Skip to main content

Advertisement

Log in

Blockchain Chain Based Cloud Security Using Provable Partitioned Folding Encryption for Integrity Proofing in Cloud Environment

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

In current existences there has been an increase in concentration in the potential of blockchain (BC) technology to transform multiple industries, including cloud security. This study delves into the combination of BC technology and cloud security to improve data protection, authentication, and access control. The unchangeable and decentralized nature of BC suggestions a strong foundation for safeguarding cloud-based systems, reducing the vulnerabilities linked to centralized storage and single points of failure. This research investigates the fundamental principles and mechanisms of blockchain-based cloud security, such as encryption, access control, smart contracts, and disseminated mechanism. The employment of BC technology to safeguard data and transactions in cloud-based environments is referred to as blockchain security in cloud computing (CC). To defend the veracity and security of data stored in the cloud, encryption and decentralised consensus processes are used.The cloud provides decentralized service and communication all over the world through internet services. By increasing open service accessibility and sharing, the personalized information and sensitive data get unauthorized access leads security breaches, data leakage due to improves security concerns. So the security in the sense, the privacy preservation based security is an important concern to protect the sensitive data from unauthorized access. Most existing security failed in cryptographic approaches doe to key leakages and authenticity failures. To resolve this problem we provide a consensus proof of work based block chain principle (CPoW-BCP) based on provable partitioned encryption is implemented to secure the cloud environment in this research demystifying cryptographic hash function (DCHF) is applied to create portioned data block to make encryption using provable partitioned folding encryption (PPFE). With the support of post quantum chain links (PQCL) the block are stamped with randomized key policy and the hash key is updated to master node. Then master integrity proofing authentication (MIPA) verifies the user accessibility to securely handover the data. Finally the integrity proofing verification is carried out by lattice key role verification policy (LKRVP) to ensure the security to handover the data at peer end. Such the system prove the higher security to make verification and authentication to enrich the integrity on security in cloud environment. By comparing the existing system, the proposed proves higher security standard in cloud Computing and privacy standard levels. The findings suggest that block chain-based cloud security offers a promising solution for addressing the evolving threats and vulnerabilities in cloud environments, tiling the path for a further secure and resilient infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data Availability

The dataset generated and analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. Ren J, Li J, Liu H, Qin T. Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT. Tsinghua Sci Technol. 2022;27(4):760–76. https://doi.org/10.26599/TST.2021.9010046.

    Article  Google Scholar 

  2. Bagchi P, et al. Public blockchain-envisioned security scheme using post quantum lattice-based aggregate signature for internet of drones applications. IEEE Trans Veh Technol. 2023;72(8):10393–408. https://doi.org/10.1109/TVT.2023.3260579.

    Article  Google Scholar 

  3. Vangala AKD, Mitra A, Das SK, Park Y. Blockchain-enabled authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks. IEEE Trans Inf Forensics Secur. 2023;18:904–19. https://doi.org/10.1109/TIFS.2022.3231121.

    Article  Google Scholar 

  4. Thakur G, Kumar P, Deepika, Jangirala S, Das AK, Park Y. An effective privacy-preserving blockchain-assisted security protocol for cloud-based digital twin environment. IEEE Access. 2023;11:26877–92. https://doi.org/10.1109/ACCESS.2023.3249116.

    Article  Google Scholar 

  5. Xu S, Ning J, Ma J, Huang X, Deng RH. K-time modifiable and epoch-based redactable blockchain. IEEE Trans Inf Forensics Secur. 2021;16:4507–20. https://doi.org/10.1109/TIFS.2021.3107146.

    Article  Google Scholar 

  6. Singh S, Hosen ASMS, Yoon B. Blockchain security attacks, challenges, and solutions for the future distributed IoT network. IEEE Access. 2021;9:13938–59. https://doi.org/10.1109/ACCESS.2021.3051602.

    Article  Google Scholar 

  7. Ma J, Xu S, Ning J, Huang X, Deng RH. Redactable blockchain in decentralized setting. IEEE Trans Inf Forensics Secur. 2022;17:1227–42. https://doi.org/10.1109/TIFS.2022.3156808.

    Article  Google Scholar 

  8. Bhutta MNM, et al. A survey on blockchain technology: evolution, architecture and security. IEEE Access. 2021;9:61048–73. https://doi.org/10.1109/ACCESS.2021.3072849.

    Article  Google Scholar 

  9. Das K, Bera B, Saha S, Kumar N, You I, Chao H-C. AI-envisioned blockchain-enabled signature-based key management scheme for industrial cyber-physical systems. IEEE Internet Things J. 2022;9(9):6374–88. https://doi.org/10.1109/JIOT.2021.3109314.

    Article  Google Scholar 

  10. Rathore S, Park JH, Chang H. Deep learning and blockchain-empowered security framework for intelligent 5G-enabled IoT. IEEE Access. 2021;9:90075–83. https://doi.org/10.1109/ACCESS.2021.3077069.

    Article  Google Scholar 

  11. Zhou Z, Tian Y, Xiong J, Ma J, Peng C. Blockchain-enabled secure and trusted federated data sharing in IIoT. IEEE Trans Industr Inf. 2023;19(5):6669–81. https://doi.org/10.1109/TII.2022.3215192.

    Article  Google Scholar 

  12. Khan A, et al. Data security in healthcare industrial internet of things with blockchain. IEEE Sens J. 2023;23(20):25144–51. https://doi.org/10.1109/JSEN.2023.3273851.

    Article  Google Scholar 

  13. Vangala A, Sutrala K, Das AK, Jo M. Smart contract-based blockchain-envisioned authentication scheme for smart farming. IEEE Internet Things J. 2021;8(13):10792–806. https://doi.org/10.1109/JIOT.2021.3050676.

    Article  Google Scholar 

  14. Chattaraj D, Bera B, Das AK, Rodrigues JJPC, Park Y. Designing fine-grained access control for software-defined networks using private blockchain. IEEE Internet Things J. 2022;9(2):1542–59. https://doi.org/10.1109/JIOT.2021.3088115.

    Article  Google Scholar 

  15. Wang Z, Chen Q, Liu L. Permissioned blockchain-based secure and privacy-preserving data sharing protocol. IEEE Internet Things J. 2023;10(12):10698–707. https://doi.org/10.1109/JIOT.2023.3242959.

    Article  Google Scholar 

  16. Zhang R, Xue R, Liu L. Security and privacy for healthcare blockchains. IEEE Trans Serv Comput. 2022;15(6):3668–86. https://doi.org/10.1109/TSC.2021.3085913.

    Article  Google Scholar 

  17. Wang Z, Lin J, Cai Q, Wang Q, Zha D, Jing J. Blockchain-based certificate transparency and revocation transparency. IEEE Trans Depend Secure Comput. 2022;19(1):681–97. https://doi.org/10.1109/TDSC.2020.2983022.

    Article  Google Scholar 

  18. Abdella J, Tari Z, Anwar A, Mahmood A, Han F. An architecture and performance evaluation of blockchain-based peer-to-peer energy trading. IEEE Trans Smart Grid. 2021;12(4):3364–78. https://doi.org/10.1109/TSG.2021.3056147.

    Article  Google Scholar 

  19. Zhaofeng M, Xiaochang W, Jain DK, Khan H, Hongmin G, Zhen W. A blockchain-based trusted data management scheme in edge computing. IEEE Trans Indus Inf. 2020;16(3):2013–21. https://doi.org/10.1109/TII.2019.2933482.

    Article  Google Scholar 

  20. Rosa MG, Anastasova S, Yang GZ. NFC-powered implantable device for on-body parameters monitoring with secure data exchange link to a medical blockchain type of network. IEEE Trans Cybern. 2023;53(1):31–43. https://doi.org/10.1109/TCYB.2021.3088711.

    Article  Google Scholar 

  21. Goh Y, Yun J, Jung D, Chung J-M. Secure trust-based delegated consensus for blockchain frameworks using deep reinforcement learning. IEEE Access. 2022;10:118498–511. https://doi.org/10.1109/ACCESS.2022.3220852.

    Article  Google Scholar 

  22. Das S, Banerjee P, Chatterjee U, Ghosh U. Biswas. A secure blockchain enabled V2V communication system using smart contracts. IEEE Trans Intell Transp Syst. 2023;24(4):4651–60. https://doi.org/10.1109/TITS.2022.3226626.

    Article  Google Scholar 

  23. Liu Q, Liu Y, Luo M, He D, Wang H, Choo K-KR. The security of blockchain-based medical systems: research challenges and opportunities. IEEE Syst J. 2022;16(4):5741–52. https://doi.org/10.1109/JSYST.2022.3155156.

    Article  Google Scholar 

  24. Li X, Yin X, Ning J. Trustworthy announcement dissemination scheme with blockchain-assisted vehicular cloud. IEEE Trans Intell Transp Syst. 2023;24(2):1786–800. https://doi.org/10.1109/TITS.2022.3220580.

    Article  Google Scholar 

  25. Mallah RA, López D, Farooq B. Cyber-security risk assessment framework for blockchains in smart mobility. IEEE Open J Intell Transp Syst. 2021;2:294–311. https://doi.org/10.1109/OJITS.2021.3106863.

    Article  Google Scholar 

  26. Leng J, Zhou M, Zhao JL, Huang Y, Bian Y. Blockchain security: a survey of techniques and research directions. IEEE Trans Serv Comput. 2022;15(4):2490–510. https://doi.org/10.1109/TSC.2020.3038641.

    Article  Google Scholar 

  27. Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y. Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Depend Secure Comput. 2019;16(6):996–1010. https://doi.org/10.1109/TDSC.2017.2725953.

    Article  Google Scholar 

  28. Lan C, Wang H, Li H, Liu L. Comments on “attribute-based data sharing scheme revisited in cloud computing.” IEEE Trans Inf Forensics Secur. 2021;16:2579–80. https://doi.org/10.1109/TIFS.2021.3058758.

    Article  Google Scholar 

  29. Nhlabatsi, et al. Threat-specific security risk evaluation in the cloud. IEEE Trans Cloud Comput. 2021;9(2):793–806. https://doi.org/10.1109/TCC.2018.2883063.

    Article  Google Scholar 

  30. Halabi T, Bellaiche M. Towards security-based formation of cloud federations: a game theoretical approach. IEEE Trans Cloud Comput. 2020;8(3):928–42. https://doi.org/10.1109/TCC.2018.2820715.

    Article  Google Scholar 

  31. Jin H, Li Z, Zou D, Yuan B. DSEOM: a framework for dynamic security evaluation and optimization of MTD in container-based cloud. IEEE Trans Depend Secure Comput. 2021;18(3):1125–36. https://doi.org/10.1109/TDSC.2019.2916666.

    Article  Google Scholar 

  32. Wu P, Ning J, Luo W, Huang X, He D. Exploring dynamic task loading in SGX-based distributed computing. IEEE Trans Serv Comput. 2023;16(1):288–301. https://doi.org/10.1109/TSC.2021.3123511.

    Article  Google Scholar 

  33. Yang C, Liu Y, Tao X, Zhao F. Publicly verifiable and efficient fine-grained data deletion scheme in cloud computing. IEEE Access. 2020;8:99393–403. https://doi.org/10.1109/ACCESS.2020.2997351.

    Article  Google Scholar 

  34. Shin J-S, Kim J. SmartX multi-sec: a visibility-centric multi-tiered security framework for multi-site cloud-native edge clusters. IEEE Access. 2021;9:134208–22. https://doi.org/10.1109/ACCESS.2021.3115523.

    Article  Google Scholar 

  35. Tian S, Chang C, Long S, Oh S, Li Z, Long J. User preference-based hierarchical offloading for collaborative cloud-edge computing. IEEE Trans Serv Comput. 2023;16(1):684–97. https://doi.org/10.1109/TSC.2021.3128603.

    Article  Google Scholar 

  36. Zhong H, Zhang C, Cui J, Xu Y, Liu L. Authentication and key agreement based on anonymous identity for peer-to-peer cloud. IEEE Trans Cloud Comput. 2022;10(3):1592–603. https://doi.org/10.1109/TCC.2020.3004334.

    Article  Google Scholar 

  37. Li J, Ma J, Miao Y, Yang R, Liu X, Choo K-KR. Practical multi-keyword ranked search with access control over encrypted cloud data. IEEE Trans Cloud Comput. 2022;10(3):2005–19. https://doi.org/10.1109/TCC.2020.3024226.

    Article  Google Scholar 

  38. Li Y, et al. Traceable and controllable encrypted cloud image search in multi-user settings. IEEE Trans Cloud Comput. 2022;10(4):2936–48. https://doi.org/10.1109/TCC.2020.3034232.

    Article  Google Scholar 

  39. Zhang X, Zhao J, Xu C, Wang H, Zhang Y. DOPIV: post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage. IEEE Trans Serv Comput. 2022;15(1):334–45. https://doi.org/10.1109/TSC.2019.2942297.

    Article  Google Scholar 

  40. Huang X, Xiong H, Chen J, Yang M. Efficient revocable storage attribute-based encryption with arithmetic span programs in cloud-assisted internet of things. IEEE Trans Cloud Comput. 2023;11(2):1273–85. https://doi.org/10.1109/TCC.2021.3131686.

    Article  Google Scholar 

Download references

Acknowledgements

The author would like to thank Sathyabama Institute of Science and Technology, Chennai. Tamilnadu, India for the encouragement and support provided to carry out this research work.

Funding

No funding received for this research.

Author information

Authors and Affiliations

Authors

Contributions

This research endeavor was made possible by the contributions of an author.

Corresponding author

Correspondence to P. Tamilselvi.

Ethics declarations

Conflict of Interest

No conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tamilselvi, P. Blockchain Chain Based Cloud Security Using Provable Partitioned Folding Encryption for Integrity Proofing in Cloud Environment. SN COMPUT. SCI. 5, 1141 (2024). https://doi.org/10.1007/s42979-024-03487-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-03487-9

Keywords

Navigation