ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SECURE CLOUD STORAGE WITH BLOCKCHAIN TECHNOLOGY USING MULTI-KEY AGGREGATION ALGORITHM

Journal: International Education and Research Journal (Vol.10, No. 3)

Publication Date:

Authors : ;

Page : 181-186

Keywords : Cloud Computing; Blockchain; Information Security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing is an emerging technology which provides on-demand availability of system resources, especially data storage and computing power. Cloud computing technology helps for reducing maintenance cost, highly available across the globe, flexible and easy scalability. Even though the cloud computing has many useful services, still we have a security challenges on data integrity and privacy. Blockchain Technology is the most important security solutions for the protection of information stored on Cloud.The Internet uses a centralized method of monitoring, critical information in the database has been easily manipulated or disclosed by cyber criminals or cloud organizations.To address this limitation, researchers offer Chain Privacy, a blockchain-based access to information system.First, customers use blockchain network node account information as an identifier and also redefining cloud-based access control permissions, which would be encoded and retained on the blockchain.Subsequently, customer uses Chain Privacy to create network access, authorization, and cancel procedures.With a huge use of cloud services, information security issues still need to be addressed appropriately.Data security issues have always been an obstacle in the development of cloud computing, but they must be addressed.At the same time, Blockchain has established itself as a crucial method to ensure security, in particular in terms of consistency, validity, and confidentiality.This paper proposed the Multi-Key Aggregation Security (MAS) in Blockchain and cloud computing, to improve the performance of security.Finally, Enterprise Operating System (EOS) is used to create Chain Privacy. And the results suggest that Chain Privacy could not only protect cybercriminals and managers against unauthorized access to information, but also preserve approved confidentiality.

Last modified: 2024-06-05 22:16:16