Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment

被引:1
作者
Ramachandran, A. [1 ]
Ramadevi, P. [2 ]
Alkhayyat, Ahmed [3 ]
Yousif, Yousif Kerrar [4 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Panruti 607106, India
[2] Anna Univ, Univ Coll Engn, Dept Elect & Commun Engn, BIT Campus, Tiruchirapalli 620025, India
[3] Islamic Univ, Coll Tech Engn, Najaf, Iraq
[4] Al Hadba Univ Coll, Dept Comp Tech Engn, Mosul, Iraq
关键词
Blockchain; security; data integrity; authentication; cloud computing; signature; hash tree; MANAGEMENT; EFFICIENT; SCHEME;
D O I
10.32604/iasc.2023.032942
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud, public cloud, community cloud and private cloud. Though cloud-based computing solutions are highly con-venient to the users, it also brings a challenge i.e., security of the data shared. Hence, in current research paper, blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentica-tion process. Blockchain technology is utilized in this study to enable efficient and secure operation which not only empowers cloud security but also avoids threats and attacks. Additionally, the data integrity authentication technique is also uti-lized to limit the unwanted access of data in cloud storage unit. The major objec-tive of the projected technique is to empower data security and user authentication in cloud computing environment. To improve the proposed authentication pro-cess, cuckoo filter and Merkle Hash Tree (MHT) are utilized. The proposed meth-odology was validated using few performance metrics such as processing time, uploading time, downloading time, authentication time, consensus time, waiting time, initialization time, in addition to storage overhead. The proposed method was compared with conventional cloud security techniques and the outcomes establish the supremacy of the proposed method.
引用
收藏
页码:2055 / 2070
页数:16
相关论文
共 25 条
[1]   Hybridization of firefly and Improved Multi-Objective Particle Swarm Optimization algorithm for energy efficient load balancing in Cloud Computing environments [J].
Devaraj, A. Francis Saviour ;
Elhoseny, Mohamed ;
Dhanasekaran, S. ;
Lydia, E. Laxmi ;
Shankar, K. .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 142 :36-45
[2]  
Guo J., 2020, 2020 IEEE INT C SMAR, P1
[3]   A Novel Method to Enhance Sustainable Systems Security in Cloud Computing Based on the Combination of Encryption and Data Mining [J].
He, Qian ;
He, Hong .
SUSTAINABILITY, 2021, 13 (01) :1-17
[4]   Multi-Layer Blockchain-Based Security Architecture for Internet of Things [J].
Honar Pajooh, Houshyar ;
Rashid, Mohammad ;
Alam, Fakhrul ;
Demidenko, Serge .
SENSORS, 2021, 21 (03) :1-26
[5]   An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications [J].
Jegadeesan, Subramani ;
Azees, Maria ;
Kumar, Priyan Malarvizhi ;
Manogaran, Gunasekaran ;
Chilamkurti, Naveen ;
Varatharajan, R. ;
Hsu, Ching-Hsien .
SUSTAINABLE CITIES AND SOCIETY, 2019, 49
[6]   Trust management in a blockchain based fog computing platform with trustless smart oracles [J].
Kochovski, Petar ;
Gec, Sandi ;
Stankovski, Vlado ;
Bajec, Marko ;
Drobintsev, Pavel D. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 :747-759
[7]  
Kohavi R., 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P202
[8]   An efficient radix trie-based semantic visual indexing model for large-scale image retrieval in cloud environment [J].
Krishnaraj, N. ;
Elhoseny, Mohamed ;
Lydia, E. Laxmi ;
Shankar, K. ;
ALDabbas, Omar .
SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (03) :489-502
[9]   An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing [J].
Kumar, Vinod ;
Jangirala, Srinivas ;
Ahmad, Musheer .
JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (08)
[10]   Collusion resistant secret sharing scheme for secure data storage and over cloud [J].
Lakshmi, V. S. ;
Deepthi, S. ;
Deepthi, P. P. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60