Block chain-Based Solutions for Improved Cloud Data Integrity and Security
Keywords:
Block chain, Cloud data, Integrity verification, Merkel hash treeAbstract
The evolution of cloud computing, however, has not been all smooth sailing, and it still struggles with data security and trusted computing to this day. Alternative solutions like data integrity tests and secure multi-party computation is often accompanied by computational complexity and scalability concerns. Block chain technology has been developed as an abstract setting of decentralized distributed computing, and applied to secure storage and computation in various cloud environments. In response, we propose a distributed virtual machine agent model that uses the mobile agent technology to create a cooperative and multi-tenant environment for the verification of trust in the data. This model assures the data are stored and monitored reliable way and provides a verification method that is the base of a Block chain based integrity protection mechanism. Using this model, we create a Block chain model that utilizes Merkle hash trees in order to create unique file hashes. Smart contracts monitor changes to this data and will notify users of any tampering. Additionally, in a block-and-response manner, it provides a strong cloud data integrity verification solution.
References
Abler, R., Owen, H., & Riley, G F. (2003, May 1). University methodology for internetworking principles and design projects. IEEE Education Society, 46(2), 218-225. https://doi.org/10.1109/te.2002.808239
AWS Cost Calculator | EC2, S3, Lambda and Data Transfer Cost. (2020, July 1). https://www.cloudysave.com/aws/cost-calculator/
Becher, B. (2022, September 1). Block chain: What It Is, How It Works, and Why It Matters. https://builtin.com/Blockchain
Beck, R., Müller-Bloch, C., & King, J L. (2018, January 1). Governance in the Block chain Economy: A Framework and Research Agenda. Association for Information Systems, 1020-1034
Beck, R., Müller-Bloch, C., & King, J L. (2018, January 1). Governance in the Block chain Economy: A Framework and Research Agenda. Association for Information Systems, 1020-1034. https://doi.org/10.17705/1jais.00518
Celo Wallet Verification | Celo Documentation. (2022, January 1). https://docs.celo.org/wallet/celo-wallet/verification
Cohen, T S., Boland, M L., Boland, B B., Takahashi, V., Tovchigrechko, A., Lee, Y., Wilde, A D., Mazaitis, M J., Jones-Nelson, O., Tkaczyk, C., Raja, R., Stover, C K., & Sellman, B R. (2018, February 1). S. aureus Evades Macrophage Killing through NLRP3-Dependent Effects on Mitochondrial Trafficking. Cell Press, 22(9), 2431-2441. https://doi.org/10.1016/j.celrep.2018.02.027
CostStorage.com | Quickly estimate the cost of storing your data on S3, Azure, Google Cloud, and more.. (2016, January 22). https://coststorage.com/
Fekih, R B., & Lahami, M. (2020, January 1). Application of Block chain Technology in Healthcare: A Comprehensive Study. Springer Science+Business Media, 268-276. https://doi.org/10.1007/978-3-030-51517-1_23
Fisher, C. (2018, January 1). Cloud versus On-Premise Computing. Scientific Research Publishing, 08(09), 1991-2006. https://doi.org/10.4236/ajibm.2018.89133
Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2017, January 1). Block chain-Based Database to Ensure Data Integrity in Cloud Computing Environments.. , 146-155
Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2017, January 1). Block chain-Based Database to Ensure Data Integrity in Cloud Computing Environments.. , 146-155. http://ceur-ws.org/Vol-1816/paper-15.pdf
Gejibo, S., Grasso, D., Mancini, F., & Mughal, K A. (2013, September 2). Secure cloud storage for remote mobile data collection. https://doi.org/10.1145/2513534.2513538
Goldman, A D., Uluagac, A S., & Copeland, J A. (2014, September 1). Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking. https://doi.org/10.1109/lcn.2014.6925766
Gunasinghe, H., Kundu, A., Bertino, E., Krawczyk, H., Chari, S T., Singh, K., & Su, D. (2019, May 13). PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.. https://doi.org/10.1145/3308558.3313574
Hanumanthakari, S., & Banik, B G. (2020, January 1). A Comprehensive Study of Block chain Services: Future of Cryptography. Science and Information Organization, 11(10). https://doi.org/10.14569/ijacsa.2020.0111037
Hook, M D., & Mayer, M. (2017, March 1). Miniature environmental chambers for temperature humidity bias testing of microelectronics. American Institute of Physics, 88(3). https://doi.org/10.1063/1.4978916
Jianliang, L K T Y K B H X. (2019, April 14). Secure Consistency Verification for Untrusted Cloud Storage by Public Block chains. https://arxiv.org/abs/1904.06626
Kalis, R., & Belloum, A. (2018, December 1). Validating Data Integrity with Block chain
Kalis, R., & Belloum, A. (2018, December 1). Validating Data Integrity with Block chain. https://doi.org/10.1109/cloudcom2018.2018.00060
Kouhizadeh, M., Saberi, S., & Sarkis, J. (2020, June 20). Block chain technology and the sustainable supply chain: Theoretically exploring adoption barriers. Elsevier BV, 231, 107831-107831. https://doi.org/10.1016/j.ijpe.2020.107831
Kumar, Y., Sharma, G., Sakpal, K., & Umbare, A. (2020, March 11). EKYC Mobile Application using Optical Character Recognition. International Research Publication House, V9(02). https://doi.org/10.17577/ijertv9is020418
Lansade, M T F C C P L C R N L. (2019, November 24). Horses Categorize Human Emotions Cross-Modally Based on Facial Expression and Non-Verbal Vocalizations. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6912773/figure/animals-09-00862-f001/
Lee, L., & Mautz, R D. (2012, February 21). Using cloud computing to manage costs. Wiley, 23(3), 11-15. https://doi.org/10.1002/jcaf.21748
Liu, B., Yu, X L., Chen, S., Xu, X., & Zhu, L. (2017, June 1). Block chain Based Data Integrity Service Framework for IoT Data
Liu, B., Yu, X L., Chen, S., Xu, X., & Zhu, L. (2017, June 1). Block chain Based Data Integrity Service Framework for IoT Data. https://doi.org/10.1109/icws.2017.54
Meena, S., Daniel, E., & Vasanthi, N A. (2013, March 1). Survey on various data integrity attacks in cloud environment and the solutions. https://doi.org/10.1109/iccpct.2013.6528889
Moreno, D G F S M. (2018, June 12). A Block chain-based Flight Data Recorder for Cloud Accountability. https://arxiv.org/abs/1806.04544
Naik, H., Bastien, R., Navab, N., & Couzin, I D. (2020, February 13). Animals in Virtual Environments. Institute of Electrical and Electronics Engineers, 26(5), 2073-2083. https://doi.org/10.1109/tvcg.2020.2973063
NY, S S O D U N V S V R A F R L R N C K A F R L R N K K A F R L R N L N A F R L R. (2017, April 5). Data provenance assurance in the cloud using Block chain. https://www.spiedigitallibrary.org/redirect/proceedings/proceeding?doi=10.1117/12.2266994
Pearson, S. (2012, June 27). Privacy, Security and Trust in Cloud Computing. , 3-42. https://doi.org/10.1007/978-1-4471-4189-1_1
Rivera-Valdes, J S R D G C. (2012, January 1). MulStiple Exemplar Instruction and the Emergence of Generative Production of Suffixes as Autoclitic Frames. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3363397/table/anvb-28-01-05-t03/
Sale, O S., Ghazali, O., & Al-Maatouk, Q. (2019, January 1). Graduation Certificate Verification Model: A Preliminary Study. Science and Information Organization, 10(7). https://doi.org/10.14569/ijacsa.2019.0100777
Sanghera, P. (2019, January 1). PMP® IN DEPTH PROJECT MANAGEMENT PROFESSIONAL CERTIFICATION STUDY GUIDE FOR THE PMP® EXAM
Staffa, D D N AN F S R M. (2014, January 1). The role of intrinsic motivations in attention allocation and shifting. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3978295/figure/F3/
Wermter, J Z A C S. (2014, January 1). Toward a self-organizing pre-symbolic neural model representing sensorimotor primitives. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3912404/figure/F3/
Zhiqiang, M X Y W Z Y B. (2022, August 18). A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing
Zhiqiang, M X Y W Z Y B. (2022, August 18). A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing. https://arxiv.org/abs/2208.09030