DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract-Based Access Control, and Hash Authentication Codes for Cloud Security

被引:0
作者
Neela, K. L. [1 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Nagercoil, India
来源
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES | 2024年 / 35卷 / 11期
关键词
access control; cloud; data encryption; Ethereum blockchain; smart contract; MANIPULATION;
D O I
10.1002/ett.70016
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the increasing trend of outsourcing data to cloud services, ensuring data security and privacy has become crucial. Typically, data are stored on cloud servers in encrypted form to mitigate risks. However, accessing the encrypted data requires an access key distributed by a third party. If this third party is untrustworthy, it poses a significant security threat to the system. To address this challenge, we propose a Decentralized Secure Data Outsourcing System (DSDOS) that uses blockchain technology to ensure data security and privacy. The DSDOS system comprises three modules: data security and privacy, access control and authorization, and data integrity and availability. The data security and privacy module uses a hybrid encryption scheme that combines Advanced Encryption Standard (AES), partially homomorphic encryption (PHE), and Diffie-Hellman (DH) to ensure secure data storage and access. The access control and authorization module uses a blockchain-based smart contract system to manage access to the encrypted data. The data integrity and availability module uses hash-based message authentication code (HMAC) to ensure that the data are not tampered with and is always available. We conducted a security and performance analysis of the DSDOS system and found that it outperforms previous schemes in terms of security and performance. The DSDOS system is a secure and privacy-preserving data outsourcing system that can be used to mitigate the security risks associated with traditional cloud storage systems.
引用
收藏
页数:13
相关论文
共 31 条
  • [1] A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
    Alouffi, Bader
    Hasnain, Muhammad
    Alharbi, Abdullah
    Alosaimi, Wael
    Alyami, Hashem
    Ayaz, Muhammad
    [J]. IEEE ACCESS, 2021, 9 : 57792 - 57807
  • [2] [Anonymous], Rinkeby Test Network,
  • [3] Cross-domain access control based on trusted third-party and attribute center
    Bai, Liyang
    Fan, Kai
    Bai, Yuhan
    Cheng, Xiaochun
    Li, Hui
    Yang, Yintang
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 116
  • [4] Analysis of attribute-based cryptographic techniques and their application to protect cloud services
    Belguith, Sana
    Kaaniche, Nesrine
    Hammoudeh, Mohammad
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
  • [5] Bhandari R. R., 2013, International Journal on Recent and Innovation Trends in Computing and Communication, V1, P217
  • [6] Dagher GG, 2020, KNOWL INF SYST, V62, P1923, DOI 10.1007/s10115-019-01405-7
  • [7] docs.soliditylang, Units and Globally Available Variables,
  • [8] Blockchain-based eHealth system for auditable EHRs manipulation in cloud environments
    Huang, Haiping
    Sun, Xiang
    Xiao, Fu
    Zhu, Peng
    Wang, Wenming
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 148 : 46 - 57
  • [9] Blockchain-Based Massive Data Dissemination Handling in IIoT Environment
    Kumari, Aparna
    Tanwar, Sudeep
    Tyagi, Sudhanshu
    Kumar, Neeraj
    [J]. IEEE NETWORK, 2021, 35 (01): : 318 - 325
  • [10] Efficient decentralized access control for secure data sharing in cloud computing
    Liu, Tonglai
    Wu, Jigang
    Li, Jiaxing
    Li, Jingyi
    Li, Yidong
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (17)