A data tamper-proof method of cloud computing platform based on blockchain

被引:0
|
作者
Gao D. [1 ]
Su R. [1 ]
Zhang H. [1 ]
Fu J. [1 ]
Zhang H. [1 ]
机构
[1] Information and Communication Branch, State Grid Fujian Electric Power Co., Ltd.
关键词
blockchain; cloud computing; data tamper-proofing; platform data; realtime;
D O I
10.1504/IJICT.2024.138786
中图分类号
学科分类号
摘要
In order to solve the problems existing in traditional methods such as low tamper-proof success rate, high tamper-proof time and high resource occupation, a data tamper-proof method of cloud computing platform based on blockchain is designed. The differences of data features are obtained according to the number of data spatial dimensions to determine the importance of data features. According to the importance of data features, on the basis of cloud computing platform data denoising processing, the data feature set is constructed to complete feature extraction. Combined with the result of feature extraction, blockchain is used to construct block structure, and the tamper-proof algorithm of cloud computing platform data is designed to ensure the data security of cloud computing platform. The experimental results show that the tamper-proof method designed has a high success rate, low tamper-proof time, low resource occupation, and good practical application effect. © 2024 Inderscience Enterprises Ltd.
引用
收藏
页码:393 / 405
页数:12
相关论文
共 50 条
  • [31] Comprehensively tamper-proof: IEC62443-certified automation platform with OPC UA standard
    Fast, Arno Martin
    Waldeck, Boris
    CIT Plus, 2024, 27 (04) : 30 - 32
  • [33] A Blockchain and Zero Knowledge Proof Based Data Security Transaction Method in Distributed Computing
    Zhang, Bowei
    Pan, Heng
    Li, Kunyang
    Xing, Ying
    Wang, Jiaxiang
    Fan, Dongdong
    Zhang, Wenjie
    ELECTRONICS, 2024, 13 (21)
  • [34] Blockchain as a Platform for Secure Cloud Computing Services
    Tsai, Wang-You
    Chou, Tzu-Chuan
    Chen, Jiann-Liang
    Ma, Yi-Wei
    Huang, Chen-Jui
    2020 22ND INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): DIGITAL SECURITY GLOBAL AGENDA FOR SAFE SOCIETY!, 2020, : 155 - 158
  • [35] Proof of Provision: Improving Blockchain Technology by Cloud Computing
    Pohl, Matthias
    Nahhas, Abdulrahman
    Bosse, Sascha
    Turowski, Klaus
    CLOSER: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2019, : 523 - 527
  • [36] Data storage query and traceability method of electronic certificate based on cloud computing and blockchain
    Chen, Huanying
    Wei, Bo
    Huang, Zhaoji
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2024, 18 (04): : 2643 - 2656
  • [37] Anomaly detection method of power dispatching data based on cloud computing platform
    Jie, Lu
    Liu Xiangxiang
    Li Haoxiang
    2020 INTERNATIONAL CONFERENCE ON BIG DATA & ARTIFICIAL INTELLIGENCE & SOFTWARE ENGINEERING (ICBASE 2020), 2020, : 23 - 26
  • [38] Blockchain localization cloud computing big data application evaluation method
    Xu, Lin
    OPEN COMPUTER SCIENCE, 2023, 13 (01):
  • [39] A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware
    Shin, Ji Sun
    Jo, Minjae
    Hwang, Jung Yeon
    Lee, Jaehwan
    COMPUTER JOURNAL, 2021, 64 (08): : 1293 - 1302
  • [40] SMART: A Secure Magnetoelectric AntifeRromagnet-Based Tamper-Proof Non-Volatile Memory
    Rangarajan, Nikhil
    Patnaik, Satwik
    Knechtel, Johann
    Sinanoglu, Ozgur
    Rakheja, Shaloo
    IEEE ACCESS, 2020, 8 (08): : 76130 - 76142