Abstract
As the number of users using cloud services has increased in recent years, the number of users leaving the group or changing their personal information is often the case. In this paper, a blockchain-based cloud user information management scheme is proposed using stochastic weights to confirm that the information of users receiving cloud services has not been tampered with. The proposed scheme uses color keys to reliably distinguish blockchains of user information in a cloud environment. The quality of service is improved by pasting user attribute information generated using color keys to the front of the blockchain. The proposed scheme uses different color key information and attribute information, so they have the advantage of effectively processing user information in different cloud environments. It also supports lower overhead and higher efficiency compared to traditional techniques that individually add authentication keys to users by authenticating information from multiple users who receive cloud services with color keys. In addition, the proposed scheme allows the provision of reliable real-time cloud services by creating a stochastic sum of weights for the first and last users that make up the cloud. As a result of the performance analysis, the proposed scheme reduced the time of blockchain generation by \(7.9\%\) on average by linking user information to the probability value of user information. Efficiency in managing blockchain-based user information over overlay networks was up to \(11.5\%\) better than using RSA alone, with an average \(7.7\%\) lower overhead.









Similar content being viewed by others
References
Ouaddah A, Elkalam AA, Ouahman AA (2017) Towards a novel privacy-preserving access control model based on blockchain technology in IoT. Proceedings of the Europe and MENA cooperation advances in information and communication technologies, pp 523–533. https://doi.org/10.1007/978-3-319-46568-5_53
Eyal I, Gencer AE, Sirer EG, Renesse RV (2016) Bitcoin-NG: A scalable blockchain protocol. In: Proceedings of the 13th USENIX symposium network system, pp 45–59
Xu LD, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inform 10(4):2233–2243. https://doi.org/10.1109/TII.2014.2300753
Yu FR, Liu JM, He Y, Si PB, Zhang YH (2018) Virtualization for distributed ledger technology (VDLT). IEEE Access 6:25019–25028. https://doi.org/10.1109/ACCESS.2018.2829141
Miller D (2018) Blockchain and the Internet of Things in the industrial sector. IT Prof 20(3):15–18. https://doi.org/10.1109/MITP.2018.032501742
Liang X, Zhao J, Shetty S, Li D (2017) Towards data assurance and resilience in IoT using blockchain. In: Proceedings of the IEEE Military Communications Conference, pp 261–266. https://doi.org/10.1109/MILCOM.2017.8170858
Aitzhan NZ, Svetinovic D (2018) Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans Dependable Secure Comput 15(5):840–852. https://doi.org/10.1109/TDSC.2016.2616861
Teslya N, Ryabchikov I (2017) Blockchain-based platform architecture for industrial IoT. In: Proceedings of the 21st Conference of Open Innovations Association, pp 321–329. https://doi.org/10.23919/FRUCT.2017.8250199
Zheng Z, Xie S, Dai HN, Wang H (2018) Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv 14(4):352–375
Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the Internet of Things. IEEE Access 4:2292–2303
Iansiti M, Lakhani KR (2017) The truth about blockchain. Harvard Bus Rev 95(1):118–127
Haenggi M, Andrews JG, Baccelli F, Dousse O, Franceschetti M (2009) Stochastic geometry and random graphs for the analysis and design of wireless networks. IEEE J Sel Areas Commun 27(7):1029–1046
Smiljkovikj K, Popovski P, Gavrilovska L (2015) Analysis of the decoupled access for downlink and uplink in wireless heterogeneous networks. IEEE Wireless Commun. Lett. 4(2):173–176
Bai T, Heath RW (2015) Coverage and rate analysis for millimeter-wave cellular networks. IEEE Trans Commun 14(2):1100–1114
Zhong Y, Quek TQS, Ge X (2017) Heterogeneous cellular networks with spatio-temporal traffic: Delay analysis and scheduling. IEEE J Sel Areas Commun 35(6):1373–1386
Andrew M, Yu X, Kyle C, Elaine S, Dawn S (2016) The Honey Badger of BFT Protocols. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 31–42. https://doi.org/10.1145/2976749.2978399
Rafael P, Elaine S (2017) FruitChains: a fair blockchain. In: Proceedings of the ACM symposium on principles of distributed computing july 2017, pp 315–324. https://doi.org/10.1145/3087801.3087809
Hary K, Steven G, Xiaoqi C, S. Mathew W, Edward WF (2018) Arbitrum: Scalable, private smart contracts. In: Proceedings of the 27th USENIX Conference on Security Symposium, pp 1353–1370
Janjua K, Ali W (2018) Enhanced secure mechanism for VM migration in clouds. In: Proceedings of the 2018 International Conference on Frontiers of Information Technology (FIT), pp 135–140. https://doi.org/10.1109/FIT.2018.00031
Xu X, Weber I, Staples M, Zhu L, Bosch J, Bass L, Pautasso C, Rimba A (2017) A taxonomy of blockchain-based systems for architecture design. In: Proceedings of the IEEE International Conference on Software Architecture (ICSA17), pp 243–252. https://doi.org/10.1109/ICSA.2017.33
Dorri A, Kanhere S, Jurdak R, Gauravaram P (2017) Blockchain for IoT security and privacy: the case study of a smart home. In: Proceedings of the 2nd IEEE workshop on security, privacy, and trust in the internet of things (PERCOM), pp 618–623. https://doi.org/10.1109/PERCOMW.2017.7917634
Giuseppe A, Randal CB, Reza C, Joseph H, Lea K, Zachary NJ Peterson, Dawn S. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and communications Security, pp 598–609. https://doi.org/10.1145/1315245.1315318
Ari J, Burton S, Kaliski JR (2007) Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 584–597. https://doi.org/10.1145/1315245.1315317
Qian W, Cong W, Kui R, Wenjing L, Jin L (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859. https://doi.org/10.1109/TPDS.2010.183
Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings of the IEEE INFOCOM, pp 1–9. https://doi.org/10.1109/INFCOM.2010.5462173
Zyskind G, Nathan Oz, ’Sandy’ Pentland A (2015) Decentralizing privacy: using blockchain to protect personal data. In: Proceedings of the IEEE security & privacy workshops, pp 180–184. https://doi.org/10.1109/SPW.2015.27
Liu B, Yu XL, Chen S, Xu X, Zhu L (2017) Blockchain based data integrity service framework for IoT data. In: Proceedings of the 2017 IEEE International Conference on Web Services (ICWS), pp 468–475. https://doi.org/10.1109/ICWS.2017.54
Xu C, Wang K, Guo M (2017) Intelligent resource management in blockchain-based cloud datacenters. IEEE Cloud Comput 4(6):50–59
Zheng X, Cai Z, Li Y (2018) Data linkage in smart internet of things systems: a consideration from a privacy perspective. IEEE Commun Mag 56(9):55–61
Sun Y, Zhang L, Feng G, Yang B, Cao B, Imran MA (2019) Blockchain-enabled wireless internet of things: Performance analysis and optimal communication node deployment. IEEE Internet Things J 6(3):5791–5802
Paik HY, Xu X, Dilum Bandara HMN, Lee S, Lo SK (2019) Analysis of data management in blockchain-based systems: from architecture to governance. IEEE Access 7:186091–186107
Keiichi N (2008) A cognitive perspective on social informatics. Int J Soc Humanistic Comput 1(1):28–35. https://doi.org/10.1504/IJSHC.2008.020478
Zheng X (2017) The analytics and applications on supporting big data framework in wireless surveillance networks. Int J Soc Humanistic Comput 2(3/4):141–149. https://doi.org/10.1504/IJSHC.2017.084732
Tseng CH, Chen YH, Jiang YR (2017) The implementation of an automatic web-driven data analysis framework. Int J Soc Humanistic Comput 2(3/4):150–165. https://doi.org/10.1504/IJSHC.2017.084732
Liu M, Yu FR, Teng Y, Leung Victor CM, Song M (2018) Computation offloading and content caching in wireless blockchain networks with mobile edge computing. IEEE Trans Veh Technol 67(11):11008–11021
Liu M, Yu FR, Teng Y, Leung Victor CM, Song M (2019) Distributed resource allocation in blockchain-based video streaming systems with mobile edge computing. IEEE Trans Wireless Commun 18(1):695–708
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jeong, YS., Ahn, BT. An efficient management scheme of blockchain-based cloud user information using probabilistic weighting. J Supercomput 77, 3339–3358 (2021). https://doi.org/10.1007/s11227-020-03396-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-020-03396-7