Data security and privacy in cloud computing focused on transportation sector with the aid of block chain approach

Abhiyan Gurung
{"title":"Data security and privacy in cloud computing focused on transportation sector with the aid of block chain approach","authors":"Abhiyan Gurung","doi":"10.1109/citisia53721.2021.9719924","DOIUrl":null,"url":null,"abstract":"Despite the exponential growth of cloud infrastructure over several years, data protection and reliable computing are still major obstacles for modern cloud computing applications. In order to address this issue, several researchers have done a lot of work on this and have suggested a variety of models, including data integrity checking and stable multi-party estimates. Vehicle ad-hoc networks (VANETs) have been diagnosed with several security issues, such as confidentiality, safe authorization/authentication, and system stability. Nevertheless, almost all these alternatives face challenges like over-computational complexity or absence of scalability. This paper explores the usage of blockchain technologies in order to strengthen this scenario. Blockchain is collaborative modern framework for distributed computation. Applying blockchain technologies to cloud infrastructure, leveraging the former encryption framework to boost the efficiency of data storage and decentralized computation, is an exciting research area. A system of message verification for the privacy and decentralization of knowledge utilizing blockchain technologies is proposed in this paper. This is where we add message authentication code (MAC) and public-private key for stable authentication. In this document, we follow consensus algorithms for computing blockchain structures such as proof of work (PoW) and Practical Byzantine Fault Tolerance (PBFT) in the proposed authorization method. Finally, it is shown that the suggested approach is secure from threats that require the impersonation of the internal intruder as well as the usual threats.","PeriodicalId":252063,"journal":{"name":"2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/citisia53721.2021.9719924","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Despite the exponential growth of cloud infrastructure over several years, data protection and reliable computing are still major obstacles for modern cloud computing applications. In order to address this issue, several researchers have done a lot of work on this and have suggested a variety of models, including data integrity checking and stable multi-party estimates. Vehicle ad-hoc networks (VANETs) have been diagnosed with several security issues, such as confidentiality, safe authorization/authentication, and system stability. Nevertheless, almost all these alternatives face challenges like over-computational complexity or absence of scalability. This paper explores the usage of blockchain technologies in order to strengthen this scenario. Blockchain is collaborative modern framework for distributed computation. Applying blockchain technologies to cloud infrastructure, leveraging the former encryption framework to boost the efficiency of data storage and decentralized computation, is an exciting research area. A system of message verification for the privacy and decentralization of knowledge utilizing blockchain technologies is proposed in this paper. This is where we add message authentication code (MAC) and public-private key for stable authentication. In this document, we follow consensus algorithms for computing blockchain structures such as proof of work (PoW) and Practical Byzantine Fault Tolerance (PBFT) in the proposed authorization method. Finally, it is shown that the suggested approach is secure from threats that require the impersonation of the internal intruder as well as the usual threats.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于区块链技术的交通运输领域云计算数据安全与隐私研究
尽管云基础设施在过去几年中呈指数级增长,但数据保护和可靠计算仍然是现代云计算应用的主要障碍。为了解决这个问题,一些研究人员在这方面做了大量的工作,并提出了各种模型,包括数据完整性检查和稳定的多方估计。车辆自组织网络(vanet)已被诊断出存在几个安全问题,例如机密性、安全授权/身份验证和系统稳定性。然而,几乎所有这些替代方案都面临着过度计算复杂性或缺乏可伸缩性等挑战。本文探讨了区块链技术的使用,以加强这种情况。区块链是分布式计算的现代协作框架。将区块链技术应用于云基础设施,利用以前的加密框架来提高数据存储和分散计算的效率,是一个令人兴奋的研究领域。本文提出了一种利用区块链技术实现知识隐私和去中心化的消息验证系统。我们在这里添加消息身份验证码(MAC)和公私钥,以实现稳定的身份验证。在本文档中,我们在提议的授权方法中遵循共识算法来计算区块链结构,如工作量证明(PoW)和实用拜占庭容错(PBFT)。最后,表明建议的方法是安全的,不受需要模拟内部入侵者和通常威胁的威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Heuristic Approach using Block Chain to Fight Novel COVID-19 During an Election Customer data extraction techniques based on natural language processing for e-commerce business analytics Identifying Parkinson’s Disease using Multimodal Approach and Deep Learning DCV: A Taxonomy on Deep Learning Based Lung Cancer Classification Review of network-forensic analysis optimization using deep learning against attacks on IoT devices
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1