Blockchain-based decentralized architecture for cloud storage system

被引:0
作者
Sharma P. [1 ]
Jindal R. [1 ]
Borah M.D. [2 ]
机构
[1] Department of Computer Science and Engineering, Delhi Technological University, Delhi
[2] Department of Computer Science and Engineering, National Institute of Technology Silchar, Assam
来源
Journal of Information Security and Applications | 2021年 / 62卷
关键词
Blockchain; Cloud storage; Decentralized; Integrity; Security;
D O I
10.1016/j.jisa.2021.102970
中图分类号
学科分类号
摘要
Cloud storage system provides on-demand and pay-per-use storage model with low computing cost. However, this storage system suffers from various security risks. Blockchain technology is an advanced technique that stores data in a distributed manner, and the data, once stored, cannot be altered. Therefore, we propose a blockchain-based decentralized architecture for the cloud storage system. The proposed architecture includes access control and integrity checking mechanism to provide a more secure environment. Moreover, it provides four primary services to ensure security features in a cloud storage system: (i) A registration process is designed to register data owners and users using a key generation technique to provide an authentication feature; (ii) The data owners save the user data Meta details in the blockchain structure and set access rules to maintain the authorization feature; (iii) The cloud storage system stores the original data and uses the optimization algorithm to reduce the transaction processing time; (iv) Data owners maintain the data integrity using the Merkle root concept. The experimental results, analysis, and performance evaluation show that our proposed architecture provides a feasible and reliable cloud environment. © 2021 Elsevier Ltd
引用
收藏
相关论文
共 42 条
[11]  
(2020)
[12]  
Kofahi N.A., Al-Rabadi A.R., Identifying the top threats in cloud computing and its suggested solutions: a survey, Networks, 6, 1, pp. 1-13, (2018)
[13]  
(2008)
[14]  
Meng W., Tischhauser E., Wang Q., Wang Y., Han J., When intrusion detection meets blockchain technology: a review, IEEE Access, 6, pp. 10179-10188, (2018)
[15]  
Lin Q., Yan H., Huang Z., Chen W., Shen J., Tang Y., An id-based linearly homomorphic signature scheme and its application in blockchain, IEEE Access, 6, pp. 20632-20640, (2018)
[16]  
Parameswaran M., Susarla A., Whinston A.B., P2P networking: an information sharing alternative, Computer (Long Beach Calif), 34, 7, pp. 31-38, (2001)
[17]  
Wang C., Ren K., Wang J., Secure optimization computation outsourcing in cloud computing: a case study of linear programming, IEEE Trans Comput, 65, 1, pp. 216-229, (2016)
[18]  
Xu C., Wang K., Guo M., Intelligent resource management in blockchain-based cloud datacenters, IEEE Cloud Computing, 4, 6, pp. 50-59, (2017)
[19]  
Park J.H., Park J.H., Blockchain security in cloud computing: use cases, challenges and solutions, Symmetry (Basel), 9, 8, pp. 1-13, (2017)
[20]  
Yu G., Wang X., Yu K., Ni W., Zhang J.A., Liu R.P., Survey: sharding in blockchains, IEEE Access, 8, pp. 14155-14181, (2020)