#

Advances in Computational Intelligence in Materials Science

Book Series

About the Book
About the Author
Table of Contents

Buy this Book

eBook
  • • Included format: Online and PDF
  • • eBooks can be used on all reading devices
  • • ISSN : 2960-2408
  • • ISBN : 978-9914-9946-9-8


Hand Cover
  • • Including format: Hardcover
  • • Shipping Available for individuals worldwide
  • • ISSN : 2960-2394
  • • ISBN : 978-9914-9946-8-1


Services for the Book

Download Product Flyer
Download High-Resolutions Cover

2nd International Conference on Materials Science and Sustainable Manufacturing Technology

Multi-Access Filtering using FOG-Enivronment

Gowtham S, Mohammed Abdullah S, Asha J, Nawin Ram Shanker I, Selwin Isac Neilsingh J, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India.


Online First : 07 June 2023
Publisher Name : AnaPub Publications, Kenya.
ISBN (Online) : 978-9914-9946-9-8
ISBN (Print) : 978-9914-9946-8-1
Pages : 082-088

Abstract


Fog computing is gaining popularity, even in traditionally conservative and delicate sectors like the Armed forces and nations.The interconnection of our community and technology breakthroughs like the IOT technology both have an impact on this. However, one of many crucial factors in fog computing adoption is guarding against privacy leaks. As a result, we present a multi-layer access filtration model in this study that safeguards privacy and was designed for such fog-based cloud environment, thus the name (FAF)fog-based access filter. The three major algorithms that make up FAF are the tuple reduction algorithm, the optimal privacy-energy-time methodology, and the access filter initialization method. The different protective aims are also distinguished using a hierarchical classification. Our experimental evaluation's conclusions show that FAF enables one to strike the perfect balance between privacy protection and computing costs.

Keywords


Cloud Computing, Fog Computing, Privacy, Security, Server, Resource, Performance, Upload, Access.

  1. K. Gai, L. Zhu, M. Qiu, K. Xu, and K.-K. R. Choo, “Multi-Access Filtering for Privacy-Preserving Fog Computing,” IEEE Transactions on Cloud Computing, vol. 10, no. 1, pp. 539–552, Jan. 2022, doi: 10.1109/tcc.2019.2942293.
  2. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, May 2011, doi: 10.1109/tpds.2010.183.
  3. Cong Wang, Qian Wang, and Kui Ren Department of ECE Illinois Institute of Technology. This work was supported in part by the US National Science Foundation under grant CNS-0831963, CNS0626601, CNS0716306, and CNS-0831628.
  4. Md. Shamsheer, K. Sunıl Kumar, “Towards Secure and Dependable Storage Services in Cloud Computing” in International Journal of Innovative Technologies Volume.06, Issue No.01, JanuaryJune, 2018, Pages: 0128-0131.
  5. Boyang Wang, Baochun Li, and Hui Li, “Oruta: privacy-preserving public auditing for shared data in the cloud,” IEEE Transactions on Cloud Computing, vol. 2, no. 1, pp. 43–56, Jan. 2014, doi: 10.1109/tcc.2014.2299807.
  6. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” 2010 Proceedings IEEE INFOCOM, Mar. 2010, doi: 10.1109/infcom.2010.5462173.
  7. Yan Zhu, Gail-Joon Ahn, Hongxin Hu, S. S. Yau, H. G. An, and Chang-Jun Hu, “Dynamic Audit Services for Outsourced Storages in Clouds,” IEEE Transactions on Services Computing, vol. 6, no. 2, pp. 227–238, Apr. 2013, doi: 10.1109/tsc.2011.51.
  8. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, “Dynamic audit services for integrity verification of outsourced storages in clouds,” Proceedings of the 2011 ACM Symposium on Applied Computing, Mar. 2011, doi: 10.1145/1982185.1982514.
  9. H. Wu, G. Li, and L. Zhou, “Ginix: Generalized inverted index for keyword search,” Tsinghua Science and Technology, vol. 18, no. 1, pp.77–87, Feb. 2013, doi: 10.1109/tst.2013.6449411.
  10. M. Nabeel and E. Bertino, “Privacy Preserving Delegated Access Control in Public Clouds,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 9, pp. 2268–2280, Sep. 2014, doi: 10.1109/tkde.2013.68.
  11. C. Wang, S. S. M. Chow, Q. Wang, K. Ren and W. Lou, "PrivacyPreserving Public Auditing for Secure Cloud Storage," in IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013, doi: 10.1109/TC.2011.245.
  12. Yang, J. Xu, J. Weng, J. Zhou, and D. S. Wong, “Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage,” IEEE Transactions on Cloud Computing, vol. 9, no. 1, pp. 212–225, Jan. 2021, doi: 10.1109/tcc.2018.2851256.
  13. Haldorai, A. Ramu, and S. A. R. Khan, Eds., “Business Intelligence for Enterprise Internet of Things,” EAI/Springer Innovations in Communication and Computing, 2020, doi: 10.1007/978-3-030-44407-5.
  14. S. Murugan and Anandakumar H., “Privacy Information Leakage Prevention in Cognitive Social Mining Applications,” Cognitive Social Mining Applications in Data Analytics and Forensics, pp. 188–212, 2019, doi: 10.4018/978-1-5225-7522-1.ch010.
  15. M. Li, L. Zhu, and X. Lin, “Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4573–4584, Jun. 2019, doi: 10.1109/jiot.2018.2868076.
  16. W. Teng, G. Yang, Y. Xiang, T. Zhang, and D. Wang, “Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing,” IEEE Transactions on Cloud Computing, vol. 5, no. 4, pp. 617–627, Oct. 2017, doi: 10.1109/tcc.2015.2440247.

Cite this article


Gowtham S, Mohammed Abdullah S, Asha J, Nawin Ram Shanker I, Selwin Isac Neilsingh J, “Multi-Access Filtering using FOG-Enivronment”, Advances in Computational Intelligence in Materials Science, pp. 082-088, May. 2023. doi:10.53759/acims/978-9914-9946-9-8_14

Copyright


© 2023 Gowtham S, Mohammed Abdullah S, Asha J, Nawin Ram Shanker I, Selwin Isac Neilsingh J. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.