A secure, privacy-preserving, and cost-efficient decentralized cloud storage framework using blockchain

IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-12-01 DOI:10.1016/j.jksuci.2024.102260
Swatisipra Das , Minati Mishra , Rojalina Priyadarshini , Rabindra Kumar Barik , Manob Jyoti Saikia
{"title":"A secure, privacy-preserving, and cost-efficient decentralized cloud storage framework using blockchain","authors":"Swatisipra Das ,&nbsp;Minati Mishra ,&nbsp;Rojalina Priyadarshini ,&nbsp;Rabindra Kumar Barik ,&nbsp;Manob Jyoti Saikia","doi":"10.1016/j.jksuci.2024.102260","DOIUrl":null,"url":null,"abstract":"<div><div>Cloud services benefit countless users worldwide due to notable features, such as on-demand self-service, scalability, easy maintenance, etc. Secure storage and access to data in the cloud is critical. Cloud Identity and Access Management (IAM) service, which acts in a centralized way to provide access requests to the authenticated users. Controlled access sometimes fails to preserve the privacy of the sensitive information stored in the cloud due to several reasons, such as insider attacks, breaches of data security, or any other types of unauthorized access. This paper suggests a blockchain-assisted secure storage and access mechanism to secure sensitive data. Here blockchain is used as a trust management entity that verifies the identity of the user. Along with this it issues the Access Control Lists (ACLs) and identity token, and at the same time, it records all the interactions between the users and service providers. Data transmission is transparent since transactions are recorded. Importance is given to user privacy and decryption keys security. Linear(t,n) secret sharing scheme is used for key share generation and distribution. For experimentation, in MetaMask cryptocurrency wallet Goerli test network is used. Results reveal that our model consumes less cost to execute than other existing works. The total execution cost to upload and download a data file is 0.00281392 and 0.02455307 GoerliETH. Where the all verification operations such as identity token, ACL, access_log, and data integrity are executed in Zero gas value. The proposed model maintains a constant gas cost regardless of transaction volume, with costs of 33.04 ETH and 32.24 ETH for data upload and download. Moreover, we present a comparison of execution time performance in three different system configurations.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102260"},"PeriodicalIF":5.2000,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of King Saud University-Computer and Information Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1319157824003495","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Cloud services benefit countless users worldwide due to notable features, such as on-demand self-service, scalability, easy maintenance, etc. Secure storage and access to data in the cloud is critical. Cloud Identity and Access Management (IAM) service, which acts in a centralized way to provide access requests to the authenticated users. Controlled access sometimes fails to preserve the privacy of the sensitive information stored in the cloud due to several reasons, such as insider attacks, breaches of data security, or any other types of unauthorized access. This paper suggests a blockchain-assisted secure storage and access mechanism to secure sensitive data. Here blockchain is used as a trust management entity that verifies the identity of the user. Along with this it issues the Access Control Lists (ACLs) and identity token, and at the same time, it records all the interactions between the users and service providers. Data transmission is transparent since transactions are recorded. Importance is given to user privacy and decryption keys security. Linear(t,n) secret sharing scheme is used for key share generation and distribution. For experimentation, in MetaMask cryptocurrency wallet Goerli test network is used. Results reveal that our model consumes less cost to execute than other existing works. The total execution cost to upload and download a data file is 0.00281392 and 0.02455307 GoerliETH. Where the all verification operations such as identity token, ACL, access_log, and data integrity are executed in Zero gas value. The proposed model maintains a constant gas cost regardless of transaction volume, with costs of 33.04 ETH and 32.24 ETH for data upload and download. Moreover, we present a comparison of execution time performance in three different system configurations.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云服务具有按需自助服务、可扩展性、易于维护等显著特点,使全球无数用户受益。在云中安全存储和访问数据至关重要。云身份和访问管理(IAM)服务以集中方式向经过验证的用户提供访问请求。受控访问有时无法保护存储在云中的敏感信息的隐私,原因有多种,如内部攻击、数据安全漏洞或任何其他类型的未经授权的访问。本文提出了一种区块链辅助安全存储和访问机制,以确保敏感数据的安全。在这里,区块链被用作验证用户身份的信任管理实体。与此同时,它还会发布访问控制列表(ACL)和身份令牌,并记录用户与服务提供商之间的所有互动。由于交易被记录在案,因此数据传输是透明的。用户隐私和解密密钥安全受到重视。线性(t,n)秘密共享方案用于密钥共享的生成和分配。在实验中,MetaMask 加密货币钱包使用了 Goerli 测试网络。结果表明,与其他现有作品相比,我们的模型执行成本更低。上传和下载数据文件的总执行成本分别为 0.00281392 GoerliETH 和 0.02455307 GoerliETH。所有验证操作,如身份令牌、ACL、access_log 和数据完整性,都在零气体值中执行。无论交易量大小,拟议模型都能保持恒定的气体成本,数据上传和下载的成本分别为 33.04 ETH 和 32.24 ETH。此外,我们还比较了三种不同系统配置下的执行时间性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
10.50
自引率
8.70%
发文量
656
审稿时长
29 days
期刊介绍: In 2022 the Journal of King Saud University - Computer and Information Sciences will become an author paid open access journal. Authors who submit their manuscript after October 31st 2021 will be asked to pay an Article Processing Charge (APC) after acceptance of their paper to make their work immediately, permanently, and freely accessible to all. The Journal of King Saud University Computer and Information Sciences is a refereed, international journal that covers all aspects of both foundations of computer and its practical applications.
期刊最新文献
Unmanned combat aerial vehicle path planning in complex environment using multi-strategy sparrow search algorithm with double-layer coding T-SRE: Transformer-based semantic Relation extraction for contextual paraphrased plagiarism detection Deep reinforcement learning-based local path planning in dynamic environments for mobile robot A hierarchical and secure approach for automotive firmware upgrades Enhancing stock market predictions via hybrid external trend and internal components analysis and long short term memory model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1