Skip to main content
Log in

Decentralizing Privacy Implementation at Cloud Storage Using Blockchain-Based Hybrid Algorithm

  • Research Article-Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

Cloud computing (CC) is a distributed and centralized network of interconnected and interrelated systems that has emerged as an area of incredible impact, potential, and growth in the IT domain. In the last few years, this paradigm has thrived to become the fastest evolutionary segment for business and various industries. Despite the many advantages provided by the cloud, serious challenges related to privacy and security have arisen such as privacy exposure, data loss, manipulation, service-level agreement (SLA) violation, and concerns over the service and deployment models. In this article, a blockchain-based hybrid algorithm is proposed to tackle the privacy inefficiency of existing tools. A novel hybrid technique is used to encrypt data ahead of outsourcing it to data centers, and a unique digital signature is generated at clients and stored on a decentralized set of blocks. A virtual cloud similar to actual cloud service infrastructure was built to test the proposed framework. Despite the additional computational powers needed to run the proposed framework due to blockchain integration, the results show that data integrity and reliability are preserved and user’s privacy is increased. Our results are discussed and benchmarked against the standard privacy tests standards such as changes in the stored data, the negligible overheads on cloud performance, and the data records of the blockchain structure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Kaaniche, N.; Laurent, M.: Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 111, 120–141 (2017)

    Article  Google Scholar 

  2. Urrehman, H.; Yafi, E.; Nazir, M.; Mustafa, K.: Security assurance against cybercrime ransomware. In: International Conference on Intelligent Computing and Optimization, pp. 21–34 (2018)

  3. Solon, O.: Facebook says Cambridge Analytica may have gained 37m more users’ data (2018). https://www.theguardian.com/technology/2018/apr/04/facebook-cambridge-analytica-userdata- latest-more-than-thought

  4. Sahmim, S.; Gharsellaoui, H.: Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review. Procedia Comput. Sci. 112, 1516–1522 (2017)

    Article  Google Scholar 

  5. Modi, C.; Patel, D.; Borisaniya, B.; Patel, A.; Rajarajan, M.: A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63(2), 561–592 (2013)

    Article  Google Scholar 

  6. Darwish, M.; Yafi, E.; Zuhairi, M.F.; Almasri, A.: Privacy and security of cloud computing: a comprehensive review of techniques and challenges. Int. J. Eng. Technol. 7, 239–246 (2018)

    Google Scholar 

  7. Mishra, B.; Jena, D.: Securing files in the cloud. In: 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp. 40–45. IEEE (2016)

  8. Liang, X.; Shetty, S.; Tosh, D.; Kamhoua, C.; Kwiat, K.; Njilla, L.: Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 468–477. IEEE Press (2017)

  9. Zikratov, I.; Kuzmin, A.; Akimenko, V.; Niculichev, V.; Yalansky, L.: Ensuring data integrity using blockchain technology. In: 2017 20th Conference of Open Innovations Association (FRUCT), pp. 534–539. IEEE (2017)

  10. Rashvand, H.; Salah, K.; Calero, J.H.: Distributed security for multi-agent systems–review and applications. In: 2010 IET Information Security, pp. 188–201. IET (2010)

  11. Gajra, N.; Khan, S.S.; Rane, P.: Private cloud security: secured user authentication by using enhanced hybrid algorithm. In: 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014), pp. 1–6. IEEE (2014)

  12. Liu, L.; Xu, B.: Research on information security technology based on blockchain. In: 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 380–384. IEEE (2018)

  13. Sartekin, R.A.; Karabacak, E.; Durgay, Z.; Karaarslan, E.: Blockchain based secure communication application proposal: Cryptouch. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1–4. IEEE (2018)

  14. Guo, R.; Shi, H.; Zhao, Q.; Zheng, D.: Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access 6, 11676–11686 (2018)

    Article  Google Scholar 

  15. Sukhodolskiy, I.; Zapechnikov, S.: A blockchain-based access control system for cloud storage. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 1575–1578. IEEE (2018)

  16. Rifi, N.; Rachkidi, E.; Agoulmine, N. Taher: Towards using blockchain technology for iot data access protection. In: IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1–5. IEEE (2017)

  17. Darwish, M.; Yafi, E.; Habib, R.; Al-Ghamdi, M.: A blockchain-based hybrid algorithm for data privacy at cloud storage. J. Eng. Appl. Sci. 14(17), 6525–6532 (2018)

    Google Scholar 

  18. Puthal, D.; Malik, N.; Mohanty, S.P.; Kougianos, E.; Yang, C.: The blockchain as a decentralized security framework [future directions]. IEEE Consum. Electron. Magaz. 7(2), 18–21 (2018)

    Article  Google Scholar 

  19. Ali, J.; Khalid, A.; Yafi, E.; Musa, S.; Ahmed, W.: Towards a secure behavior modeling for IOT networks using blockchain. In: ICAI Workshops, pp. 244–258 (2019)

  20. Kołodziej Wilczynski, F.C.; Fernandez-Montes, D.: Blockchain secure cloud: a new generation integrated cloud and blockchain platforms–general concepts and challenges. Eur. Cybersecur. J. 4(2), 28–35 (2018)

    Google Scholar 

  21. Subha, T.; Jayashri, S.: Efficient privacy preserving integrity checking model for cloud data storage security. In: 2016 Eighth International Conference on Advanced Computing (ICoAC), pp. 55–60. IEEE (2017)

Download references

Acknowledgements

This research was supported by Short Term Research Grant STRG #17024 of Research and Innovation Center at University of Kuala Lumpur.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eiad Yafi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Darwish, M.A., Yafi, E., Al Ghamdi, M.A. et al. Decentralizing Privacy Implementation at Cloud Storage Using Blockchain-Based Hybrid Algorithm. Arab J Sci Eng 45, 3369–3378 (2020). https://doi.org/10.1007/s13369-020-04394-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-020-04394-w

Keywords

Navigation