport mechanism to ensure integrity and security at software level thereby reducing the latency. It also provides thorough knowledge and understanding about data communication at software level with VMM. The performance evaluation and feasibility study of security in FLRSC against three-layered approach is proven over 232 blocks of data with 98% accuracy. Practical implications and contributions to the growing knowledge base are highlighted along with directions for further research.
Keywords
Fog Computing; Edge Computing; Malicious Attacks; distributed computing; Solomon code algorithm; VM-Monitoring and Computing Intelligence;
Citations & Related Records
연도 인용수 순위
  • Reference
1 TianWang, WeijiaJia, XiZheng, GuojunWang, MandeXie, "Edge-based differential privacy computing for sensor-cloud systems," Elsevier Parallel and Distributed Computing Journal, vol. 136, pp. 75-85, February 2020.   DOI
2 Ndikumana, N. H. Tran, D. H. Kim, K. T. Kim and C. S. Hong, "Deep Learning Based H. sed Caching for Self-Driving Cars in Multi-Access Edge Computing," IEEE Transactions on Intelligent Transportation Systems, pp. 1-6, March 2020.
3 Mohammad Alibakhshikenari , Bal S. Virdee , Naser Ojaroudi Parchin, Panchamkumar Shukla Karim Quazzane, Chan H. See, Raed Abd-Alhameed, Francisco Falcone, Ernesto Limiti, "Isolation enhancement of densely packed array antennas with periodic MTM-photonic bandgap for SAR and MIMO systems," IET Microwaves, Antennas & Propagation, vol. 14, no. 3, pp. 183-188, February 2020.   DOI
4 J. Park, M. Rahman and H. N. Chen, "Isolation Enhancement of Wide-Band MIMO Array Antennas Utilizing Resistive Loading," IEEE Access, vol. 7, pp. 81020-81026, June 2019.   DOI
5 Mohammad Alibakhshikenari,Bal S. Virdee, P. Shukla, Chan H. See, RaedAbd-Alhameed, Francisco Falcone, and Ernesto Limiti, "Meta-Surface Wall Suppression of Mutual Coupling between Microstrip Patch Antenna Arrays for THz-Band Applications," Progress In Electromagnetics Research Letters, vol. 75, pp. 105-111, May 2018.   DOI
6 Mohammad Alibakhshikenari, Bal Singh Virdeeband Ernesto Limiti, "Wideband planar array antenna based on SCRLH-TL forairborne synthetic aperture radar application," Journal of Electromagnetic Waves and Applications, vol. 32, no.12, pp. 1586-1599, May 2018.   DOI
7 M. Alibakhshikenari, Bal S. Virdee, Chan Hwang See and Raed Abd-Alhame, "Wideband printed monopole antenna for application in wireless communication systems," IET Microwaves, Antennas & Propagation, vol. 12, no. 7, pp. 1222-1230, June 2018.   DOI
8 Mohhammad Alibhakshikenari, Bal S.Virdee, Abdul Ali, Ernesto Limit, "Extended Aperture Miniature Antennar Based on CRLH Metamaterials for Wireless Communication Systems Operating Over UHF to C-Band," Journal of Radio Science, vol.52, no.2, 154-165, February 2018.
9 Mohammad Alibakshikenari, Bal SVirdee, Abdul Ali, Ernesto Limiti "A novel monofilar-Archimedean metamaterial inspired leaky-wave antenna for scanning application for passive radar systems," Microw Opt Technol Lett, vol. 60, no.8, pp. 2055-2060, June 2018.   DOI
10 Rajiv Ranjan, Massimo Villari, Haiying Shen, Omer Rana, Rajkumar Buyya, "Software tools and techniques fog and edge computing," Wiley sofware practice and experience Journal, vol. 50, no. 5, pp. 473-475, March, 2020.
11 Mohhammad Alibhakshikenari, Ernesto Limit, et al., "A New Wideband Planar Antenna with Band-Notch Functionality at GPS, Bluetooth and WiFi Bands for Integration in Portable Wireless Systems," International Journal of Electronics and Communications, vol.72, pp.79-85, February 2017.   DOI
12 Z. Zou, Y. Jin, P. Nevalainen, Y. Huan, J. Heikkonen and T. Westerlund, "Edge and Fog Computing Enabled AI for IoT-An Overview," in Proc. of IEEE International Conference on Artificial Intelligence Circuits and Systems, pp.51-56, 2019.
13 S. Saraswati H. P. Gupta and T. Dutta, "A Minimum Cost Real-Time Ubiquitous Computing System Using Edge-Fog-Cloud," in Proc. of IEEE International Conference on Advanced Networks and elecommunications Systems, pp.1-6, December 2018.
14 J. Liu, J. Weng, A. Yang, Y. Chen and X. Lin, "Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing based Smart Grid," IEEE Transactions on Smart Grid, vol. 11, no. 1, pp. 247-257, June 2019.   DOI
15 Nabil Abubaker, Leonard Dervishi, Erman Ayday, "Privacy-Preserving Fog Computing Paradigm," in Proc. of IEEE Workshop on CNS, pp. 502-509, December 2017.
16 J Liang, Y. Long, Y. Mei, T. Wang and Q. Jin, "A Distributed Intelligent Hungarian Algorithm for Workload Balance in Sensor-Cloud Systems Based on Urban Fog Computing," IEEE Access, vol. 7, pp. 77649-77658, June 2019.   DOI
17 Tian Wang , Jiyuan Zhou, Anfeng Liu, and Md Zakirul Alam Bhuiyan, "Fog-Based Computing and Storage Offloading for Data Synchronization in IoT," IEEE Internet of Things Journal, vol.6, no.3, pp. 4272-4282, June 2019.   DOI
18 L. Zhou, L. Yu, S. Du, H. Zhu and C. Chen, "Achieving Differentially Private Location Privacy in Edge-Assistant Connected Vehicles," IEEE Internet of Things Journal, vol.6, no.3, pp. 4472-4481, June 2019.   DOI
19 Zhou, T. Wang, M. Z. A. Bhuiyan and A. Liu, "A Hierarchic Secure Cloud Storage Scheme Based on Fog Computing," in Proc. of 5th IEEE Intl Conf on Dependable, Autonomic and Secure Computing, pp.470-477, November 2017.
20 W. Abdul, Z. Ali, S. Ghouzali, B. Alfawaz, G. Muhammad and M. S. Hossain, "Biometric Security Through Visual Encryption for Fog Edge Computing," IEEE Access, vol. 5, pp. 5531-5538, Apr.2017.   DOI
21 K. Sangaiah, M. Sadeghilalimi, A. A. R. Hosseinabadi and W. Zhang, "Energy Consumption in Point-Coverage Wireless Sensor Networks via Bat Algorithm," IEEE Access, vol. 7, pp. 180258-180269, Novmber 2020.   DOI
22 Mehrzad Lavassani, Stefan Forsström, Ulf Jennehag, and Tingting Zhang, "Combining Fog Computing with Sensor Mode Machine Learning for Industrial IoT," Sensors, vol. 18, no.5, pp. 1-20, May 2018.   DOI
23 K. Sangaiah, D. V. Medhane, T. Han, M. S. Hossain and G. Muhammad, "Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics," IEEE Transactions on Industrial Informatics, vol. 15, no. 7, pp. 4189-4196, July 2019.   DOI
24 K. Sangaiah, D. V. Medhane, G. Bian, A. Ghoneim, M. Alrashoud and M. S. Hossain, "Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System," IEEE Transactions on Industrial Informatics, vol. 16, no. 5, pp. 3322-3329, May 2020.   DOI
25 Sangaiah, A.K. Hosseinabadi, A.A.R. Shareh, M.B., Bozorgi Rad, S.Y, Zolfagharian, A. Chilamkurti, N. IoT Resource Allocation and Optimization Based on Heuristic Algorithm," Sensors, vol. 20, no. 2, pp. 1-26, January 2020.   DOI
26 Mehrzad Lavassani, Stefan Forsstrom, Ulf Jennehag, and Tingting Zhang, "Combining Fog Computing with Sensor Mode Machine Learning for Industrial IoT," Sensor, vol.18, no.5, pp. 1-20, May 2018.   DOI
27 Maria Yuang, Po-Lung Tien, Wei-Zhang Ruan, Tien-Chien Lin, Shao-Chun, "OPTUNS: Optical intra-data center network architecture and prototype testbed for a 5G edge cloud [Invited]," Journal of Optical Communications and Networking, vol. 12, no. 1, pp.A28-A37, January 2020.   DOI
28 M. Bazm, M. Lacoste, M. Südholt and J. Menaud, "Secure Distributed Computing on Untrusted Fog Infrastructures Using Trusted Linux Containers," in Proc. of IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Nicosia, pp.239-242, Dec.2018.
29 S. N. Shirazi, A. Gouglidis, A. Farshad and D. Hutchison, "The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective," IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp. 2586-2595, November 2017.   DOI