DropStore: Revolutionizing Data Backup with Multi Cloud and Fog Computing for Ultimate Privacy
Published 2025-04-14
Keywords
- Multi-Cloud,
- Fog computing,
- data reliability,
- disaster recovery,
- , user privacy
How to Cite
Copyright (c) 2025 D. Bhavya, D Vamsidhar Reddy, B Rama Keerthana, G Datta Sahith, S Sireesha

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
Data backup plays a crucial role in recovery from disasters. Current cloud provide a secure environment, but they do not ensure data privacy when all data is concentrated in a single cloud. An alternative is the adoption of Multi-Cloud technologies. While distributing data across multiple clouds can enhance privacy, it requires the edge device to handle different accounts and facilitate communication with various clouds. These challenges have resulted in limited use of this technology. In this paper, we introduce DropStore, an user-friendly, highly secure, and dependable backup system that utilizes advanced Multi-Cloud and encryption methods. DropStore incorporates an abstraction layer for users, simplifying the system complexities by using a local device called “the Droplet,” which is entirely managed by the user. This design eliminates the need to trust any unreliable third parties. This functionality is made possible through Fog Computing technology. What sets DropStore apart is the integration of Multi-Cloud and Fog Computing principles. The implementation of the system is open source and accessible online. Performance evaluations indicate that the proposed system enhances data protection in terms of reliability, security, and privacy, while offering a straightforward interface with edge devices.
References
- Wang, L., Tao, J., Kunze, M., Castellanos, A. C., Kramer, D., & Karl, W. (2008, September). Scientific cloud computing: Early definition and experience. In Proceedings of the 10th IEEE International Conference on High-Performance Computing and Communications (pp. 825–830).
- Singh, Y., Kandah, F., & Zhang, W. (2011, April). A secured cost-effective multi-cloud storage in cloud computing. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 619–624).
- Habibi, P., Farhoudi, M., Kazemian, S., Khorsandi, S., & Leon-Garcia, A. (2020). Fog computing: A comprehensive architectural survey. IEEE Access, 8, 69105–69133.
- Naha, R. K., et al. (2018). Fog computing: Survey of trends, architectures, requirements, and research directions. IEEE Access, 6, 47980–48009.
- Yi, S., Li, C., & Li, Q. (2015, June). A survey of fog computing: Concepts, applications, and issues. In Proceedings of the Workshop on Mobile Big Data (pp. 37–42). New York, NY, USA.
- Tang, B., et al. (2015). A hierarchical distributed fog computing architecture for big data analysis in smart cities. In ASE BigData SocialInformatics Conference (pp. 1–6). New York, NY, USA.
- Kai, K., Cong, W., & Tao, L. (2016). Fog computing for vehicular ad-hoc networks: Paradigms, scenarios, and issues. Journal of China Universities of Posts and Telecommunications, 23(2), 56–96.
- Zaman, S. U., et al. (2020). Distributed multi-cloud storage system to improve data security with hybrid encryption. In P. Vasant, I. Zelinka, & G.-W. Weber (Eds.), Intelligent Computing and Optimization (pp. 61–74). Cham, Switzerland: Springer.
- Singh, P., Agarwal, N., & Raman, B. (2018). Secure data deduplication using secret sharing schemes over cloud. Future Generation Computer Systems, 88, 156–167.
- Sreekumar, A., & Sundar, S. B. (2009). An efficient secret sharing scheme for n out of n scheme using POB-number system. Hack, 33, 1–88.
- Katz, V. J., et al. (2007). The mathematics of Egypt, Mesopotamia, China, India, and Islam: A sourcebook. London, U.K.: Princeton University Press.
- Ore, O. (1988). Number theory and its history. North Chelmsford, MA, USA: Courier Corporation.
- Leibenger, D., & Sorge, C. (2017, October). Triviback: A storage-efficient secure backup system. In Proceedings of the IEEE 42nd Conference on Local Computer Networks (LCN) (pp. 435–443).
- Leibenger, D., & Sorge, C. (2017, October). SEC-CS: Getting the most out of untrusted cloud storage. In Proceedings of the IEEE 42nd Conference on Local Computer Networks (LCN) (pp. 623–631).
- Pottier, R., & Menaud, J.-M. (2016, June). Trustydrive, a multi-cloud storage service that protects your privacy. In Proceedings of the IEEE 9th International Conference on Cloud Computing (CLOUD) (pp. 937–940).
- Wei, Y., Chen, F., & Sheng, D. C. J. (2017, November). ExpanStor: Multiple cloud storage with dynamic data distribution. In Proceedings of the IEEE 7th International Symposium on Cloud Service Computing (SC) (pp. 85–90).
- Wei, Y., & Chen, F. (2016, August). ExpanCodes: Tailored LDPC codes for big data storage. In Proceedings of the IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing, and Big Data Intelligence and Computing (DASC/PiCom/DataCom/CyberSciTech) (pp. 620–625).
- Subramanian, K., & John, F. L. (2017, February). Dynamic data slicing in multi-cloud storage using cryptographic technique. In Proceedings of the World Congress on Computer and Communication Technologies (WCCCT) (pp. 159–161).
- Moysiadis, V., et al. (2018, September). Towards distributed data management in fog computing. Wireless Communications and Mobile Computing, 2018, 1–14.
- Zhang, J., Bai, W., & Wang, X. (2020). Identity-based data storage scheme with anonymous key generation in fog computing. Soft Computing, 24(8), 5561–5571.
- Confais, B., Lebre, A., & Parrein, B. (2016, December). Performance analysis of object store systems in fog/edge computing infrastructures. In Proceedings of the IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 294–301).
- Monga, S. K., Ramachandra, S. K., & Simmhan, Y. (2019, July). ElfStore: A resilient data storage service for federated edge and fog resources. In Proceedings of the IEEE International Conference on Web Services (ICWS) (pp. 336–345).
- Mayer, R., et al. (2017, October). FogStore: Toward a distributed data store for fog computing. In Proceedings of the IEEE Fog World Congress (FWC) (pp. 1–6).
- Nasr, O. A., Amer, Y., & AboBakr, M. (2018, April). The “droplet”: A new personal device to enable fog computing. In Proceedings of the 3rd International Conference on Fog and Mobile Edge Computing (FMEC) (pp. 93–99).
- OpenPGP. (2020, November 15). Retrieved from https://www.openpgp.org
- SFTP. (2020, November 15). Retrieved from https://www.ssh.com/ssh/sftp/
- Natarajan, R. (2020, December 1). How to Setup Chroot SFTP in Linux. Retrieved from https://www.thegeekstuff.com/2012/03/chroot-sftp-setup/
- Duplicity. (2020, November 15). Retrieved from https://gitlab.com/duplicity/duplicity
- Raspberry Pi Foundation. (2020, November 15). Raspberry Pi 3 Model B. Retrieved from https://www.raspberrypi.org/products/raspberry-pi-3-model-b/
- Ahmed, S. T., Kaladevi, A. C., Shankar, A., & Alqahtani, F. (2025). Privacy Enhanced Edge-AI Healthcare Devices Authentication: A Federated Learning Approach. IEEE Transactions on Consumer Electronics.
- Singh, K. D., & Ahmed, S. T. (2020, July). Systematic linear word string recognition and evaluation technique. In 2020 international conference on communication and signal processing (ICCSP) (pp. 0545-0548). IEEE.
- Syed Thouheed Ahmed, S., Sandhya, M., & Shankar, S. (2018, August). ICT’s role in building and understanding indian telemedicine environment: A study. In Information and Communication Technology for Competitive Strategies: Proceedings of Third International Conference on ICTCS 2017 (pp. 391-397). Singapore: Springer Singapore.
- Sreedhar Kumar, S., Ahmed, S. T., & NishaBhai, V. B. (2019). Type of supervised text classification system for unstructured text comments using probability theory technique. International Journal of Recent Technology and Engineering (IJRTE), 8(10).
- Ahmed, S. T., Basha, S. M., Arumugam, S. R., & Kodabagi, M. M. (2021). Pattern Recognition: An Introduction. MileStone Research Publications.