Secure Data Storage Scheme Using Blockchain in Federated Cloud
Keywords:
Cloud storage, Security, Blockchain, Architecture, Distributed Cloud computing, federated cloudAbstract
With the development of Internet technology, the volume of data is growing immensely. To deal with large-scale data, cloud storage has gained great attention from organizations and businesses because of its easy and efficient to adoption. Traditional cloud storage has come to rely almost exclusively on large storage providers acting as trusted third parties to transfer and store data. Though, cloud Provider offers considerable security features, with increasing demands and usage, these centralized systems have become major targets for hacks and data breaches. This makes the data vulnerable and prone to tampering. In this paper, to address the above problems we proposed a blockchain-based security scheme for distributed cloud storage, where users can divide their own files into encrypted data chunks, and upload those data chunks randomly into the federated clouds.
References
[1] National Institute of Standards and Technology special publication.no.800-145, “The NIST definition of cloud computing” Sept. 2011
[2] Shan, Chen, Chang Heng, and Zou Xianjun. “ Inter-cloud operations via NGSON” IEEE communications, 2012.
[3] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE transactions on parallel and distributed systems, 22(5):847–859, 2011.
[4] Yinghui Zhang, Dong Zheng, and Robert H Deng. Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal, 2018. doi:10.1109/JIOT.2018.2825289.
[5] Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S Wong, Hui Li, and Ilsun You. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379:42–61, 2017.
[6] http://techgenix.com/blockchain-technology-for-cloud-storage/
[7] Nakamoto, S. “Bitcoin: A Peer-to-Peer Electronic Cash Systems https://bitcoin.org/bitcoin.pdf namecoin (2014).
[8] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https: //bitcoin.org/bitcoin.pdf, 2008.
[9] Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C. (2016) ‘Hawk: the blockchain model of cryptography and privacy-preserving smart contracts’, Proceedings of IEEE Symposium onSecurity and Privacy (SP), San Jose, CA, USA, pp.839–858.
[10] Buterin, V. (2014) A Next-Generation Smart Contract and Decentralized Application Platform, White Paper.
[11] Zibin Zheng and Shaoan Xie,”Blockchain challeng es and oppor tunities: a survey” Int. J. Web and Grid Services, Vol. 14, No. 4, 2018.
[12] Adel Nadjaran Toosi, Rodrigo N. Calheiros, and Rajkumar Buyya. 2014. Interconnected cl oud computing environments: Challenges, taxonomy, and s urvey. ACM Comput. S urv. 47, 1, Articl e 7 (April 2014), 47 pages. DOI: h ttp://dx.doi.org/10.1145/2593512.
[13] Guy Zyskind, Oz Nathan, et al. Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE, pages 180–184. IEEE, 2015.
[14] Antonio Celesti, Francesco Tusa, Massimo Villari, and Antonio Puliafito. 2010a. How to enhance cloud architectures to enable cross-federation. In Proceedings of the 3rd International Conference on Cloud Computing (Cloud’10). Miami, FL, 337–345.
[15] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick PC Lee, and Wenjing Lou. A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5):1206–1216, 2015.
[16] Xiaoming Zhu, Bingying Song, Yingzi Ni, Yifan Ren, and Rui Li. Software defined anything from software-defined hardware to software defined anything. In Business Trends in the Digital Era, pages 83–103. Springer, 2016.
[17] Qiang Fu, J¨org-Uwe Pott, Feng Shen, and Changhui Rao. Stochastic parallel gradient descent optimization based on decoupling of the software and hardware. Optics Communications, 310:138–149, 2014.
[18] Guy Zyskind, Oz Nathan, et al. Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), EEE, pages 180–184. IEEE, 2015
.[19] Shawn Wilkinson, Tome Boshevski, Josh Brandoff, and Vitalik Buterin. Storj a peer-to-peer cloud storage network, 2014.
[20] Liu, Xiao Liang Yu, Shiping Chen, Xiwei Xu, and Liming Zhu. Blockchain based data integrity service framework for iot data. In Web Services (ICWS), 2017 IEEE International Conference on, pages 468–475. IEEE, 2017.
[21] Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4):767–778,2017.
[22] Changsong Yang, Xiaofeng Chen, and Yang Xiang. Blcokchain based publicly verifiable data deletion scheme for cloud storage.Journal of Network and Computer Applications, 103:185–193,2017.doi:10.1016/j.jnca.2017.11.011.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
