Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
【Author】 Ramachandran, A.; Ramadevi, P.; Alkhayyat, Ahmed; Yousif, Yousif Kerrar
【Source】INTELLIGENT AUTOMATION AND SOFT COMPUTING
【影响因子】3.401
【Abstract】Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud, public cloud, community cloud and private cloud. Though cloud-based computing solutions are highly con-venient to the users, it also brings a challenge i.e., security of the data shared. Hence, in current research paper, blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentica-tion process. Blockchain technology is utilized in this study to enable efficient and secure operation which not only empowers cloud security but also avoids threats and attacks. Additionally, the data integrity authentication technique is also uti-lized to limit the unwanted access of data in cloud storage unit. The major objec-tive of the projected technique is to empower data security and user authentication in cloud computing environment. To improve the proposed authentication pro-cess, cuckoo filter and Merkle Hash Tree (MHT) are utilized. The proposed meth-odology was validated using few performance metrics such as processing time, uploading time, downloading time, authentication time, consensus time, waiting time, initialization time, in addition to storage overhead. The proposed method was compared with conventional cloud security techniques and the outcomes establish the supremacy of the proposed method.
【Keywords】Blockchain; security; data integrity; authentication; cloud computing; signature; hash tree
【发表时间】2023
【收录时间】2023-03-23
【文献类型】实验仿真
【主题类别】
区块链应用-实体经济-云服务
评论