{"title":"A secure, privacy-preserving, and cost-efficient decentralized cloud storage framework using blockchain","authors":"Swatisipra Das , Minati Mishra , Rojalina Priyadarshini , Rabindra Kumar Barik , Manob Jyoti Saikia","doi":"10.1016/j.jksuci.2024.102260","DOIUrl":null,"url":null,"abstract":"<div><div>Cloud services benefit countless users worldwide due to notable features, such as on-demand self-service, scalability, easy maintenance, etc. Secure storage and access to data in the cloud is critical. Cloud Identity and Access Management (IAM) service, which acts in a centralized way to provide access requests to the authenticated users. Controlled access sometimes fails to preserve the privacy of the sensitive information stored in the cloud due to several reasons, such as insider attacks, breaches of data security, or any other types of unauthorized access. This paper suggests a blockchain-assisted secure storage and access mechanism to secure sensitive data. Here blockchain is used as a trust management entity that verifies the identity of the user. Along with this it issues the Access Control Lists (ACLs) and identity token, and at the same time, it records all the interactions between the users and service providers. Data transmission is transparent since transactions are recorded. Importance is given to user privacy and decryption keys security. Linear(t,n) secret sharing scheme is used for key share generation and distribution. For experimentation, in MetaMask cryptocurrency wallet Goerli test network is used. Results reveal that our model consumes less cost to execute than other existing works. The total execution cost to upload and download a data file is 0.00281392 and 0.02455307 GoerliETH. Where the all verification operations such as identity token, ACL, access_log, and data integrity are executed in Zero gas value. The proposed model maintains a constant gas cost regardless of transaction volume, with costs of 33.04 ETH and 32.24 ETH for data upload and download. Moreover, we present a comparison of execution time performance in three different system configurations.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102260"},"PeriodicalIF":5.2000,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of King Saud University-Computer and Information Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1319157824003495","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud services benefit countless users worldwide due to notable features, such as on-demand self-service, scalability, easy maintenance, etc. Secure storage and access to data in the cloud is critical. Cloud Identity and Access Management (IAM) service, which acts in a centralized way to provide access requests to the authenticated users. Controlled access sometimes fails to preserve the privacy of the sensitive information stored in the cloud due to several reasons, such as insider attacks, breaches of data security, or any other types of unauthorized access. This paper suggests a blockchain-assisted secure storage and access mechanism to secure sensitive data. Here blockchain is used as a trust management entity that verifies the identity of the user. Along with this it issues the Access Control Lists (ACLs) and identity token, and at the same time, it records all the interactions between the users and service providers. Data transmission is transparent since transactions are recorded. Importance is given to user privacy and decryption keys security. Linear(t,n) secret sharing scheme is used for key share generation and distribution. For experimentation, in MetaMask cryptocurrency wallet Goerli test network is used. Results reveal that our model consumes less cost to execute than other existing works. The total execution cost to upload and download a data file is 0.00281392 and 0.02455307 GoerliETH. Where the all verification operations such as identity token, ACL, access_log, and data integrity are executed in Zero gas value. The proposed model maintains a constant gas cost regardless of transaction volume, with costs of 33.04 ETH and 32.24 ETH for data upload and download. Moreover, we present a comparison of execution time performance in three different system configurations.
期刊介绍:
In 2022 the Journal of King Saud University - Computer and Information Sciences will become an author paid open access journal. Authors who submit their manuscript after October 31st 2021 will be asked to pay an Article Processing Charge (APC) after acceptance of their paper to make their work immediately, permanently, and freely accessible to all. The Journal of King Saud University Computer and Information Sciences is a refereed, international journal that covers all aspects of both foundations of computer and its practical applications.