An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain

被引:22
|
作者
Awadallah, Ruba [1 ]
Samsudin, Azman [1 ]
Teh, Je Sen [1 ]
Almazrooie, Mishal [1 ]
机构
[1] Univ Sains Malaysia, Sch Comp Sci, George Town 11800, Malaysia
关键词
Cloud computing; Cryptography; Security; Encryption; Blockchain; Distributed databases; Data integrity; cloud computing; data integrity; homomorphic encryption; ISSUES;
D O I
10.1109/ACCESS.2021.3077123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its wide accessibility, cloud services are susceptible to attacks. Data manipulation is a serious threat to data integrity which can occur in cloud computing - a relatively new offering under the umbrella of cloud services. Data can be tampered with, and malicious actors could use this to their advantage. Cloud computing clients in various application domains want to be assured that their data is accurate and trustworthy. On another spectrum, blockchain is a tamper-proof digital ledger that can be used alongside cloud technology to provide a tamper-proof cloud computing environment. This paper proposes a scheme that combines cloud computing with blockchain that assures data integrity for all homomorphic encryption schemes. To overcome the cloud service provider's (CSP) ultimate authority over the data, the proposed scheme relies on the Byzantine Fault Tolerance consensus to build a distributed network of processing CSPs based on the client requirements. After certain computations performed by all CSPs, they produce a master hash value for their database. To ensure immutable data is produced, master hash values are preserved in Bitcoin or Ethereum blockchain networks. The master hash values can be obtained by tracking the block header address for verification purposes. A theoretical analysis of the overhead costs associated with creating master hash values for each of the cryptocurrencies is presented. We found that Ethereum leads to lower client financial costs and better online performance than Bitcoin. We also specify the data security requirements the proposed scheme provides, the ground-level implementation, and future work. The proposed verification scheme is based on public cryptocurrency as a back-end service and does not require additional setup actions by the client other than a wallet for the chosen cryptocurrency.
引用
收藏
页码:69513 / 69526
页数:14
相关论文
共 50 条
  • [1] Blockchain Based Cloud Computing: Architecture and Research Challenges
    Murthy, Ch. V. N. U. Bharathi
    Shri, M. Lawanya
    Kadry, Seifedine
    Lim, Sangsoon
    [J]. IEEE ACCESS, 2020, 8 : 205190 - 205205
  • [2] A NOVEL BASED SECURITY ARCHITECTURE OF CLOUD COMPUTING
    Gupta, Subham Kumar
    Rawat, Seema
    Kumar, Praveen
    [J]. 2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [3] A security architecture of VANET based on blockchain and mobile edge computing
    Zhang, XiaoDong
    Li, Ru
    Cui, Bo
    [J]. PROCEEDINGS OF 2018 1ST IEEE INTERNATIONAL CONFERENCE ON HOT INFORMATION-CENTRIC NETWORKING (HOTICN 2018), 2018, : 258 - 259
  • [4] Blockchain-based Security Architecture for Distributed Cloud Storage
    Li, Jiaxing
    Liu, Zhusong
    Chen, Long
    Chen, Pinghua
    Wu, Jigang
    [J]. 2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 408 - 411
  • [5] A Blockchain-Based Computing Architecture for Mobile Ad Hoc Cloud
    Jiao, Zhenzhen
    Zhang, Baoxian
    Zhang, Li
    Liu, Min
    Gong, Wei
    Li, Cheng
    [J]. IEEE NETWORK, 2020, 34 (04): : 140 - 149
  • [6] Mobile cloud computing: Architecture and Security
    Wang, Suzhen
    Du, Zhijuan
    [J]. MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2274 - 2281
  • [7] A security architecture for cloud computing alliance
    [J]. Jun, Zhao (hyzhaojun@126.com), 2017, Bentham Science Publishers (10):
  • [8] Contribution to Cloud Computing Security Architecture
    Drozdova, M.
    Rusnak, S.
    Segec, P.
    Uramova, J.
    Moravcik, M.
    [J]. 2017 15TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2017), 2017, : 117 - 122
  • [9] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    [J]. 2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +
  • [10] Towards Cloud Computing and Blockchain Integrated Applications
    Coutinho, Emanuel F.
    Paulo, Diogo Eliseu
    Abreu, Antonio Welligton
    Bezerra, Carla I. M.
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2020), 2020, : 139 - 142