Skip to main content
Log in

Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The rise of cloud computing has transformed the way data is stored and managed, yet it has also brought about major security issues, especially concerning the secure transfer of data within cloud systems. In response to these challenges, this research develops a comprehensive cyber-security trust model that provides multi-risk protection for secure data transmission in cloud computing, ensuring the highest level of privacy and data security. This innovative approach aims to ensure the secure transmission of data in cloud computing while harnessing the combined strengths of Quantum Key Distribution (QKD) and Advanced Encryption Algorithm. As cloud environments become integral to modern business operations, safeguarding data against a multitude of security risks, including traditional and emerging threats, is paramount. The Cyber-Security Trust Model leverages blockchain to establish a transparent and tamper-resistant ledger of all data transactions within the cloud. This blockchain layer enhances data integrity, auditability, and traceability while also providing a decentralized and trust-based framework for authentication and authorization. The Multi-Risk Protection Model incorporates both Quantum Key Distribution (QKD) and a Modified Advanced Encryption Standard (MAES) to offer multi-layered defence mechanisms. Through rigorous testing and analysis, this study demonstrates the feasibility and effectiveness of the proposed Cyber-Security Trust Model with a Merkle tree-based solution for data integrity verification. It makes a significant impact on the field of secure data transmission in cloud computing by providing strong protection against a constantly changing set of security threats. MATLAB is employed to conduct rigorous experiments, analyse results, and validate the model’s performance in various cloud computing scenarios. The findings of the proposed study show the proposed method, combining Quantum Key Distribution (QKD) and Modified AES (MAES), stands out with exceptional performance, featuring encryption and decryption times of 2.25ms and 1.071ms, respectively. The proposed system outperforms all others, boasting an impressive accuracy rate of 99.84%. This research signifies a ground-breaking advancement in cloud computing security, addressing a spectrum of traditional and emerging threats through a multi-risk protection model incorporating Quantum Key Distribution (QKD) and MAES while demonstrating exceptional performance in rigorous experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

No datasets were generated or analysed during the current study.

References

  1. Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R., Jolfaei, A., Islam, A.N.: A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare systems. J. Parallel Distrib. Comput. 172, 69–83 (2023)

    Article  Google Scholar 

  2. Serbanescu, D., Min, P.: Main principles and possible solutions to solve the specifics of Emergency Planning for multi-risk unregulated radioactive sources

  3. Al-Jumaili, A.H.A., Muniyandi, R.C., Hasan, M.K., Paw, J.K.S., Singh, M.J.: Big Data Analytics using Cloud Computing based frameworks for Power Management systems: Status, constraints, and future recommendations. Sensors. 23(6), 2952 (2023)

    Article  Google Scholar 

  4. Zubaydi, H.D., Varga, P., Molnár, S.: Leveraging Blockchain Technology for Ensuring security and privacy aspects in internet of things: A systematic literature review. Sensors. 23(2), 788 (2023)

    Article  Google Scholar 

  5. Selvarajan, S., Srivastava, G., Khadidos, A.O., Khadidos, A.O., Baza, M., Alshehri, A., Lin, J.C.W.: An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. Journal of Cloud Computing, 12(1), p.38. (2023)

  6. Yazdinejad, A., Dehghantanha, A., Parizi, R.M., Srivastava, G., Karimipour, H.: Secure intelligent fuzzy blockchain framework: Effective threat detection in IoT networks. Comput. Ind. 144, 103801 (2023)

    Article  Google Scholar 

  7. Khan, A.A., Laghari, A.A., Shaikh, Z.A., Dacko-Pikiewicz, Z., Kot, S.: Internet of Things (IoT) Security with Blockchain Technology: A state-of-the-art Review. IEEE Access (2022)

  8. Zapatero, V., van Leent, T., Arnon-Friedman, R., Liu, W.Z., Zhang, Q., Weinfurter, H., Curty, M.: Advances in device-independent quantum key distribution. npj Quantum Information, 9(1), p.10. (2023)

  9. Primaatmaja, I.W., Goh, K.T., Tan, E.Y.Z., Khoo, J.T.F., Ghorai, S., Lim, C.C.W.: Security of device-independent quantum key distribution protocols: A review. Quantum. 7, 932 (2023)

    Article  Google Scholar 

  10. Tanwar, S., Gupta, N., Iwendi, C., Kumar, K., Alenezi, M.: Next-generation IoT and blockchain integration. Journal of Sensors, 2022. (2022)

  11. Hubbard, D.W., Seiersen, R.: How to Measure Anything in Cybersecurity risk. Wiley (2023)

  12. Shaikh, F.A., Siponen, M.: Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers Secur. 124, 102974 (2023)

    Article  Google Scholar 

  13. Alemami, Y., Mohamed, M.A., Atiewi, S.: Advanced approach for encryption using advanced encryption standard with chaotic map. Int. J. Electr. Comput. Eng. 13, 1708–1723 (2023)

    Google Scholar 

  14. Putra, R.A., Yupianti, Y., Prasetyo, E.: Android-based text message encryption and decryption application using the advanced encryption Standard Algorithm. Jurnal Media Comput. Sci. 2(1), 57–62 (2023)

    Article  Google Scholar 

  15. Liu, T., Wu, J., Li, J., Li, J., Li, Y.: Efficient decentralized access control for secure data sharing in cloud computing. Concurrency Computation: Pract. Experience. 35(17), e6383 (2023)

    Article  Google Scholar 

  16. CRahman, A., Islam, M.J., Band, S.S., Muhammad, G., Hasan, K., Tiwari, P.: Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT. Digit. Commun. Networks. 9(2), 411–421 (2023)

    Article  Google Scholar 

  17. Selvarajan, S., Mouratidis, H.: A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems. Sci. Rep. 13(1), 7107 (2023)

    Article  Google Scholar 

  18. Choudhary, D., Pahuja, R.: A blockchain-based cyber-security for Connected Networks, pp. 1–16. Peer-to-Peer Networking and Applications (2023)

  19. Fan, Q., Xin, Y., Jia, B., Zhang, Y., Wang, P.: COBATS: A Novel Consortium Blockchain-Based Trust Model for Data Sharing in Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems (2023)

  20. Dehalwar, V., Kolhe, M.L., Deoli, S., Jhariya, M.K.: Blockchain-based trust management and authentication of devices in smart grid. Clean. Eng. Technol. 8, 100481 (2022)

    Article  Google Scholar 

  21. Mangalagowri, R., Venkataraman, R.: Ensure secured data transmission during virtual machine migration over a cloud computing environment. Int. J. Syst. Assur. Eng. Manage., pp.1–12. (2023)

  22. Sun, W.B., Xie, J., Yang, X., Wang, L., Meng, W.X.: Efficient computation Offloading and Resource Allocation Scheme for Opportunistic Access Fog-Cloud Computing Networks. IEEE Trans. Cogn. Commun. Netw. 9(2), 521–533 (2023)

    Article  Google Scholar 

  23. Pramanik, K.K., Rahane, S.B., Jayamani, V.N., Mehra, R., Manjunath, C.R., Athawale, S.V.: Cloud Computing based Wireless Sensor Network in Data Transmission with Routing Analysis Protocol and Deep Learning technique. Int. J. Intell. Syst. Appl. Eng. 11(3s), 165–169 (2023)

    Google Scholar 

  24. Azad, S., Mahmud, M., Zamli, K.Z., Kaiser, M.S., Jahan, S., Razzaque, M.A.: iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems. Expert Syst. Appl. 238, 121676 (2024)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the design and implementation of the research, to the analysis of the results and to the writing of the manuscript.

Corresponding author

Correspondence to Mohd Akbar.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Akbar, M., Waseem, M.M., Mehanoor, S.H. et al. Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04481-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04481-9

Keywords

Navigation