Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 4/2020

14.02.2020 | Research Article-Computer Engineering and Computer Science

Decentralizing Privacy Implementation at Cloud Storage Using Blockchain-Based Hybrid Algorithm

verfasst von: Marwan Adnan Darwish, Eiad Yafi, Mohammed A. Al Ghamdi, Abdullah Almasri

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing (CC) is a distributed and centralized network of interconnected and interrelated systems that has emerged as an area of incredible impact, potential, and growth in the IT domain. In the last few years, this paradigm has thrived to become the fastest evolutionary segment for business and various industries. Despite the many advantages provided by the cloud, serious challenges related to privacy and security have arisen such as privacy exposure, data loss, manipulation, service-level agreement (SLA) violation, and concerns over the service and deployment models. In this article, a blockchain-based hybrid algorithm is proposed to tackle the privacy inefficiency of existing tools. A novel hybrid technique is used to encrypt data ahead of outsourcing it to data centers, and a unique digital signature is generated at clients and stored on a decentralized set of blocks. A virtual cloud similar to actual cloud service infrastructure was built to test the proposed framework. Despite the additional computational powers needed to run the proposed framework due to blockchain integration, the results show that data integrity and reliability are preserved and user’s privacy is increased. Our results are discussed and benchmarked against the standard privacy tests standards such as changes in the stored data, the negligible overheads on cloud performance, and the data records of the blockchain structure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kaaniche, N.; Laurent, M.: Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 111, 120–141 (2017)CrossRef Kaaniche, N.; Laurent, M.: Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 111, 120–141 (2017)CrossRef
2.
Zurück zum Zitat Urrehman, H.; Yafi, E.; Nazir, M.; Mustafa, K.: Security assurance against cybercrime ransomware. In: International Conference on Intelligent Computing and Optimization, pp. 21–34 (2018) Urrehman, H.; Yafi, E.; Nazir, M.; Mustafa, K.: Security assurance against cybercrime ransomware. In: International Conference on Intelligent Computing and Optimization, pp. 21–34 (2018)
4.
Zurück zum Zitat Sahmim, S.; Gharsellaoui, H.: Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review. Procedia Comput. Sci. 112, 1516–1522 (2017)CrossRef Sahmim, S.; Gharsellaoui, H.: Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review. Procedia Comput. Sci. 112, 1516–1522 (2017)CrossRef
5.
Zurück zum Zitat Modi, C.; Patel, D.; Borisaniya, B.; Patel, A.; Rajarajan, M.: A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63(2), 561–592 (2013)CrossRef Modi, C.; Patel, D.; Borisaniya, B.; Patel, A.; Rajarajan, M.: A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63(2), 561–592 (2013)CrossRef
6.
Zurück zum Zitat Darwish, M.; Yafi, E.; Zuhairi, M.F.; Almasri, A.: Privacy and security of cloud computing: a comprehensive review of techniques and challenges. Int. J. Eng. Technol. 7, 239–246 (2018) Darwish, M.; Yafi, E.; Zuhairi, M.F.; Almasri, A.: Privacy and security of cloud computing: a comprehensive review of techniques and challenges. Int. J. Eng. Technol. 7, 239–246 (2018)
7.
Zurück zum Zitat Mishra, B.; Jena, D.: Securing files in the cloud. In: 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp. 40–45. IEEE (2016) Mishra, B.; Jena, D.: Securing files in the cloud. In: 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp. 40–45. IEEE (2016)
8.
Zurück zum Zitat Liang, X.; Shetty, S.; Tosh, D.; Kamhoua, C.; Kwiat, K.; Njilla, L.: Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 468–477. IEEE Press (2017) Liang, X.; Shetty, S.; Tosh, D.; Kamhoua, C.; Kwiat, K.; Njilla, L.: Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 468–477. IEEE Press (2017)
9.
Zurück zum Zitat Zikratov, I.; Kuzmin, A.; Akimenko, V.; Niculichev, V.; Yalansky, L.: Ensuring data integrity using blockchain technology. In: 2017 20th Conference of Open Innovations Association (FRUCT), pp. 534–539. IEEE (2017) Zikratov, I.; Kuzmin, A.; Akimenko, V.; Niculichev, V.; Yalansky, L.: Ensuring data integrity using blockchain technology. In: 2017 20th Conference of Open Innovations Association (FRUCT), pp. 534–539. IEEE (2017)
10.
Zurück zum Zitat Rashvand, H.; Salah, K.; Calero, J.H.: Distributed security for multi-agent systems–review and applications. In: 2010 IET Information Security, pp. 188–201. IET (2010) Rashvand, H.; Salah, K.; Calero, J.H.: Distributed security for multi-agent systems–review and applications. In: 2010 IET Information Security, pp. 188–201. IET (2010)
11.
Zurück zum Zitat Gajra, N.; Khan, S.S.; Rane, P.: Private cloud security: secured user authentication by using enhanced hybrid algorithm. In: 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014), pp. 1–6. IEEE (2014) Gajra, N.; Khan, S.S.; Rane, P.: Private cloud security: secured user authentication by using enhanced hybrid algorithm. In: 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014), pp. 1–6. IEEE (2014)
12.
Zurück zum Zitat Liu, L.; Xu, B.: Research on information security technology based on blockchain. In: 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 380–384. IEEE (2018) Liu, L.; Xu, B.: Research on information security technology based on blockchain. In: 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 380–384. IEEE (2018)
13.
Zurück zum Zitat Sartekin, R.A.; Karabacak, E.; Durgay, Z.; Karaarslan, E.: Blockchain based secure communication application proposal: Cryptouch. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1–4. IEEE (2018) Sartekin, R.A.; Karabacak, E.; Durgay, Z.; Karaarslan, E.: Blockchain based secure communication application proposal: Cryptouch. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1–4. IEEE (2018)
14.
Zurück zum Zitat Guo, R.; Shi, H.; Zhao, Q.; Zheng, D.: Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access 6, 11676–11686 (2018)CrossRef Guo, R.; Shi, H.; Zhao, Q.; Zheng, D.: Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access 6, 11676–11686 (2018)CrossRef
15.
Zurück zum Zitat Sukhodolskiy, I.; Zapechnikov, S.: A blockchain-based access control system for cloud storage. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 1575–1578. IEEE (2018) Sukhodolskiy, I.; Zapechnikov, S.: A blockchain-based access control system for cloud storage. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 1575–1578. IEEE (2018)
16.
Zurück zum Zitat Rifi, N.; Rachkidi, E.; Agoulmine, N. Taher: Towards using blockchain technology for iot data access protection. In: IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1–5. IEEE (2017) Rifi, N.; Rachkidi, E.; Agoulmine, N. Taher: Towards using blockchain technology for iot data access protection. In: IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1–5. IEEE (2017)
17.
Zurück zum Zitat Darwish, M.; Yafi, E.; Habib, R.; Al-Ghamdi, M.: A blockchain-based hybrid algorithm for data privacy at cloud storage. J. Eng. Appl. Sci. 14(17), 6525–6532 (2018) Darwish, M.; Yafi, E.; Habib, R.; Al-Ghamdi, M.: A blockchain-based hybrid algorithm for data privacy at cloud storage. J. Eng. Appl. Sci. 14(17), 6525–6532 (2018)
18.
Zurück zum Zitat Puthal, D.; Malik, N.; Mohanty, S.P.; Kougianos, E.; Yang, C.: The blockchain as a decentralized security framework [future directions]. IEEE Consum. Electron. Magaz. 7(2), 18–21 (2018)CrossRef Puthal, D.; Malik, N.; Mohanty, S.P.; Kougianos, E.; Yang, C.: The blockchain as a decentralized security framework [future directions]. IEEE Consum. Electron. Magaz. 7(2), 18–21 (2018)CrossRef
19.
Zurück zum Zitat Ali, J.; Khalid, A.; Yafi, E.; Musa, S.; Ahmed, W.: Towards a secure behavior modeling for IOT networks using blockchain. In: ICAI Workshops, pp. 244–258 (2019) Ali, J.; Khalid, A.; Yafi, E.; Musa, S.; Ahmed, W.: Towards a secure behavior modeling for IOT networks using blockchain. In: ICAI Workshops, pp. 244–258 (2019)
20.
Zurück zum Zitat Kołodziej Wilczynski, F.C.; Fernandez-Montes, D.: Blockchain secure cloud: a new generation integrated cloud and blockchain platforms–general concepts and challenges. Eur. Cybersecur. J. 4(2), 28–35 (2018) Kołodziej Wilczynski, F.C.; Fernandez-Montes, D.: Blockchain secure cloud: a new generation integrated cloud and blockchain platforms–general concepts and challenges. Eur. Cybersecur. J. 4(2), 28–35 (2018)
21.
Zurück zum Zitat Subha, T.; Jayashri, S.: Efficient privacy preserving integrity checking model for cloud data storage security. In: 2016 Eighth International Conference on Advanced Computing (ICoAC), pp. 55–60. IEEE (2017) Subha, T.; Jayashri, S.: Efficient privacy preserving integrity checking model for cloud data storage security. In: 2016 Eighth International Conference on Advanced Computing (ICoAC), pp. 55–60. IEEE (2017)
Metadaten
Titel
Decentralizing Privacy Implementation at Cloud Storage Using Blockchain-Based Hybrid Algorithm
verfasst von
Marwan Adnan Darwish
Eiad Yafi
Mohammed A. Al Ghamdi
Abdullah Almasri
Publikationsdatum
14.02.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 4/2020
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-020-04394-w

Weitere Artikel der Ausgabe 4/2020

Arabian Journal for Science and Engineering 4/2020 Zur Ausgabe

Research Article - Special Issue - Intelligent Computing And Interdisciplinary Applications

An Adaptive Spiking Neural P System for Solving Vehicle Routing Problems

Research Article - Computer Engineering and Computer Science

Initial Seed Selection for Mixed Data Using Modified K-means Clustering Algorithm

RESEARCH ARTICLE - SPECIAL ISSUE - INTELLIGENT COMPUTING and INTERDISCIPLINARY APPLICATIONS

An Efficient Filter-Based Feature Selection Model to Identify Significant Features from High-Dimensional Microarray Data

Research Article - Computer Engineering and Computer Science

An Efficient Inverter Logic in Quantum-Dot Cellular Automata for Emerging Nanocircuits

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.