|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
Abstract
Computing tasks traditionally handled by central nodes are delegated to peripheral devices in fog computing. The explosion of unstructured data coupled with advances in cloud computing has led to the rapid improvement of cloud storage methods. Your cloud service provider makes no recommendations about the content or location of your data and information saved in the cloud. Encryption is commonly used as the foundation for privacy protection measures. A cloud-based, multi-tiered, and fog-based storage infrastructure. The suggested framework is capable of making use of cloud storage while still keeping user information secure. In this case, we employ a data-splitting technique based on the hash-Solomon code. To protect the data in this architecture, we employ methods based on the bucket concept and the BCH coding algorithm to solve the error-correcting cycle problem. This programme uses AI to determine what share of data is most effectively kept in the cloud, in the fog, and on a local system.
Keyword
Hash-Solomon code, Fog computing, cloud computing, bucket framework
PDF Download (click here)
|
|
|
|
|