A data tamper-proof method of cloud computing platform based on blockchain

被引:0
|
作者
Gao D. [1 ]
Su R. [1 ]
Zhang H. [1 ]
Fu J. [1 ]
Zhang H. [1 ]
机构
[1] Information and Communication Branch, State Grid Fujian Electric Power Co., Ltd.
关键词
blockchain; cloud computing; data tamper-proofing; platform data; realtime;
D O I
10.1504/IJICT.2024.138786
中图分类号
学科分类号
摘要
In order to solve the problems existing in traditional methods such as low tamper-proof success rate, high tamper-proof time and high resource occupation, a data tamper-proof method of cloud computing platform based on blockchain is designed. The differences of data features are obtained according to the number of data spatial dimensions to determine the importance of data features. According to the importance of data features, on the basis of cloud computing platform data denoising processing, the data feature set is constructed to complete feature extraction. Combined with the result of feature extraction, blockchain is used to construct block structure, and the tamper-proof algorithm of cloud computing platform data is designed to ensure the data security of cloud computing platform. The experimental results show that the tamper-proof method designed has a high success rate, low tamper-proof time, low resource occupation, and good practical application effect. © 2024 Inderscience Enterprises Ltd.
引用
下载
收藏
页码:393 / 405
页数:12
相关论文
共 50 条
  • [32] Blockchain as a Platform for Secure Cloud Computing Services
    Tsai, Wang-You
    Chou, Tzu-Chuan
    Chen, Jiann-Liang
    Ma, Yi-Wei
    Huang, Chen-Jui
    2020 22ND INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): DIGITAL SECURITY GLOBAL AGENDA FOR SAFE SOCIETY!, 2020, : 155 - 158
  • [33] Proof of Provision: Improving Blockchain Technology by Cloud Computing
    Pohl, Matthias
    Nahhas, Abdulrahman
    Bosse, Sascha
    Turowski, Klaus
    CLOSER: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2019, : 523 - 527
  • [34] Anomaly detection method of power dispatching data based on cloud computing platform
    Jie, Lu
    Liu Xiangxiang
    Li Haoxiang
    2020 INTERNATIONAL CONFERENCE ON BIG DATA & ARTIFICIAL INTELLIGENCE & SOFTWARE ENGINEERING (ICBASE 2020), 2020, : 23 - 26
  • [35] Blockchain localization cloud computing big data application evaluation method
    Xu, Lin
    OPEN COMPUTER SCIENCE, 2023, 13 (01):
  • [36] A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware
    Shin, Ji Sun
    Jo, Minjae
    Hwang, Jung Yeon
    Lee, Jaehwan
    COMPUTER JOURNAL, 2021, 64 (08): : 1293 - 1302
  • [37] SMART: A Secure Magnetoelectric AntifeRromagnet-Based Tamper-Proof Non-Volatile Memory
    Rangarajan, Nikhil
    Patnaik, Satwik
    Knechtel, Johann
    Sinanoglu, Ozgur
    Rakheja, Shaloo
    IEEE ACCESS, 2020, 8 (08): : 76130 - 76142
  • [38] A lightweight fragile audio watermarking method using nested hashes for self-authentication and tamper-proof
    AlSabhany A.A.
    Ali A.H.
    Alsaadi M.
    Multimedia Tools and Applications, 2024, 83 (41) : 89135 - 89149
  • [39] Fine-grained Access Control Method for Blockchain Data Sharing based on Cloud Platform Big Data
    Qiu, Yu
    Sun, Biying
    Dang, Qian
    Du, Chunhui
    Li, Na
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (10) : 24 - 31
  • [40] Integrity Audit Method for Cloud Data Based on Blockchain
    Qi, Hui
    Li, Hang
    Huang, Shuwen
    Li, Peipei
    Dai, Weiyi
    Wang, Chunbo
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 652 - 659