A data tamper-proof method of cloud computing platform based on blockchain

被引:0
|
作者
Gao D. [1 ]
Su R. [1 ]
Zhang H. [1 ]
Fu J. [1 ]
Zhang H. [1 ]
机构
[1] Information and Communication Branch, State Grid Fujian Electric Power Co., Ltd.
关键词
blockchain; cloud computing; data tamper-proofing; platform data; realtime;
D O I
10.1504/IJICT.2024.138786
中图分类号
学科分类号
摘要
In order to solve the problems existing in traditional methods such as low tamper-proof success rate, high tamper-proof time and high resource occupation, a data tamper-proof method of cloud computing platform based on blockchain is designed. The differences of data features are obtained according to the number of data spatial dimensions to determine the importance of data features. According to the importance of data features, on the basis of cloud computing platform data denoising processing, the data feature set is constructed to complete feature extraction. Combined with the result of feature extraction, blockchain is used to construct block structure, and the tamper-proof algorithm of cloud computing platform data is designed to ensure the data security of cloud computing platform. The experimental results show that the tamper-proof method designed has a high success rate, low tamper-proof time, low resource occupation, and good practical application effect. © 2024 Inderscience Enterprises Ltd.
引用
下载
收藏
页码:393 / 405
页数:12
相关论文
共 50 条
  • [21] SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance
    Fernando, Dinuni
    Kulshrestha, Siddharth
    Herath, J. Dinal
    Mahadik, Nitin
    Ma, Yanzhe
    Bai, Changxin
    Yang, Ping
    Yan, Guanhua
    Lu, Shiyong
    2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, : 81 - 90
  • [22] Cloud computing data privacy protection method based on blockchain
    He, Yingjun
    Ouyang, Wenhui
    Li, Shaolong
    Wang, Lin
    Zhou, Jing
    Su, Wenwei
    Li, Shenzhang
    Mei, Donghui
    Shi, Yan
    Jin, Yanxu
    Li, Chenglin
    Ren, Yonghui
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 480 - 492
  • [23] Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform
    Guo, Xiangmin
    Liang, Guangjun
    Liu, Jiayin
    Chen, Xianyi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (03): : 3305 - 3323
  • [24] Proof of cloud data integrity based on blockchain
    Yu, Mingliang
    Wang, Gang
    Liu, Zengzhi
    Li, Jinsong
    Wang, Yingtong
    Peng, Zhen
    Zhou, Gang
    2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 16 - 24
  • [25] Blockchain Privacy Data Access Control Method Based on Cloud Platform Data
    Sun, Biying
    Dang, Qian
    Qiu, Yu
    Yan, Lei
    Du, Chunhui
    Liu, Xiaoqin
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (06) : 10 - 17
  • [26] A PCA-based watermarking scheme for tamper-proof of web pages
    Zhao, QJ
    Lu, HT
    PATTERN RECOGNITION, 2005, 38 (08) : 1321 - 1323
  • [27] Tamper-proof image watermarking, based on existing public key infrastructure
    Kazakeviciute, G
    Januskevicius, E
    Rosenbaum, R
    Schumann, H
    INFORMATICA, 2005, 16 (01) : 75 - 92
  • [28] EthMB plus : A Tamper-Proof Data Query Model Based on B plus Tree and Merkle Tree
    Du, Pengting
    Liu, Yingjian
    Li, Yue
    Yin, Haoyu
    BLOCKCHAIN TECHNOLOGY AND APPLICATION, CBCC 2022, 2022, 1736 : 49 - 59
  • [29] Watchword-Oriented and Time-Stamped Algorithms for Tamper-Proof Cloud Provenance Cognition
    Imran, Asif
    Nahar, Nadia
    Sakib, Kazi
    2014 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2014,
  • [30] Comprehensively tamper-proof: IEC62443-certified automation platform with OPC UA standard
    Fast, Arno Martin
    Waldeck, Boris
    CIT Plus, 2024, 27 (04) : 30 - 32