Skip to main content

Improvised Model for Blockchain in Distributed Cloud Environment

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13547))

Included in the following conference series:

  • 982 Accesses

Abstract

In the current era, Blockchain Technology is blooming and growing faster. Blockchain is currently used in soft computing, agriculture, cloud network, healthcare, electronics, and electrical fields. Older technologies are upgraded to increase their reach using Distributed Cloud networks and blockchain. Implementing security for heterogeneous 5G services-based technologies of the MEC is challenging.

In this paper, we propose a blockchain-based distributed cloud security solution that uses technologies such as Digital Signature, RSA algorithm, AES encryption, and a Lookup table to improve the security of blockchain and decrease the traversal time of data in the blockchain. This proposed model is adept at solving the primary concern related to storage and confidentiality in a Distributed Cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. KodriÄ, Å., Vrhovec, S., JelovÄan, L.: Securing edge-enabled smart healthcare systems with blockchain: a systematic literature review. J. Internet Serv. Inf. Secur. (JISIS) 11(4), 19–32 (2021)

    Google Scholar 

  2. Wang, H., Qin, H., Zhao, M., Wei, X., Shen, H., Susilo, W.: Blockchain-based fair payment smart contract for public cloud storage auditing. Inf. Sci. 519, 348–362 (2020)

    Article  MathSciNet  Google Scholar 

  3. Narteni, S., Vaccari, I., Mongelli, M., Aiello, M., Cambiaso, E.: Evaluating the possibility to perpetrate tunneling attacks exploiting short-message-service. J. Internet Serv. Inf. Secur. (JISIS) 11(3), 30–46 (2021)

    Google Scholar 

  4. Rahmadika, S., Firdaus, M., Lee, Y.-H., Rhee, K.-H.: An investigation of pseudonymization techniques in decentralized transactions. J. Internet Serv. Inf. Secur. (JISIS) 11(4), 1–18 (2021)

    Google Scholar 

  5. Ribalta, C.N., Lombard-Platet, M., Salinesi, C., Lafourcade, P.: Blockchain mirage or silver bullet? A requirements-driven comparative analysis of business and developers’ perceptions in the accountancy domain. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 12(1), 85–110 (2021)

    Google Scholar 

  6. Amin, R., Kumar, N., Biswas, G.P., Iqbal, R., Chang, V.: A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener. Comput. Syst. 78, 1005–1019 (2018)

    Article  Google Scholar 

  7. Cristea, D.S., Moga, L.M., Neculita, M., Prentkovskis, O., Nor, K.M., Mardani, A.: Operational shipping intelligence through distributed cloud computing. J. Bus. Econ. Manag. 18(4), 695–725 (2017)

    Article  Google Scholar 

  8. Stanciu, A.: Blockchain based distributed control system for edge computing. In: 2017 21st International Conference on Control Systems and Computer Science (CSCS), pp. 667–671 (2017)

    Google Scholar 

  9. Li, J., Liu, Z., Chen, L., Chen, P., Wu, J.: Blockchain-based security architecture for distributed cloud storage. In: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), pp. 408–411 (2017)

    Google Scholar 

  10. Li, J., Jigang, W., Chen, L.: Block-secure: blockchain based scheme for secure P2P cloud storage. Inf. Sci. 465, 219–231 (2018)

    Article  Google Scholar 

  11. Saia, R., Carta, S., Recupero, D.R., Fenu, G.: Internet of entities (IoE): a blockchain-based distributed paradigm for data exchange between wireless-based devices (2019)

    Google Scholar 

  12. Ricci, J., Baggili, I., Breitinger, F.: Blockchain-based distributed cloud storage digital forensics: where’s the beef? IEEE Secur. Priv. 17(1), 34–42 (2019)

    Article  Google Scholar 

  13. Sharma, P.K., Park, J.H.: Blockchain based hybrid network architecture for the smart city. Futur. Gener. Comput. Syst. 86, 650–655 (2018)

    Article  Google Scholar 

  14. Davcev, D., Kocarev, L., Carbone, A., Stankovski, V., Mitresk, K.: Blockchain based distributed cloud fog platform for IoT supply chain management, pp. 51–58 (2018)

    Google Scholar 

  15. Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387, 103–115 (2017)

    Article  Google Scholar 

  16. Ali, S., Wang, G., White, B., Cottrell, R.L.: A blockchain-based decentralized data storage and access framework for pinger. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1303–1308 (2018)

    Google Scholar 

  17. Chen, Y., Ding, S., Zheng, X., Zheng, H., Yang, S.: Blockchain-based medical records secure storage and medical service framework. J. Med. Syst. 43, 11 (2018)

    Google Scholar 

  18. Cheng, J.-C., Lee, N.-Y., Chi, C., Chen, Y.-H.: Blockchain and smart contract for digital certificate. In: 2018 IEEE International Conference on Applied System Invention (ICASI), pp. 1046–1051 (2018)

    Google Scholar 

  19. He, Y., Wei, Z., Guangzheng, D., Li, J., Zhao, N., Yin, H.: Securing cognitive radio vehicular ad hoc networks with fog computing. Ad Hoc Sens. Wirel. Netw. 40, 01 (2018)

    Google Scholar 

  20. Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 468–477 (2017)

    Google Scholar 

  21. Sharma, V., You, I., Palmieri, F., Jayakody, D.N.K., Li, J.: Secure and energy-efficient handover in fog networks using blockchain-based DMM. IEEE Commun. Mag. 56(5), 22–31 (2018)

    Article  Google Scholar 

  22. Zhang, Y., Zhang, L., Liu, Y., Luo, X.: Proof of service power: a blockchain consensus for cloud manufacturing. J. Manuf. Syst. 59, 1–11 (2021)

    Article  Google Scholar 

  23. Cha, J., Singh, S.K., Kim, T., Park, J.: Blockchain-empowered cloud architecture based on secret sharing for smart city. J. Inf. Secur. Appl. 57, 102686 (2021)

    Google Scholar 

  24. Kumar, A., Dhurandher, S.K., Woungang, I., Rodrigues, J.J.P.C.: Securing opportunistic networks: an encounter-based trust-driven barter mechanism. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 12(2), 99–113 (2021)

    Google Scholar 

  25. Sharma, P.K., Chen, M., Park, J.H.: A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6, 115–124 (2018)

    Article  Google Scholar 

  26. Chandel, S., Cao, W., Sun, Z., Yang, J., Zhang, B., Ni, T.-Y.: A multi-dimensional adversary analysis of RSA and ECC in blockchain encryption. In: Arai, K., Bhatia, R. (eds.) FICC 2019. LNNS, vol. 70, pp. 988–1003. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-12385-7_67

    Chapter  Google Scholar 

  27. El Azzaoui, A., Chen, H., Kim, S.H., Pan, Y., Park, J.H.: Blockchain-based distributed information hiding framework for data privacy preserving in medical supply chain systems. Sensors 22(4), 1371 (2022)

    Article  Google Scholar 

  28. Reja, K., Choudhary, G., Shandilya, S.K., Sharma, D.M., Sharma, A.K.: Blockchain in logistics and supply chain monitoring. In: Utilizing Blockchain Technologies in Manufacturing and Logistics Management, pp. 104–121. IGI Global (2022)

    Google Scholar 

  29. Singh, S., Choudhary, G., Shandilya, S.K., Sihag, V., Choudhary, A.: Counterfeited product identification in a supply chain using blockchain technology. Res. Briefs Inf. Commun. Technol. Evol. 7, 3 (2021)

    Google Scholar 

Download references

Acknowledgement

This work was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. 2020-0-00952, Development of 5G Edge Security Technology for Ensuring 5G+ Service Stability and Availability, 100%)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ilsun You .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gawde, M.M., Choudhary, G., Shandilya, S.K., Rahman, R.U., Park, H., You, I. (2022). Improvised Model for Blockchain in Distributed Cloud Environment. In: Chen, X., Shen, J., Susilo, W. (eds) Cyberspace Safety and Security. CSS 2022. Lecture Notes in Computer Science, vol 13547. Springer, Cham. https://doi.org/10.1007/978-3-031-18067-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-18067-5_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-18066-8

  • Online ISBN: 978-3-031-18067-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics