Is fog more secure than cloud?

cloud computing
Researchers have found that, at high usage levels, the energy required to transport data in cloud computing can be larger than the amount of energy required to store the data. Image credit: Wikimedia Commons.

Computer scientists in Italy are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting one's sensitive documents on a single remote server. They describe details in the International Journal of Electronic Security and Digital Forensics.

According to Rosario Culmone and Maria Concetta De Vivo of the University of Camerino, technological and regulatory aspects of offer both opportunity and risk. Having one's hosted on remote servers displaces the hardware requirements and makes files accessible to remote users more efficiently. However, there are gaps in security and accessibility of files "in the cloud". The team has now turned to another meteorological metaphor - fog - and has proposed an alternative to cloud storage that makes any given file entirely immaterial rather than locating it on a single server. They envisage a fog of files rather than a cloud.

The files are distributed on a public or private network and and so have no single location, in this way, there is no single server that would be a target for hackers and so only legitimate users can access them. The researchers point out that, "The trend towards outsourcing of services and data on cloud architectures has triggered a number of legal questions on how to manage jurisdiction and who has jurisdiction over data and services in the event of illegal actions." Fog computing would essentially circumvent the security and legal problems putting files off-limits to hackers and beyond the reach of law enforcement and in particular rogue authorities.

"Our proposal is based on this idea of a service which renders information completely immaterial in the sense that for a given period of time there is no place on earth that contains information complete in its entirety," the team says. They explain that the solution is based on a distributed service which we will call "fog" and which uses standard networking protocols in an unconventional way, exploiting "virtual buffers" in internet routers to endlessly relocate data packets without a file ever residing in its entirety on a single computer server. It's as if you were to send a letter with a tracking device but an incomplete address that simply gets sent from post office to post office and is never delivered.

Explore further

Detecting malicious files uploaded to cloud services

More information: Rosario Culmone et al. Vanishing files: protocols and regulations for immaterial documents, International Journal of Electronic Security and Digital Forensics (2017). DOI: 10.1504/IJESDF.2017.081770
Provided by Inderscience
Citation: Is fog more secure than cloud? (2017, March 17) retrieved 16 October 2019 from
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Feedback to editors

User comments

Mar 17, 2017
So how is this monetized and how can it be done without obsoleting the very special interests of the current cloud storage providers and the applications they support?

Mar 18, 2017
So how is this monetized and how can it be done without obsoleting the very special interests of the current cloud storage providers and the applications they support?

I'm sure they'll find a way to declare it illegal by appealing to piracy.

There's a slight problem though, because the data can be destroyed if there's a large enough disruption in the network. Packets get lost all the time anyways. There would also be orphaned and broken data which circles around taking up memory and CPU time, but nobody can access it, nobody even knows it's there, and as time goes more and more data would get lost in this way, so the system kinda needs a "master control" to clean things up every now and then.

And if such master key exists that allows one to examine what's going on in the network and what data is going around, then it can be hacked.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more