Detailed Information

Cited 0 time in webofscience Cited 18 time in scopus
Metadata Downloads

A Novel Transparent and Auditable Fog-Assisted Cloud Storage with Compensation Mechanism

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Donghyun-
dc.contributor.authorSon, Junggab-
dc.contributor.authorSeo, Daehee-
dc.contributor.authorKim, Yeojin-
dc.contributor.authorKim, Hyobin-
dc.contributor.authorSeo, Jung Taek-
dc.date.accessioned2021-08-11T08:37:51Z-
dc.date.available2021-08-11T08:37:51Z-
dc.date.issued2020-02-
dc.identifier.issn1007-0214-
dc.identifier.issn1878-7606-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3135-
dc.description.abstractThis paper introduces a new fog-assisted cloud storage which can achieve much higher throughput compared to the traditional cloud-only storage architecture by reducing the traffics toward the cloud storage. The fog-storage service providers are transparency to end-users and therefore, no modification on the end-user devices is necessary. This new system is featured with (1) a stronger audit scheme which is naturally coupled with the proposed architecture and does not suffer from the replay attack and (2) a transparent and efficient compensation mechanism for the fog-storage service providers. We provide rigorous theoretical analysis on the correctness and soundness of the proposed system. To the best of our knowledge, this is the first paper to discuss about a storage data audit scheme for fog-assisted cloud storage as well as the compensation mechanism for the service providers of the fog-storage service providers.-
dc.format.extent16-
dc.language영어-
dc.language.isoENG-
dc.publisherTsinghua University-
dc.titleA Novel Transparent and Auditable Fog-Assisted Cloud Storage with Compensation Mechanism-
dc.typeArticle-
dc.publisher.location중국-
dc.identifier.doi10.26599/TST.2019.9010025-
dc.identifier.scopusid2-s2.0-85069514068-
dc.identifier.wosid000516758000004-
dc.identifier.bibliographicCitationTsinghua Science and Technology, v.25, no.1, pp 28 - 43-
dc.citation.titleTsinghua Science and Technology-
dc.citation.volume25-
dc.citation.number1-
dc.citation.startPage28-
dc.citation.endPage43-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusBIG DATA-
dc.subject.keywordPlusSECURITY-
dc.subject.keywordPlusINTERNET-
dc.subject.keywordPlusPRIVACY-
dc.subject.keywordPlusIOT-
dc.subject.keywordAuthorfog computing-
dc.subject.keywordAuthorcloud computing-
dc.subject.keywordAuthornetwork storage-
dc.subject.keywordAuthordata audit-
dc.subject.keywordAuthormerkle hash tree-
dc.subject.keywordAuthorinteger factorization-
dc.subject.keywordAuthorpayment-
dc.subject.keywordAuthortransparency-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE