Enhancing Cloud Computing Security with Blockchain: A Hybrid Approach to Data Privacy and Integrity

Authors

  • Fan Chen

DOI:

https://doi.org/10.54097/7qtzwc77

Keywords:

Cloud computing, Blockchain, Data privacy, Data integrity, Decentralized security, Multi-tenant systems

Abstract

This paper investigates the use of blockchain technology to enhance security in cloud computing environments, with a particular focus on data privacy and integrity in multi-tenant systems. The research proposes a hybrid security model that integrates blockchain’s decentralized verification mechanisms with traditional encryption techniques to prevent unauthorized data access and tampering. The system architecture leverages blockchain for immutable transaction logging, while encryption ensures confidentiality. Performance metrics, such as breach detection time, data integrity validation, and computational overhead, are analyzed to assess the model's effectiveness. Experimental results demonstrate that the hybrid model significantly enhances data security in cloud environments by reducing breach detection time and improving data integrity. However, the implementation introduces moderate computational overhead, suggesting the need for further optimization for large-scale applications. Future research should explore scaling solutions such as sidechains or sharding to mitigate these challenges.

References

[1] Attaran, M., & Woods, J. (2019). Cloud computing technology: Improving small business performance using the Internet. *Journal of Small Business & Entrepreneurship, 31*(6), 495–519. https://doi.org/10.1080/08276331.2019.1583709

[2] Domingo-Ferrer, J., Farras, O., Ribes-González, J., & Sánchez, D. (2019). Privacy-preserving cloud computing on sensitive data: A survey of methods, products, and challenges. *Computer Communications, 140*, 38–60. https://doi.org/10.1016/j.comcom.2019.03.001

[3] El Kafhali, S., El Mir, I., & Hanini, M. (2022). Security threats, defense mechanisms, challenges, and future directions in cloud computing. *Archives of Computational Methods in Engineering, 29*(1), 223–246. https://doi.org/10.1007/s11831-021-09578-w

[4] Heidari, A., & Navimipour, N. J. (2021). A new SLA-aware method for discovering the cloud services using an improved nature-inspired optimization algorithm. *PeerJ Computer Science, 7*, e539. https://doi.org/10.7717/peerj-cs.539

[5] Wei, P., Wang, D., Zhao, Y., Tyagi, S. K., & Kumar, N. (2020). Blockchain data-based cloud data integrity protection mechanism. *Future Generation Computer Systems, 102*, 902–911. https://doi.org/10.1016/j.future.2019.09.028

[6] Nagasubramanian, G., Sakthivel, R. K., Patan, R., Gandomi, A. H., Sankayya, M., & Balusamy, B. (2020). Securing e-health records using keyless signature infrastructure blockchain technology in the cloud. *Neural Computing and Applications, 32*(3), 639–647. https://doi.org/10.1007/s00521-019-04184-5

[7] Zhu, X., Shi, J., Huang, S., & Zhang, B. (2020). Consensus-oriented cloud manufacturing based on blockchain technology: An exploratory study. *Pervasive and Mobile Computing, 62*, 101113. https://doi.org/10.1016/j.pmcj.2020.101113

[8] Kumar, A. S., Winster, S. G., & Ramesh, R. (2021). Efficient sensitivity-oriented blockchain encryption for improved data security in cloud. *Concurrent Engineering: Research and Applications, 29*(3), 249–257.

https://doi.org/10.1177/1063293X211012085.

[9] Meshram, C., Lee, C. C., Meshram, S. G., & Khan, M. K. (2019). An identity-based encryption technique using a subtree for fuzzy user data sharing under cloud computing environment. *Soft Computing, 23*(24), 13127–13138.

https://doi.org/10.1007/s00500-018-3704-9.

[10] Tahir, M., Sardaraz, M., Mehmood, Z., & Muhammad, S. (2021). CryptoGA: A cryptosystem based on genetic algorithm for cloud data security. *Cluster Computing, 24*(2), 739–752. https://doi.org/10.1007/s10586-020-03151-y.

Downloads

Published

28-09-2024

Issue

Section

Articles

How to Cite

Chen, F. (2024). Enhancing Cloud Computing Security with Blockchain: A Hybrid Approach to Data Privacy and Integrity. Journal of Computing and Electronic Information Management, 14(2), 75-79. https://doi.org/10.54097/7qtzwc77