This paper is published in Volume-8, Issue-3, 2022
Area
Cloud Computing
Author
G. Thanuja Reddy, Dr. Vanitha Kakollu
Org/Univ
GITAM School of Science, Visakhapatnam, Andhra Pradesh, India
Keywords
Cloud Storage, Computational Intelligence, Fog Computing, Three-Layer Privacy
Citations
IEEE
G. Thanuja Reddy, Dr. Vanitha Kakollu. Cloud storage scheme based on computational intelligence in fog computing, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
G. Thanuja Reddy, Dr. Vanitha Kakollu (2022). Cloud storage scheme based on computational intelligence in fog computing. International Journal of Advance Research, Ideas and Innovations in Technology, 8(3) www.IJARIIT.com.
MLA
G. Thanuja Reddy, Dr. Vanitha Kakollu. "Cloud storage scheme based on computational intelligence in fog computing." International Journal of Advance Research, Ideas and Innovations in Technology 8.3 (2022). www.IJARIIT.com.
G. Thanuja Reddy, Dr. Vanitha Kakollu. Cloud storage scheme based on computational intelligence in fog computing, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
G. Thanuja Reddy, Dr. Vanitha Kakollu (2022). Cloud storage scheme based on computational intelligence in fog computing. International Journal of Advance Research, Ideas and Innovations in Technology, 8(3) www.IJARIIT.com.
MLA
G. Thanuja Reddy, Dr. Vanitha Kakollu. "Cloud storage scheme based on computational intelligence in fog computing." International Journal of Advance Research, Ideas and Innovations in Technology 8.3 (2022). www.IJARIIT.com.
Abstract
Traditional privacy protection schemes are usually based on cipher technology, but these kinds of methods cannot effectively resist attacks from the inside of a cloud server. In order to achieve the goal problem, the motive of a three-layer storage framework supported fog computing. The future framework can both take full advantage of cloud storage and protect the privacy of knowledge. The hash-Solomon code algorithm is meant to cleave data into different parts. Then, this can add a small part of data in the local machine and fog server in order to protect privacy. With the explosive growth of disorderly data, cloud storage technology gets more attention and better development. However, in Education, Financial, and Healthcare storage schema, users’ data is totally stored in cloud servers.