Blockchain-based decentralized architecture for cloud storage system

被引:0
作者
Sharma P. [1 ]
Jindal R. [1 ]
Borah M.D. [2 ]
机构
[1] Department of Computer Science and Engineering, Delhi Technological University, Delhi
[2] Department of Computer Science and Engineering, National Institute of Technology Silchar, Assam
来源
Journal of Information Security and Applications | 2021年 / 62卷
关键词
Blockchain; Cloud storage; Decentralized; Integrity; Security;
D O I
10.1016/j.jisa.2021.102970
中图分类号
学科分类号
摘要
Cloud storage system provides on-demand and pay-per-use storage model with low computing cost. However, this storage system suffers from various security risks. Blockchain technology is an advanced technique that stores data in a distributed manner, and the data, once stored, cannot be altered. Therefore, we propose a blockchain-based decentralized architecture for the cloud storage system. The proposed architecture includes access control and integrity checking mechanism to provide a more secure environment. Moreover, it provides four primary services to ensure security features in a cloud storage system: (i) A registration process is designed to register data owners and users using a key generation technique to provide an authentication feature; (ii) The data owners save the user data Meta details in the blockchain structure and set access rules to maintain the authorization feature; (iii) The cloud storage system stores the original data and uses the optimization algorithm to reduce the transaction processing time; (iv) Data owners maintain the data integrity using the Merkle root concept. The experimental results, analysis, and performance evaluation show that our proposed architecture provides a feasible and reliable cloud environment. © 2021 Elsevier Ltd
引用
收藏
相关论文
共 42 条
[1]  
Azhir E., Navimipour N.J., Hosseinzadeh M., Sharifi A., Darwesh A., Query optimization mechanisms in the cloud environments: a systematic study, Int J Commun Syst, 32, 8, (2019)
[2]  
Singh A., Chatterjee K., Cloud security issues and challenges: a survey, J Netw Comput Appl, 79, pp. 88-115, (2017)
[3]  
Shin Y., Koo D., Hur J., A survey of secure data deduplication schemes for cloud storage systems, ACM Comput Surv, 49, 4, pp. 1-38, (2017)
[4]  
Du M., Wang Q., He M., Weng J., Privacy-preserving indexing and query processing for secure dynamic cloud storage, IEEE Trans Inf Forensics Secur, 13, 9, pp. 2320-2332, (2018)
[5]  
Zhang Y., Chen X., Li J., Wong D.S., Li H., You I., Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Inf Sci (Ny), 379, pp. 42-61, (2017)
[6]  
Zhang Y., Zheng D., Deng R.H., Security and privacy in smart health: efficient policy-hiding attribute-based access control, IEEE Internet of Things Journal, 5, 3, pp. 2130-2145, (2018)
[7]  
Kaaniche N., Laurent M., Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms, Comput Commun, 111, pp. 120-141, (2017)
[8]  
Li Y., Gai K., Qiu L., Qiu M., Zhao H., Intelligent cryptography approach for secure distributed big data storage in cloud computing, Inf Sci (Ny), 387, pp. 103-115, (2017)
[9]  
Shen J., Gui Z., Ji S., Shen J., Tan H., Tang Y., Cloudaided lightweight certificateless authentication protocol with anonymity for wireless body area networks, J Netw Comput Appl, 106, pp. 117-123, (2018)
[10]  
Shen J., Wang C., Li T., Chen X., Huang X., Zhan Z.-H., Secure data uploading scheme for a smart home system, Inf Sci (Ny), 453, pp. 186-197, (2018)