An intelligent blockchain-based cryptographic data security model for an efficient data sharing in cloud

被引:1
作者
Ramya, Ponnada Naga [1 ]
Reddy, I. Ravi Prakash [1 ]
Supreethi, K.P. [2 ]
机构
[1] Department of Information Technology, G. Narayanamma Institute of Technology and Science (For Women), Hyderabad
[2] Department of Computer Science and Engineering, JNTUH UCEST, Hyderabad
关键词
blockchain; cloud systems; cryptography; data security; decryption; encryption; transactions;
D O I
10.1504/IJCC.2024.142202
中图分类号
学科分类号
摘要
Secure data sharing is the most challenging and essential problem to be addressed in cloud systems. In traditional works, various blockchain and cryptographic approaches are deployed for enabling secured data storage and retrieval in cloud platform. However, the conventional frameworks require third-party entities for user authentication, data verification, and identity management. In our proposed work, an intelligent blockchain-based cryptographic data security (IBCDS) scheme is developed, where no third-party auditor is required for authentication and validation for secured data sharing over cloud systems with minimal overhead and computational complexity. In IBCDS, blockchain acts like user management system that stores information of each cloud user in the form of transactions by assuring reliability and integrity of each transaction along with tamper-proof. During analysis, IBCDS mechanism is evaluated and compared by using different parameters where security performance is improved to 99%, time complexity reduced to 98%, and overall throughput is maximised to 99%. Copyright © 2024 Inderscience Enterprises Ltd.
引用
收藏
页码:405 / 424
页数:19
相关论文
共 39 条
[1]  
Agyekum K.O-B.O., Xia Q., Sifah E.B., Cobblah C.N.A., Xia H., Gao J., A proxy re-encryption approach to secure data sharing in the Internet of things based on blockchain, IEEE Systems Journal, 16, pp. 1685-1696, (2021)
[2]  
Alhalabi W., Al-Rasheed A., Manoharan H., Alabdulkareem E., Alduailij M., Alduailij M., Et al., Distinctive measurement scheme for security and privacy in internet of things applications using machine learning algorithms, Electronics, 12, (2023)
[3]  
Almutairi S., Alghanmi N., Monowar M.M., Survey of centralized and decentralized access control models in cloud computing, International Journal of Advanced Computer Science and Applications, 12, (2021)
[4]  
Aluvalu R., Uma Maheswari V., Chennam K.K., Shitharth S., Data security in cloud computing using Abe-based access control, Architectural Wireless Networks Solutions and Security Issues, pp. 47-61, (2021)
[5]  
Chen Y., Meng L., Zhou H., Xue G., A blockchain-based medical data sharing mechanism with attribute-based access control and privacy protection, Wireless Communications and Mobile Computing, 2021, (2021)
[6]  
Chennam K.K., Aluvalu R., Shitharth S., An authentication model with high security for cloud database, Architectural Wireless Networks Solutions and Security Issues, pp. 13-25, (2021)
[7]  
Chennam K.K., Aluvalu R., Uma Maheswari V., Data encryption on cloud database using quantum computing for key distribution, Machine Learning and Information Processing: Proceedings of ICMLIP 2020, pp. 309-317, (2021)
[8]  
Dwivedi S.K., Roy P., Karda C., Agrawal S., Amin R., Blockchain-based internet of things and industrial IoT: a comprehensive survey, Security and Communication Networks, 2021, (2021)
[9]  
Ezhil Arasi V., Indra Gandhi K., Kulothungan K., Auditable attribute-based data access control using blockchain in cloud storage, The Journal of Supercomputing, 78, pp. 10772-10798, (2022)
[10]  
Ezhilarasi T., Sudheer Kumar N., Latchoumi T., Balayesu N., A secure data sharing using IDSS CP-ABE in cloud storage, Advances in Industrial Automation and Smart Manufacturing, pp. 1073-1085, (2021)