Security Clouds to Improve Privacy and Conduct Continuous Audits in 6G Networked Environments Smart Cities

DOI: https://doi.org/10.1007/s11277-024-11023-4
IF: 2.017
2024-05-08
Wireless Personal Communications
Abstract:Data auditing in the cloud, along with files and authentication server Deduplication, may protect the integrity of cloud storage and substantially decrease the cloud stored data. With the rise of Smart Cities, the sector has offered plenty of potential problems. The failure in single point, Although, Cloud computing is standard in modern enterprise networks, and cloud security is a significant concern in the Cloud Integrated Smart City (CISC). However, to deal with large amounts of data created by different intelligent devices, storing and uploading all that information to the cloud servers is necessary. Therefore, cloud servers must protect the data against integrity as well as ensuring it is private. Over the last year, Cloud servers had suggested several cloud security auditing plans. Because of this, they were verifying data integrity using a third-party auditor (TPA) is crucial. Bi-linear pairing procedures are the most often used operation in the audit phase, and they require substantial effort and expense. Additionally, such approaches will not secure users' data privacy. Thus, we proposed a Artificial Bee colony and SHA algorithm for public cloud auditing system for CISC that preserves integrity and confidentiality. Security can be improved by using this proposed strategy, although the associated communication and computational costs are low National cyber security authorities may use CISC as security and privacy for auditing/scoring. A batch audit is used, as well as dynamic process data. In addition, the suggested method protects smart cities from unauthorized TPA. CISC auditing in TPA assessed the proposed system's security and performance to be strong.
telecommunications
What problem does this paper attempt to address?