Open Access   Article Go Back

Secure Data Storage Scheme using Blockchain for Federated cloud

Shaik. Munwar1 , K. Ramani2 , K. Madhavi3

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 51-55, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.5155

Online published on Mar 20, 2019

Copyright © Shaik. Munwar, K. Ramani, K. Madhavi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shaik. Munwar, K. Ramani, K. Madhavi, “Secure Data Storage Scheme using Blockchain for Federated cloud,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.51-55, 2019.

MLA Style Citation: Shaik. Munwar, K. Ramani, K. Madhavi "Secure Data Storage Scheme using Blockchain for Federated cloud." International Journal of Computer Sciences and Engineering 07.06 (2019): 51-55.

APA Style Citation: Shaik. Munwar, K. Ramani, K. Madhavi, (2019). Secure Data Storage Scheme using Blockchain for Federated cloud. International Journal of Computer Sciences and Engineering, 07(06), 51-55.

BibTex Style Citation:
@article{Munwar_2019,
author = {Shaik. Munwar, K. Ramani, K. Madhavi},
title = {Secure Data Storage Scheme using Blockchain for Federated cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {51-55},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=867},
doi = {https://doi.org/10.26438/ijcse/v7i6.5155}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.5155}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=867
TI - Secure Data Storage Scheme using Blockchain for Federated cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Shaik. Munwar, K. Ramani, K. Madhavi
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 51-55
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

With the Internet technology development, the volume of data is growing immensely. To deal with huge volume of data, cloud storage has gained great attention from organizations and businesses because of its easy and efficient to adoption procedure. Traditional cloud storage has come to rely almost exclusively on large storage providers acting as trusted third parties to transfer and store data. Though, cloud Provider offers considerable security features, with increasing demands and usage, these centralized systems have become major targets for hacks and data breaches. This makes the data vulnerable and prone to tampering. In this paper, to address the above problems and proposed a distributed blockchain-based security scheme for storage in federated cloud, where users can divide their own files into fragments, encrypted those data fragments, and upload those encrypted fragments randomly into the federated clouds.

Key-Words / Index Term

Cloud storage, Security, Blockchain, Distributed Cloud computing, federated cloud

References

[1] National Institute of Standards and Technology special publication.no.800-145, “The NIST definition of cloud computing” Sept. 2011
[2] Shan, Chen, Chang Heng, and Zou Xianjun. “ Inter-cloud operations via NGSON” IEEE communications, 2012.
[3] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE transactions on parallel and distributed systems, 22(5):847–859, 2011.
[4] Yinghui Zhang, Dong Zheng, and Robert H Deng. Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal, 2018. doi:10.1109/JIOT.2018.2825289.
[5] Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S Wong, Hui Li, and Ilsun You. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379:42–61, 2017.
[6] http://techgenix.com/blockchain-technology-for-cloud-storage/
[7] Nakamoto, S. “Bitcoin: A Peer-to-Peer Electronic Cash Systems https://bitcoin.org/bitcoin.pdf namecoin (2014).
[8] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https: //bitcoin.org/bitcoin.pdf, 2008.
[9] Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C. (2016) ‘Hawk: the blockchain model of cryptography and privacy-preserving smart contracts’, Proceedings of IEEE Symposium onSecurity and Privacy (SP), San Jose, CA, USA, pp.839–858.
[10] Buterin, V. (2014) A Next-Generation Smart Contract and Decentralized Application Platform, White Paper.
[11] Zibin Zheng and Shaoan Xie,”Blockchain challeng es and oppor tunities: a survey” Int. J. Web and Grid Services, Vol. 14, No. 4, 2018.
[12] Adel Nadjaran Toosi, Rodrigo N. Calheiros, and Rajkumar Buyya. 2014. Interconnected cl oud computing environments: Challenges, taxonomy, and s urvey. ACM Comput. S urv. 47, 1, Articl e 7 (April 2014), 47 pages. DOI: h ttp://dx.doi.org/10.1145/2593512.
[13] Guy Zyskind, Oz Nathan, et al. Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE, pages 180–184. IEEE, 2015.
[14] Antonio Celesti, Francesco Tusa, Massimo Villari, and Antonio Puliafito. 2010a. How to enhance cloud architectures to enable cross-federation. In Proceedings of the 3rd International Conference on Cloud Computing (Cloud’10). Miami, FL, 337–345.
[15] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick PC Lee, and Wenjing Lou. A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5):1206–1216, 2015.
[16] Xiaoming Zhu, Bingying Song, Yingzi Ni, Yifan Ren, and Rui Li. Software defined anything from software-defined hardware to software defined anything. In Business Trends in the Digital Era, pages 83–103. Springer, 2016.
[17] Qiang Fu, J¨org-Uwe Pott, Feng Shen, and Changhui Rao. Stochastic parallel gradient descent optimization based on decoupling of the software and hardware. Optics Communications, 310:138–149, 2014.
[18] Guy Zyskind, Oz Nathan, et al. Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), EEE, pages 180–184. IEEE, 2015
[19] Shawn Wilkinson, Tome Boshevski, Josh Brandoff, and Vitalik Buterin. Storj a peer-to-peer cloud storage network, 2014.
[20] Lizhen Cui, Junhua Zhang, Lingxi Yue, Yuliang Shi, Hui Li, and Dong Yuan. A genetic algorithm based data replica placement strategy for sci- entific applications in clouds. IEEE Transactions on Services Computing, pages 1–13, 2017. doi:10.1109/TSC.2015.2481421.
[21] Liu, Xiao Liang Yu, Shiping Chen, Xiwei Xu, and Liming Zhu. Blockchain based data integrity service framework for iot data. In Web Services (ICWS), 2017 IEEE International Conference on, pages 468–475. IEEE, 2017.
[22] Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4):767–778,2017.
[23] Changsong Yang, Xiaofeng Chen, and Yang Xiang. Blcokchain based publicly verifiable data deletion scheme for cloud storage.Journal of Network and Computer Applications, 103:185–193,2017.doi:10.1016/j.jnca.2017.11.011.