Abstract
In current existences there has been an increase in concentration in the potential of blockchain (BC) technology to transform multiple industries, including cloud security. This study delves into the combination of BC technology and cloud security to improve data protection, authentication, and access control. The unchangeable and decentralized nature of BC suggestions a strong foundation for safeguarding cloud-based systems, reducing the vulnerabilities linked to centralized storage and single points of failure. This research investigates the fundamental principles and mechanisms of blockchain-based cloud security, such as encryption, access control, smart contracts, and disseminated mechanism. The employment of BC technology to safeguard data and transactions in cloud-based environments is referred to as blockchain security in cloud computing (CC). To defend the veracity and security of data stored in the cloud, encryption and decentralised consensus processes are used.The cloud provides decentralized service and communication all over the world through internet services. By increasing open service accessibility and sharing, the personalized information and sensitive data get unauthorized access leads security breaches, data leakage due to improves security concerns. So the security in the sense, the privacy preservation based security is an important concern to protect the sensitive data from unauthorized access. Most existing security failed in cryptographic approaches doe to key leakages and authenticity failures. To resolve this problem we provide a consensus proof of work based block chain principle (CPoW-BCP) based on provable partitioned encryption is implemented to secure the cloud environment in this research demystifying cryptographic hash function (DCHF) is applied to create portioned data block to make encryption using provable partitioned folding encryption (PPFE). With the support of post quantum chain links (PQCL) the block are stamped with randomized key policy and the hash key is updated to master node. Then master integrity proofing authentication (MIPA) verifies the user accessibility to securely handover the data. Finally the integrity proofing verification is carried out by lattice key role verification policy (LKRVP) to ensure the security to handover the data at peer end. Such the system prove the higher security to make verification and authentication to enrich the integrity on security in cloud environment. By comparing the existing system, the proposed proves higher security standard in cloud Computing and privacy standard levels. The findings suggest that block chain-based cloud security offers a promising solution for addressing the evolving threats and vulnerabilities in cloud environments, tiling the path for a further secure and resilient infrastructure.







Similar content being viewed by others
Data Availability
The dataset generated and analyzed during the current study are available from the corresponding author on reasonable request.
References
Ren J, Li J, Liu H, Qin T. Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT. Tsinghua Sci Technol. 2022;27(4):760–76. https://doi.org/10.26599/TST.2021.9010046.
Bagchi P, et al. Public blockchain-envisioned security scheme using post quantum lattice-based aggregate signature for internet of drones applications. IEEE Trans Veh Technol. 2023;72(8):10393–408. https://doi.org/10.1109/TVT.2023.3260579.
Vangala AKD, Mitra A, Das SK, Park Y. Blockchain-enabled authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks. IEEE Trans Inf Forensics Secur. 2023;18:904–19. https://doi.org/10.1109/TIFS.2022.3231121.
Thakur G, Kumar P, Deepika, Jangirala S, Das AK, Park Y. An effective privacy-preserving blockchain-assisted security protocol for cloud-based digital twin environment. IEEE Access. 2023;11:26877–92. https://doi.org/10.1109/ACCESS.2023.3249116.
Xu S, Ning J, Ma J, Huang X, Deng RH. K-time modifiable and epoch-based redactable blockchain. IEEE Trans Inf Forensics Secur. 2021;16:4507–20. https://doi.org/10.1109/TIFS.2021.3107146.
Singh S, Hosen ASMS, Yoon B. Blockchain security attacks, challenges, and solutions for the future distributed IoT network. IEEE Access. 2021;9:13938–59. https://doi.org/10.1109/ACCESS.2021.3051602.
Ma J, Xu S, Ning J, Huang X, Deng RH. Redactable blockchain in decentralized setting. IEEE Trans Inf Forensics Secur. 2022;17:1227–42. https://doi.org/10.1109/TIFS.2022.3156808.
Bhutta MNM, et al. A survey on blockchain technology: evolution, architecture and security. IEEE Access. 2021;9:61048–73. https://doi.org/10.1109/ACCESS.2021.3072849.
Das K, Bera B, Saha S, Kumar N, You I, Chao H-C. AI-envisioned blockchain-enabled signature-based key management scheme for industrial cyber-physical systems. IEEE Internet Things J. 2022;9(9):6374–88. https://doi.org/10.1109/JIOT.2021.3109314.
Rathore S, Park JH, Chang H. Deep learning and blockchain-empowered security framework for intelligent 5G-enabled IoT. IEEE Access. 2021;9:90075–83. https://doi.org/10.1109/ACCESS.2021.3077069.
Zhou Z, Tian Y, Xiong J, Ma J, Peng C. Blockchain-enabled secure and trusted federated data sharing in IIoT. IEEE Trans Industr Inf. 2023;19(5):6669–81. https://doi.org/10.1109/TII.2022.3215192.
Khan A, et al. Data security in healthcare industrial internet of things with blockchain. IEEE Sens J. 2023;23(20):25144–51. https://doi.org/10.1109/JSEN.2023.3273851.
Vangala A, Sutrala K, Das AK, Jo M. Smart contract-based blockchain-envisioned authentication scheme for smart farming. IEEE Internet Things J. 2021;8(13):10792–806. https://doi.org/10.1109/JIOT.2021.3050676.
Chattaraj D, Bera B, Das AK, Rodrigues JJPC, Park Y. Designing fine-grained access control for software-defined networks using private blockchain. IEEE Internet Things J. 2022;9(2):1542–59. https://doi.org/10.1109/JIOT.2021.3088115.
Wang Z, Chen Q, Liu L. Permissioned blockchain-based secure and privacy-preserving data sharing protocol. IEEE Internet Things J. 2023;10(12):10698–707. https://doi.org/10.1109/JIOT.2023.3242959.
Zhang R, Xue R, Liu L. Security and privacy for healthcare blockchains. IEEE Trans Serv Comput. 2022;15(6):3668–86. https://doi.org/10.1109/TSC.2021.3085913.
Wang Z, Lin J, Cai Q, Wang Q, Zha D, Jing J. Blockchain-based certificate transparency and revocation transparency. IEEE Trans Depend Secure Comput. 2022;19(1):681–97. https://doi.org/10.1109/TDSC.2020.2983022.
Abdella J, Tari Z, Anwar A, Mahmood A, Han F. An architecture and performance evaluation of blockchain-based peer-to-peer energy trading. IEEE Trans Smart Grid. 2021;12(4):3364–78. https://doi.org/10.1109/TSG.2021.3056147.
Zhaofeng M, Xiaochang W, Jain DK, Khan H, Hongmin G, Zhen W. A blockchain-based trusted data management scheme in edge computing. IEEE Trans Indus Inf. 2020;16(3):2013–21. https://doi.org/10.1109/TII.2019.2933482.
Rosa MG, Anastasova S, Yang GZ. NFC-powered implantable device for on-body parameters monitoring with secure data exchange link to a medical blockchain type of network. IEEE Trans Cybern. 2023;53(1):31–43. https://doi.org/10.1109/TCYB.2021.3088711.
Goh Y, Yun J, Jung D, Chung J-M. Secure trust-based delegated consensus for blockchain frameworks using deep reinforcement learning. IEEE Access. 2022;10:118498–511. https://doi.org/10.1109/ACCESS.2022.3220852.
Das S, Banerjee P, Chatterjee U, Ghosh U. Biswas. A secure blockchain enabled V2V communication system using smart contracts. IEEE Trans Intell Transp Syst. 2023;24(4):4651–60. https://doi.org/10.1109/TITS.2022.3226626.
Liu Q, Liu Y, Luo M, He D, Wang H, Choo K-KR. The security of blockchain-based medical systems: research challenges and opportunities. IEEE Syst J. 2022;16(4):5741–52. https://doi.org/10.1109/JSYST.2022.3155156.
Li X, Yin X, Ning J. Trustworthy announcement dissemination scheme with blockchain-assisted vehicular cloud. IEEE Trans Intell Transp Syst. 2023;24(2):1786–800. https://doi.org/10.1109/TITS.2022.3220580.
Mallah RA, López D, Farooq B. Cyber-security risk assessment framework for blockchains in smart mobility. IEEE Open J Intell Transp Syst. 2021;2:294–311. https://doi.org/10.1109/OJITS.2021.3106863.
Leng J, Zhou M, Zhao JL, Huang Y, Bian Y. Blockchain security: a survey of techniques and research directions. IEEE Trans Serv Comput. 2022;15(4):2490–510. https://doi.org/10.1109/TSC.2020.3038641.
Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y. Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Depend Secure Comput. 2019;16(6):996–1010. https://doi.org/10.1109/TDSC.2017.2725953.
Lan C, Wang H, Li H, Liu L. Comments on “attribute-based data sharing scheme revisited in cloud computing.” IEEE Trans Inf Forensics Secur. 2021;16:2579–80. https://doi.org/10.1109/TIFS.2021.3058758.
Nhlabatsi, et al. Threat-specific security risk evaluation in the cloud. IEEE Trans Cloud Comput. 2021;9(2):793–806. https://doi.org/10.1109/TCC.2018.2883063.
Halabi T, Bellaiche M. Towards security-based formation of cloud federations: a game theoretical approach. IEEE Trans Cloud Comput. 2020;8(3):928–42. https://doi.org/10.1109/TCC.2018.2820715.
Jin H, Li Z, Zou D, Yuan B. DSEOM: a framework for dynamic security evaluation and optimization of MTD in container-based cloud. IEEE Trans Depend Secure Comput. 2021;18(3):1125–36. https://doi.org/10.1109/TDSC.2019.2916666.
Wu P, Ning J, Luo W, Huang X, He D. Exploring dynamic task loading in SGX-based distributed computing. IEEE Trans Serv Comput. 2023;16(1):288–301. https://doi.org/10.1109/TSC.2021.3123511.
Yang C, Liu Y, Tao X, Zhao F. Publicly verifiable and efficient fine-grained data deletion scheme in cloud computing. IEEE Access. 2020;8:99393–403. https://doi.org/10.1109/ACCESS.2020.2997351.
Shin J-S, Kim J. SmartX multi-sec: a visibility-centric multi-tiered security framework for multi-site cloud-native edge clusters. IEEE Access. 2021;9:134208–22. https://doi.org/10.1109/ACCESS.2021.3115523.
Tian S, Chang C, Long S, Oh S, Li Z, Long J. User preference-based hierarchical offloading for collaborative cloud-edge computing. IEEE Trans Serv Comput. 2023;16(1):684–97. https://doi.org/10.1109/TSC.2021.3128603.
Zhong H, Zhang C, Cui J, Xu Y, Liu L. Authentication and key agreement based on anonymous identity for peer-to-peer cloud. IEEE Trans Cloud Comput. 2022;10(3):1592–603. https://doi.org/10.1109/TCC.2020.3004334.
Li J, Ma J, Miao Y, Yang R, Liu X, Choo K-KR. Practical multi-keyword ranked search with access control over encrypted cloud data. IEEE Trans Cloud Comput. 2022;10(3):2005–19. https://doi.org/10.1109/TCC.2020.3024226.
Li Y, et al. Traceable and controllable encrypted cloud image search in multi-user settings. IEEE Trans Cloud Comput. 2022;10(4):2936–48. https://doi.org/10.1109/TCC.2020.3034232.
Zhang X, Zhao J, Xu C, Wang H, Zhang Y. DOPIV: post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage. IEEE Trans Serv Comput. 2022;15(1):334–45. https://doi.org/10.1109/TSC.2019.2942297.
Huang X, Xiong H, Chen J, Yang M. Efficient revocable storage attribute-based encryption with arithmetic span programs in cloud-assisted internet of things. IEEE Trans Cloud Comput. 2023;11(2):1273–85. https://doi.org/10.1109/TCC.2021.3131686.
Acknowledgements
The author would like to thank Sathyabama Institute of Science and Technology, Chennai. Tamilnadu, India for the encouragement and support provided to carry out this research work.
Funding
No funding received for this research.
Author information
Authors and Affiliations
Contributions
This research endeavor was made possible by the contributions of an author.
Corresponding author
Ethics declarations
Conflict of Interest
No conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Tamilselvi, P. Blockchain Chain Based Cloud Security Using Provable Partitioned Folding Encryption for Integrity Proofing in Cloud Environment. SN COMPUT. SCI. 5, 1141 (2024). https://doi.org/10.1007/s42979-024-03487-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-03487-9