Block chain-Based Solutions for Improved Cloud Data Integrity and Security

Authors

  • Md Tanvir Rahman Tarafder Faculty of Science and Technology, American International University-Bangladesh, Dhaka, Bangladesh.
  • Arafath Bin Mohiuddin Faculty of Science and Technology, American International University-Bangladesh, Dhaka, Bangladesh.
  • Nisher Ahmed College of Technology & Engineering, Westcliff University, Irvine, California, USA.
  • Md Abu Shihab School of Information Technology, SEGi University, Selangor, Malaysia.
  • Md Farhad Kabir Marshall School of Business, University of Southern California, Los Angeles, California, USA

Keywords:

Block chain, Cloud data, Integrity verification, Merkel hash tree

Abstract

The evolution of cloud computing, however, has not been all smooth sailing, and it still struggles with data security and trusted computing to this day. Alternative solutions like data integrity tests and secure multi-party computation is often accompanied by computational complexity and scalability concerns. Block chain technology has been developed as an abstract setting of decentralized distributed computing, and applied to secure storage and computation in various cloud environments. In response, we propose a distributed virtual machine agent model that uses the mobile agent technology to create a cooperative and multi-tenant environment for the verification of trust in the data. This model assures the data are stored and monitored reliable way and provides a verification method that is the base of a Block chain based integrity protection mechanism. Using this model, we create a Block chain model that utilizes Merkle hash trees in order to create unique file hashes. Smart contracts monitor changes to this data and will notify users of any tampering. Additionally, in a block-and-response manner, it provides a strong cloud data integrity verification solution.

References

Abler, R., Owen, H., & Riley, G F. (2003, May 1). University methodology for internetworking principles and design projects. IEEE Education Society, 46(2), 218-225. https://doi.org/10.1109/te.2002.808239

AWS Cost Calculator | EC2, S3, Lambda and Data Transfer Cost. (2020, July 1). https://www.cloudysave.com/aws/cost-calculator/

Becher, B. (2022, September 1). Block chain: What It Is, How It Works, and Why It Matters. https://builtin.com/Blockchain

Beck, R., Müller-Bloch, C., & King, J L. (2018, January 1). Governance in the Block chain Economy: A Framework and Research Agenda. Association for Information Systems, 1020-1034

Beck, R., Müller-Bloch, C., & King, J L. (2018, January 1). Governance in the Block chain Economy: A Framework and Research Agenda. Association for Information Systems, 1020-1034. https://doi.org/10.17705/1jais.00518

Celo Wallet Verification | Celo Documentation. (2022, January 1). https://docs.celo.org/wallet/celo-wallet/verification

Cohen, T S., Boland, M L., Boland, B B., Takahashi, V., Tovchigrechko, A., Lee, Y., Wilde, A D., Mazaitis, M J., Jones-Nelson, O., Tkaczyk, C., Raja, R., Stover, C K., & Sellman, B R. (2018, February 1). S. aureus Evades Macrophage Killing through NLRP3-Dependent Effects on Mitochondrial Trafficking. Cell Press, 22(9), 2431-2441. https://doi.org/10.1016/j.celrep.2018.02.027

CostStorage.com | Quickly estimate the cost of storing your data on S3, Azure, Google Cloud, and more.. (2016, January 22). https://coststorage.com/

Fekih, R B., & Lahami, M. (2020, January 1). Application of Block chain Technology in Healthcare: A Comprehensive Study. Springer Science+Business Media, 268-276. https://doi.org/10.1007/978-3-030-51517-1_23

Fisher, C. (2018, January 1). Cloud versus On-Premise Computing. Scientific Research Publishing, 08(09), 1991-2006. https://doi.org/10.4236/ajibm.2018.89133

Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2017, January 1). Block chain-Based Database to Ensure Data Integrity in Cloud Computing Environments.. , 146-155

Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2017, January 1). Block chain-Based Database to Ensure Data Integrity in Cloud Computing Environments.. , 146-155. http://ceur-ws.org/Vol-1816/paper-15.pdf

Gejibo, S., Grasso, D., Mancini, F., & Mughal, K A. (2013, September 2). Secure cloud storage for remote mobile data collection. https://doi.org/10.1145/2513534.2513538

Goldman, A D., Uluagac, A S., & Copeland, J A. (2014, September 1). Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking. https://doi.org/10.1109/lcn.2014.6925766

Gunasinghe, H., Kundu, A., Bertino, E., Krawczyk, H., Chari, S T., Singh, K., & Su, D. (2019, May 13). PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.. https://doi.org/10.1145/3308558.3313574

Hanumanthakari, S., & Banik, B G. (2020, January 1). A Comprehensive Study of Block chain Services: Future of Cryptography. Science and Information Organization, 11(10). https://doi.org/10.14569/ijacsa.2020.0111037

Hook, M D., & Mayer, M. (2017, March 1). Miniature environmental chambers for temperature humidity bias testing of microelectronics. American Institute of Physics, 88(3). https://doi.org/10.1063/1.4978916

Jianliang, L K T Y K B H X. (2019, April 14). Secure Consistency Verification for Untrusted Cloud Storage by Public Block chains. https://arxiv.org/abs/1904.06626

Kalis, R., & Belloum, A. (2018, December 1). Validating Data Integrity with Block chain

Kalis, R., & Belloum, A. (2018, December 1). Validating Data Integrity with Block chain. https://doi.org/10.1109/cloudcom2018.2018.00060

Kouhizadeh, M., Saberi, S., & Sarkis, J. (2020, June 20). Block chain technology and the sustainable supply chain: Theoretically exploring adoption barriers. Elsevier BV, 231, 107831-107831. https://doi.org/10.1016/j.ijpe.2020.107831

Kumar, Y., Sharma, G., Sakpal, K., & Umbare, A. (2020, March 11). EKYC Mobile Application using Optical Character Recognition. International Research Publication House, V9(02). https://doi.org/10.17577/ijertv9is020418

Lansade, M T F C C P L C R N L. (2019, November 24). Horses Categorize Human Emotions Cross-Modally Based on Facial Expression and Non-Verbal Vocalizations. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6912773/figure/animals-09-00862-f001/

Lee, L., & Mautz, R D. (2012, February 21). Using cloud computing to manage costs. Wiley, 23(3), 11-15. https://doi.org/10.1002/jcaf.21748

Liu, B., Yu, X L., Chen, S., Xu, X., & Zhu, L. (2017, June 1). Block chain Based Data Integrity Service Framework for IoT Data

Liu, B., Yu, X L., Chen, S., Xu, X., & Zhu, L. (2017, June 1). Block chain Based Data Integrity Service Framework for IoT Data. https://doi.org/10.1109/icws.2017.54

Meena, S., Daniel, E., & Vasanthi, N A. (2013, March 1). Survey on various data integrity attacks in cloud environment and the solutions. https://doi.org/10.1109/iccpct.2013.6528889

Moreno, D G F S M. (2018, June 12). A Block chain-based Flight Data Recorder for Cloud Accountability. https://arxiv.org/abs/1806.04544

Naik, H., Bastien, R., Navab, N., & Couzin, I D. (2020, February 13). Animals in Virtual Environments. Institute of Electrical and Electronics Engineers, 26(5), 2073-2083. https://doi.org/10.1109/tvcg.2020.2973063

NY, S S O D U N V S V R A F R L R N C K A F R L R N K K A F R L R N L N A F R L R. (2017, April 5). Data provenance assurance in the cloud using Block chain. https://www.spiedigitallibrary.org/redirect/proceedings/proceeding?doi=10.1117/12.2266994

Pearson, S. (2012, June 27). Privacy, Security and Trust in Cloud Computing. , 3-42. https://doi.org/10.1007/978-1-4471-4189-1_1

Rivera-Valdes, J S R D G C. (2012, January 1). MulStiple Exemplar Instruction and the Emergence of Generative Production of Suffixes as Autoclitic Frames. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3363397/table/anvb-28-01-05-t03/

Sale, O S., Ghazali, O., & Al-Maatouk, Q. (2019, January 1). Graduation Certificate Verification Model: A Preliminary Study. Science and Information Organization, 10(7). https://doi.org/10.14569/ijacsa.2019.0100777

Sanghera, P. (2019, January 1). PMP® IN DEPTH PROJECT MANAGEMENT PROFESSIONAL CERTIFICATION STUDY GUIDE FOR THE PMP® EXAM

Staffa, D D N AN F S R M. (2014, January 1). The role of intrinsic motivations in attention allocation and shifting. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3978295/figure/F3/

Wermter, J Z A C S. (2014, January 1). Toward a self-organizing pre-symbolic neural model representing sensorimotor primitives. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3912404/figure/F3/

Zhiqiang, M X Y W Z Y B. (2022, August 18). A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing

Zhiqiang, M X Y W Z Y B. (2022, August 18). A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing. https://arxiv.org/abs/2208.09030

Downloads

Published

2022-09-10

How to Cite

Md Tanvir Rahman Tarafder, Arafath Bin Mohiuddin, Nisher Ahmed, Md Abu Shihab, & Md Farhad Kabir. (2022). Block chain-Based Solutions for Improved Cloud Data Integrity and Security. BULLET : Jurnal Multidisiplin Ilmu, 1(04), 736–748. Retrieved from https://journal.mediapublikasi.id/index.php/bullet/article/view/4705