Skip to main content

Unleashing Trustworthy Cloud Storage: Harnessing Blockchain for Cloud Data Integrity Verification

  • Conference paper
  • First Online:
Advances in Visual Informatics (IVIC 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14322))

Included in the following conference series:

  • 637 Accesses

Abstract

This position paper explores the transformative potential of blockchain technology in ensuring data integrity within cloud storage systems. The increasing adoption of cloud storage services has raised concerns about the security and integrity of stored data. In this paper, we argue that integrating blockchain technology into cloud data integrity verification schemes offers a robust and decentralized solution. Through a comprehensive review of relevant literature, we examine the benefits and challenges associated with this approach. Our analysis reveals that blockchain-based data integrity verification schemes provide tamper-proof and transparent mechanisms, enhancing trust and security in cloud storage environments. We further discuss the potential impact of this integration on data privacy, scalability, and performance. While acknowledging the current limitations and ongoing research efforts, we propose that embracing blockchain for cloud data integrity verification can foster a new era of trustworthy and reliable cloud storage systems. This position paper aims to stimulate further discussion and research on the transformative role of blockchain in ensuring data integrity within the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Atieh, A.T.: The next generation cloud technologies: a review on distributed cloud, fog and edge computing and their opportunities and challenges. Res. Berg Rev. Sci. Technol. 1, 1–15 (2021)

    Google Scholar 

  2. Haque, A.K.M.B., Bhushan, B., Dhiman, G.: Conceptualizing smart city applications: requirements, architecture, security issues, and emerging trends. Expert. Syst. 39, e12753 (2022). https://doi.org/10.1111/EXSY.12753

    Article  Google Scholar 

  3. Saxena, S., Bhushan, B., Ahad, M.A.: Blockchain based solutions to secure IoT: background, integration trends and a way forward. J. Netw. Comput. Appl. 181, 103050 (2021). https://doi.org/10.1016/J.JNCA.2021.103050

    Article  Google Scholar 

  4. Mughal, A.A.: Well-architected wireless network security. J. Human. Appl. Sci. Res. 5, 32–42 (2022)

    Google Scholar 

  5. Gong, J., Navimipour, N.J.: An in-depth and systematic literature review on the blockchain-based approaches for cloud computing. Cluster Comput. 25, 383–400 (2022). https://doi.org/10.1007/S10586-021-03412-2/METRICS

    Article  Google Scholar 

  6. Gupta, R., Kumari, A., Tanwar, S.: A taxonomy of blockchain envisioned edge-as-a-connected autonomous vehicles. Trans. Emerg. Telecommun. Technol. 32, e4009 (2021). https://doi.org/10.1002/ETT.4009

    Article  Google Scholar 

  7. Bagloee, S.A., Heshmati, M., Dia, H., Ghaderi, H., Pettit, C., Asadi, M.: Blockchain: the operating system of smart cities. Cities 112, 103104 (2021). https://doi.org/10.1016/J.CITIES.2021.103104

    Article  Google Scholar 

  8. Yaqoob, I., Salah, K., Jayaraman, R., Al-Hammadi, Y.: Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Comput. Appl. 34, 11475–11490 (2022). https://doi.org/10.1007/S00521-020-05519-W/METRICS

    Article  Google Scholar 

  9. Xia, W., et al.: A comprehensive study of the past, present, and future of data deduplication. Proc. IEEE 104, 1681–1710 (2016). https://doi.org/10.1109/JPROC.2016.2571298

    Article  Google Scholar 

  10. Tabrizchi, H., Kuchaki, R.M.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76, 9493–9532 (2020). https://doi.org/10.1007/S11227-020-03213-1/METRICS

    Article  Google Scholar 

  11. Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) Advances in Cryptology – ASIACRYPT 2009. LNCS, vol. 5912, pp. 319–333. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10366-7_19

    Chapter  Google Scholar 

  12. Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 362–375 (2013). https://doi.org/10.1109/TC.2011.245

    Article  MathSciNet  MATH  Google Scholar 

  13. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Decentralized business review (2008)

    Google Scholar 

  14. Guo, H., Yu, X.: A survey on blockchain technology and its security. Blockchain Res. App. 3(2), 100067 (2022). https://doi.org/10.1016/j.bcra.2022.100067

    Article  Google Scholar 

  15. Zhu, J., Chen, H., Pan, P.: A novel rate control algorithm for low latency video coding base on mobile edge cloud computing. Comput. Commun. 187, 134–143 (2022). https://doi.org/10.1016/J.COMCOM.2022.02.009

    Article  Google Scholar 

  16. Ometov, A., Molua, O.L., Komarov, M., Nurmi, J.: A survey of security in cloud, edge, and fog computing. Sensors 22(3), 927 (2022). https://doi.org/10.3390/s22030927

    Article  Google Scholar 

  17. Boobalan, P., et al.: Fusion of federated learning and industrial internet of things: a survey. Comput. Netw. 212, 109048 (2022). https://doi.org/10.1016/J.COMNET.2022.109048

    Article  Google Scholar 

  18. Xie, M., Yu, Y., Chen, R., Li, H., Wei, J., Sun, Q.: Accountable outsourcing data storage atop blockchain. Comput. Stand Interfaces 82, 103628 (2022). https://doi.org/10.1016/J.CSI.2022.103628

    Article  Google Scholar 

  19. Huang, H., Chen, X., Wang, J.: Blockchain-based multiple groups data sharing with anonymity and traceability. Sci. China Inf. Sci. 63, 1–13 (2020). https://doi.org/10.1007/S11432-018-9781-0/METRICS

    Article  MathSciNet  Google Scholar 

  20. Lu, N., Zhang, Y., Shi, W., Kumari, S.: Security KC-C. A secure and scalable data integrity auditing scheme based on hyperledger fabric. Elsevier 92, 101741 (2020). https://doi.org/10.1016/j.cose.2020.101741

  21. Yu, H., Yang, Z., Tu, S., Waqas, M., Liu, H.: Blockchain-based offline auditing for the cloud in vehicular networks. IEEE Trans. Netw. Serv. Manage. 19, 2944–2956 (2022). https://doi.org/10.1109/TNSM.2022.3164549

    Article  Google Scholar 

  22. Zhao, Q., Chen, S., Liu, Z., Baker, T.: YZ-IP: blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Inf. Process. Manage. 57, 102355 (2020)

    Article  Google Scholar 

  23. Huang, P., Fan, K., Yang, H., Zhang, K., Li, H., Yang, Y.: A collaborative auditing blockchain for trustworthy data integrity in cloud storage system. IEEE Access 8, 94780–94794 (2020). https://doi.org/10.1109/ACCESS.2020.2993606

    Article  Google Scholar 

  24. Zhang, C., Xu, Y., Hu, Y., Wu, J., Ren, J., Zhang, Y.: A Blockchain-based multi-cloud storage data auditing scheme to locate faults. IEEE Trans. Cloud Comput. 10, 2252–2263 (2022). https://doi.org/10.1109/TCC.2021.3057771

    Article  Google Scholar 

  25. Zhang, Y., Geng, H., Su, L., Lu, L.: A blockchain-based efficient data integrity verification scheme in multi-cloud storage. IEEE Access 10, 105920–105929 (2022). https://doi.org/10.1109/ACCESS.2022.3211391

    Article  Google Scholar 

  26. Xie, G., Liu, Y., Xin, G., Yang, Q.: Blockchain-based cloud data integrity verification scheme with high efficiency. Secur. Commun. Netw. 10, 105920–105929 (2021). https://doi.org/10.1155/2021/9921209

    Article  Google Scholar 

  27. Zhou, Z.: A scalable blockchain-based integrity verification scheme. Wirel. Commun. Mob. Comput. 2022, 1–13 (2022). https://doi.org/10.1155/2022/7830508

    Article  Google Scholar 

  28. Li, J., Wu, J., Jiang, G., Srikanthan, T.: Blockchain-based public auditing for big data in cloud storage. Inf. Process. Manage. 57, 102382 (2020). https://doi.org/10.1016/j.ipm.2020.102382

    Article  Google Scholar 

  29. Liu, Z., Ren, L., Feng, Y., Wang, S., Wei, J.: Data integrity audit scheme based on quad Merkle tree and blockchain. IEEE Access (2023).https://doi.org/10.1109/ACCESS.2023.3240066

  30. Li, X., Yi, Z., Li, R., Wang, X.-A., Li, H., Yang, X.: SM2-based offline/online efficient data integrity verification scheme for multiple application scenarios. Sensors 23(9), 4307 (2023). https://doi.org/10.3390/s23094307

    Article  Google Scholar 

  31. He, K., Huang, C., Shi, J., Hu, X., Fan, X.: Enabling decentralized and dynamic data integrity verification for secure cloud storage via T-Merkle hash tree based blockchain. Mob. Inf. Syst. 2021, 1–17 (2021). https://doi.org/10.1155/2021/9977744

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenxiang Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Z., Ahmad, M.N., Jin, Y., Haipei, W., Zhantu, L. (2024). Unleashing Trustworthy Cloud Storage: Harnessing Blockchain for Cloud Data Integrity Verification. In: Badioze Zaman, H., et al. Advances in Visual Informatics. IVIC 2023. Lecture Notes in Computer Science, vol 14322. Springer, Singapore. https://doi.org/10.1007/978-981-99-7339-2_37

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7339-2_37

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7338-5

  • Online ISBN: 978-981-99-7339-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics