Rui Xu, Zhenjiang Zhang, Bo Shen, Yanran Zeng, Chenyang Dai
{"title":"Security Storage Based on Fountain Code and XOR Encryption in Edge Computing","authors":"Rui Xu, Zhenjiang Zhang, Bo Shen, Yanran Zeng, Chenyang Dai","doi":"10.1109/Ubi-Media.2019.00011","DOIUrl":null,"url":null,"abstract":"Edge computing has obvious advantages in heterogeneity, low latency and dense network access. Meanwhile, edge device has complex structure and weak storage capacity. A lot of security threats still exist in the process of storing sensitive data. This paper proposes a method of combining fountain code and XOR encryption to the data storage in edge devices. First, the source file is encrypted by XOR encryption. Then we divide the ciphertext into multiple ciphertext data blocks. After encoding ciphertext data blocks, we mix them with coding blocks and distribute them on multiple edge devices. When we receive enough data blocks, we can recover the source file. The combination of XOR encryption and fountain code improves reliability and security of storage.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Ubi-Media.2019.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Edge computing has obvious advantages in heterogeneity, low latency and dense network access. Meanwhile, edge device has complex structure and weak storage capacity. A lot of security threats still exist in the process of storing sensitive data. This paper proposes a method of combining fountain code and XOR encryption to the data storage in edge devices. First, the source file is encrypted by XOR encryption. Then we divide the ciphertext into multiple ciphertext data blocks. After encoding ciphertext data blocks, we mix them with coding blocks and distribute them on multiple edge devices. When we receive enough data blocks, we can recover the source file. The combination of XOR encryption and fountain code improves reliability and security of storage.