Journal Home > Volume 25 , Issue 1

This paper introduces a new fog-assisted cloud storage which can achieve much higher throughput compared to the traditional cloud-only storage architecture by reducing the traffics toward the cloud storage. The fog-storage service providers are transparency to end-users and therefore, no modification on the end-user devices is necessary. This new system is featured with (1) a stronger audit scheme which is naturally coupled with the proposed architecture and does not suffer from the replay attack and (2) a transparent and efficient compensation mechanism for the fog-storage service providers. We provide rigorous theoretical analysis on the correctness and soundness of the proposed system. To the best of our knowledge, this is the first paper to discuss about a storage data audit scheme for fog-assisted cloud storage as well as the compensation mechanism for the service providers of the fog-storage service providers.


menu
Abstract
Full text
Outline
About this article

A Novel Transparent and Auditable Fog-Assisted Cloud Storage with Compensation Mechanism

Show Author's information Donghyun KimJunggab SonDaehee SeoYeojin KimHyobin KimJung Taek Seo( )
Department of Computer Science, Kennesaw State University, Marietta, GA 30060, USA.
Department of Information Security Engineering, Soonchunhyang University, Asan 31538, South Korea.

Abstract

This paper introduces a new fog-assisted cloud storage which can achieve much higher throughput compared to the traditional cloud-only storage architecture by reducing the traffics toward the cloud storage. The fog-storage service providers are transparency to end-users and therefore, no modification on the end-user devices is necessary. This new system is featured with (1) a stronger audit scheme which is naturally coupled with the proposed architecture and does not suffer from the replay attack and (2) a transparent and efficient compensation mechanism for the fog-storage service providers. We provide rigorous theoretical analysis on the correctness and soundness of the proposed system. To the best of our knowledge, this is the first paper to discuss about a storage data audit scheme for fog-assisted cloud storage as well as the compensation mechanism for the service providers of the fog-storage service providers.

Keywords: cloud computing, fog computing, network storage, data audit, merkle hash tree, integer factorization, payment, transparency

References(28)

[1]
D. Kim, E. Ko, J. Son, Y. Kim, and J. Seo, A lightweight and transparent compensation mechanism for fog-cloud storage framework, in Proc. 2008 IEEE 4th Int. Conf. Big Data Computing Service and Applications, Bamberg, Germany, 2018, pp. 254-259.
DOI
[2]
Y. Kim, D. Kim, J. Son, W. Wang, and Y. Noh, A new fog-cloud storage framework with transparency and auditability, in Proc. 2018 IEEE Int. Conf. Communications, Kansas City, MO, USA, 2018, pp. 1-7.
DOI
[3]
Z. J. Qin, G. Denker, C. Giannelli, P. Bellavista, and N. Venkatasubramanian, A software defined networking architecture for the internet-of-things, in Proc. 2014 IEEE Network Operations and Management Symposium, Krakow, Poland, 2014.
DOI
[4]
N. Daneshfar, N. Pappas, and V. Angelakis, Resource allocation with service availability & QoS constraints in mobile fog networks, in Proc. 2017 IEEE Conf. Computer Communications Workshops, Atlanta, GA, USA, 2017, pp. 1018-1019.
DOI
[5]
L. M. Vaquero and L. Rodero-Merino, Finding your way in the fog: Towards a comprehensive definition of fog computing, ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, pp. 27-32, 2014.
[6]
M. Aazam and E. N. Huh, Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT, in Proc. 2015 IEEE 29th Int. Conf. Advanced Information Networking and Applications, Gwangiu, South Korea, 2015, pp. 687-694.
DOI
[7]
T. X. Zhu, T. Shi, J. Z. Li, Z. P. Cai, and X. Zhou, Task scheduling in deadline-aware mobile edge computing systems, IEEE Internet of Things Journal, .
[8]
L. Yu, L. H. Chen, Z. P. Cai, H. Y. Shen, Y. Liang, and Y. Pan, Stochastic load balancing for virtual resource management in datacenters, IEEE Transactions on Cloud Computing, .
[9]
L. Yu, H. Y. Shen, Z. P. Cai, L. Liu, and C. Pu, Towards bandwidth guarantee for virtual clusters under demand uncertainty in multi-tenant clouds, IEEE Transactions on Parallel and Distributed Systems, vol. 29, no. 2, pp. 450-465, 2018.
[10]
L. Yu, H. Y. Shen, K. Sapra, L. Ye, and Z. P. Cai, CoRE: Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost, IEEE Transactions on Parallel and Distributed Systems, vol. 28, no. 2, pp. 446-461, 2017.
[11]
L. Yu and Z. P. Cai, Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters, in Proc. 35th Annu. IEEE Int. Conf. Computer Communications, San Francisco, CA, USA, 2016, pp. 1-9.
DOI
[12]
R. Mahmud, R. Kotagiri, and R. Buyya, Fog computing: A taxonomy, survey and future directions, arXiv:1611.05539, 2017.
[13]
S. Sarkar, S. Chatterjee, and S. Misra, Assessment of the suitability of fog computing in the context of Internet of things, IEEE Transactions on Cloud Computing, vol. 6, no. 1, pp. 46-59, 2018.
[14]
A. Munir, P. Kansakar, and S. U. Khan, IFCIoT: Integrated fog cloud IoT: A novel architectural paradigm for the future Internet of Things, IEEE Consumer Electronics Magazine, vol. 6, no. 3, pp. 74-82, 2017.
[15]
R. L. Deng, R. X. Lu, C. Z. Lai, T. H. Luan, and H. Liang, Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption, IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1171-1181, 2016.
[16]
A. Alrawais, A. Alhothaily, C. Q. Hu, and X. Z. Cheng, Fog computing for the Internet of Things: Security and privacy issues, IEEE Internet Computing, vol. 21, no. 2, pp. 34-42, 2017.
[17]
R. Roman, J. Lopez, and M. Mambo, Mobile Edge Computing, Fog et al.: A survey and analysis of security threats and challenges, Future Generation Computer Systems, vol. 78, pp. 680-698, 2018.
[18]
Cisco Systems, Fog computing and the Internet of things: Extend the cloud to where the things are, https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf, 2015.
[19]
C. Liu, R. Ranjan, C. Yang, X. Y. Zhang, L. Z. Wang, and J. J. Chen, MuR-DPA: Top-down levelled multi-replica Merkle hash tree based secure public auditing for dynamic big data storage on cloud, IEEE Transactions on Computers, vol. 64, no. 9, pp. 2609-2622, 2015.
[20]
K. Yang and X. H. Jia, Data storage auditing service in cloud computing: Challenges, methods and opportunities, World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
[21]
K. Yang and X. H. Jia, An efficient and secure dynamic auditing protocol for data storage in cloud computing, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717-1726, 2013.
[22]
Q. Wang, C. Wang, K. Ren, W. J. Lou, and J. Li, Enabling public auditability and data dynamics for storage security in cloud computing, IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
[23]
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. J. Lou, Privacy-preserving public auditing for secure cloud storage, IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, 2013.
[24]
C. Liu, C. Yang, X. Y. Zhang, and J. J. Chen, External integrity verification for outsourced big data in cloud and IoT: A big picture, Future Generation Computer Systems, vol. 49, pp. 58-67, 2015.
[25]
Y. Zhu, G. J. Ahn, H. X. Hu, S. S. Yau, H. G. An, and C. J. Hu, Dynamic audit services for outsourced storages in clouds, IEEE Transactions on Services Computing, vol. 6, no. 2, pp. 227-238, 2013.
[26]
L. F. Wei, H. J. Zhu, Z. F. Cao, X. L. Dong, W. W. Jia, Y. L. Chen, and A. V. Vasilakos, Security and privacy for storage and computation in cloud computing, Information Sciences, vol. 258, pp. 371-386, 2014.
[27]
D. Naccache, Double-speed safe prime generation, https://eprint.iacr.org/2003/175.pdf, 2003.
[28]
J. Katz, Digital Signatures. Boston, MA, USA: Springer Science & Business Media, 2010.
DOI
Publication history
Copyright
Acknowledgements
Rights and permissions

Publication history

Received: 06 May 2019
Revised: 16 May 2019
Accepted: 28 May 2019
Published: 22 July 2019
Issue date: February 2020

Copyright

© The author(s) 2020

Acknowledgements

This work was supported by Institute for Information & Communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2016-6-00599, a study on functional signature and its applications). This work was also supported in part by the Soonchunhyang University Research Fund.

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return