Decentralizing Privacy Implementation at Cloud Storage Using Blockchain-Based Hybrid Algorithm

被引:15
作者
Darwish, Marwan Adnan [1 ]
Yafi, Eiad [1 ]
Al Ghamdi, Mohammed A. [2 ]
Almasri, Abdullah [3 ]
机构
[1] Univ Kuala Lumpur, Malaysian Inst Informat Technol, Kuala Lumpur, Malaysia
[2] Umm Al Qura Univ, Comp Sci Dept, Mecca, Saudi Arabia
[3] Unitar Int Univ, Kuala Lumpur, Malaysia
关键词
Blockchain; Cloud storage; Data privacy; Hybrid encryption; SECURITY;
D O I
10.1007/s13369-020-04394-w
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud computing (CC) is a distributed and centralized network of interconnected and interrelated systems that has emerged as an area of incredible impact, potential, and growth in the IT domain. In the last few years, this paradigm has thrived to become the fastest evolutionary segment for business and various industries. Despite the many advantages provided by the cloud, serious challenges related to privacy and security have arisen such as privacy exposure, data loss, manipulation, service-level agreement (SLA) violation, and concerns over the service and deployment models. In this article, a blockchain-based hybrid algorithm is proposed to tackle the privacy inefficiency of existing tools. A novel hybrid technique is used to encrypt data ahead of outsourcing it to data centers, and a unique digital signature is generated at clients and stored on a decentralized set of blocks. A virtual cloud similar to actual cloud service infrastructure was built to test the proposed framework. Despite the additional computational powers needed to run the proposed framework due to blockchain integration, the results show that data integrity and reliability are preserved and user's privacy is increased. Our results are discussed and benchmarked against the standard privacy tests standards such as changes in the stored data, the negligible overheads on cloud performance, and the data records of the blockchain structure.
引用
收藏
页码:3369 / 3378
页数:10
相关论文
共 21 条
[1]   Performance Analysis of POX and Ryu with Different SDN Topologies [J].
Ali, Jehad ;
Lee, Seungwoon ;
Roh, Byeong-hee .
PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEM (ICISS 2018), 2018, :244-249
[2]  
[Anonymous], 2018, 2018 6 INT C CYB IT, DOI [DOI 10.1109/CITSM.2018.8674368, 10.1109/ICTSS.2018.8549983, DOI 10.1109/ICTSS.2018.8549983]
[3]  
DARWISH M, 2018, J ENG APPL SCI, V14, P6525
[4]  
Darwish MA, 2018, INT J ENG TECHNOL, V7, P239
[5]  
Gajra N., 2014, 2014 INT C ADV COMM, P1, DOI DOI 10.1109/EIC.2015.7230712
[6]   Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems [J].
Guo, Rui ;
Shi, Huixian ;
Zhao, Qinglan ;
Zheng, Dong .
IEEE ACCESS, 2018, 6 :11676-11686
[7]   Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms [J].
Kaaniche, Nesrine ;
Laurent, Maryline .
COMPUTER COMMUNICATIONS, 2017, 111 :120-141
[8]  
Kolodziej Joanna, 2018, EUR CYBERSECUR J, P28
[9]   ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability [J].
Liang, Xueping ;
Shetty, Sachin ;
Tosh, Deepak ;
Kamhoua, Charles ;
Kwiat, Kevin ;
Njilla, Laurent .
2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, :468-477
[10]  
Liu L, 2018, 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), P380, DOI 10.1109/ICCCBDA.2018.8386546