{"title":"Data security and privacy in cloud computing focused on transportation sector with the aid of block chain approach","authors":"Abhiyan Gurung","doi":"10.1109/citisia53721.2021.9719924","DOIUrl":null,"url":null,"abstract":"Despite the exponential growth of cloud infrastructure over several years, data protection and reliable computing are still major obstacles for modern cloud computing applications. In order to address this issue, several researchers have done a lot of work on this and have suggested a variety of models, including data integrity checking and stable multi-party estimates. Vehicle ad-hoc networks (VANETs) have been diagnosed with several security issues, such as confidentiality, safe authorization/authentication, and system stability. Nevertheless, almost all these alternatives face challenges like over-computational complexity or absence of scalability. This paper explores the usage of blockchain technologies in order to strengthen this scenario. Blockchain is collaborative modern framework for distributed computation. Applying blockchain technologies to cloud infrastructure, leveraging the former encryption framework to boost the efficiency of data storage and decentralized computation, is an exciting research area. A system of message verification for the privacy and decentralization of knowledge utilizing blockchain technologies is proposed in this paper. This is where we add message authentication code (MAC) and public-private key for stable authentication. In this document, we follow consensus algorithms for computing blockchain structures such as proof of work (PoW) and Practical Byzantine Fault Tolerance (PBFT) in the proposed authorization method. Finally, it is shown that the suggested approach is secure from threats that require the impersonation of the internal intruder as well as the usual threats.","PeriodicalId":252063,"journal":{"name":"2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/citisia53721.2021.9719924","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Despite the exponential growth of cloud infrastructure over several years, data protection and reliable computing are still major obstacles for modern cloud computing applications. In order to address this issue, several researchers have done a lot of work on this and have suggested a variety of models, including data integrity checking and stable multi-party estimates. Vehicle ad-hoc networks (VANETs) have been diagnosed with several security issues, such as confidentiality, safe authorization/authentication, and system stability. Nevertheless, almost all these alternatives face challenges like over-computational complexity or absence of scalability. This paper explores the usage of blockchain technologies in order to strengthen this scenario. Blockchain is collaborative modern framework for distributed computation. Applying blockchain technologies to cloud infrastructure, leveraging the former encryption framework to boost the efficiency of data storage and decentralized computation, is an exciting research area. A system of message verification for the privacy and decentralization of knowledge utilizing blockchain technologies is proposed in this paper. This is where we add message authentication code (MAC) and public-private key for stable authentication. In this document, we follow consensus algorithms for computing blockchain structures such as proof of work (PoW) and Practical Byzantine Fault Tolerance (PBFT) in the proposed authorization method. Finally, it is shown that the suggested approach is secure from threats that require the impersonation of the internal intruder as well as the usual threats.