Abstract
The rise of cloud computing has transformed the way data is stored and managed, yet it has also brought about major security issues, especially concerning the secure transfer of data within cloud systems. In response to these challenges, this research develops a comprehensive cyber-security trust model that provides multi-risk protection for secure data transmission in cloud computing, ensuring the highest level of privacy and data security. This innovative approach aims to ensure the secure transmission of data in cloud computing while harnessing the combined strengths of Quantum Key Distribution (QKD) and Advanced Encryption Algorithm. As cloud environments become integral to modern business operations, safeguarding data against a multitude of security risks, including traditional and emerging threats, is paramount. The Cyber-Security Trust Model leverages blockchain to establish a transparent and tamper-resistant ledger of all data transactions within the cloud. This blockchain layer enhances data integrity, auditability, and traceability while also providing a decentralized and trust-based framework for authentication and authorization. The Multi-Risk Protection Model incorporates both Quantum Key Distribution (QKD) and a Modified Advanced Encryption Standard (MAES) to offer multi-layered defence mechanisms. Through rigorous testing and analysis, this study demonstrates the feasibility and effectiveness of the proposed Cyber-Security Trust Model with a Merkle tree-based solution for data integrity verification. It makes a significant impact on the field of secure data transmission in cloud computing by providing strong protection against a constantly changing set of security threats. MATLAB is employed to conduct rigorous experiments, analyse results, and validate the model’s performance in various cloud computing scenarios. The findings of the proposed study show the proposed method, combining Quantum Key Distribution (QKD) and Modified AES (MAES), stands out with exceptional performance, featuring encryption and decryption times of 2.25ms and 1.071ms, respectively. The proposed system outperforms all others, boasting an impressive accuracy rate of 99.84%. This research signifies a ground-breaking advancement in cloud computing security, addressing a spectrum of traditional and emerging threats through a multi-risk protection model incorporating Quantum Key Distribution (QKD) and MAES while demonstrating exceptional performance in rigorous experiments.
Similar content being viewed by others
Data availability
No datasets were generated or analysed during the current study.
References
Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R., Jolfaei, A., Islam, A.N.: A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare systems. J. Parallel Distrib. Comput. 172, 69–83 (2023)
Serbanescu, D., Min, P.: Main principles and possible solutions to solve the specifics of Emergency Planning for multi-risk unregulated radioactive sources
Al-Jumaili, A.H.A., Muniyandi, R.C., Hasan, M.K., Paw, J.K.S., Singh, M.J.: Big Data Analytics using Cloud Computing based frameworks for Power Management systems: Status, constraints, and future recommendations. Sensors. 23(6), 2952 (2023)
Zubaydi, H.D., Varga, P., Molnár, S.: Leveraging Blockchain Technology for Ensuring security and privacy aspects in internet of things: A systematic literature review. Sensors. 23(2), 788 (2023)
Selvarajan, S., Srivastava, G., Khadidos, A.O., Khadidos, A.O., Baza, M., Alshehri, A., Lin, J.C.W.: An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. Journal of Cloud Computing, 12(1), p.38. (2023)
Yazdinejad, A., Dehghantanha, A., Parizi, R.M., Srivastava, G., Karimipour, H.: Secure intelligent fuzzy blockchain framework: Effective threat detection in IoT networks. Comput. Ind. 144, 103801 (2023)
Khan, A.A., Laghari, A.A., Shaikh, Z.A., Dacko-Pikiewicz, Z., Kot, S.: Internet of Things (IoT) Security with Blockchain Technology: A state-of-the-art Review. IEEE Access (2022)
Zapatero, V., van Leent, T., Arnon-Friedman, R., Liu, W.Z., Zhang, Q., Weinfurter, H., Curty, M.: Advances in device-independent quantum key distribution. npj Quantum Information, 9(1), p.10. (2023)
Primaatmaja, I.W., Goh, K.T., Tan, E.Y.Z., Khoo, J.T.F., Ghorai, S., Lim, C.C.W.: Security of device-independent quantum key distribution protocols: A review. Quantum. 7, 932 (2023)
Tanwar, S., Gupta, N., Iwendi, C., Kumar, K., Alenezi, M.: Next-generation IoT and blockchain integration. Journal of Sensors, 2022. (2022)
Hubbard, D.W., Seiersen, R.: How to Measure Anything in Cybersecurity risk. Wiley (2023)
Shaikh, F.A., Siponen, M.: Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers Secur. 124, 102974 (2023)
Alemami, Y., Mohamed, M.A., Atiewi, S.: Advanced approach for encryption using advanced encryption standard with chaotic map. Int. J. Electr. Comput. Eng. 13, 1708–1723 (2023)
Putra, R.A., Yupianti, Y., Prasetyo, E.: Android-based text message encryption and decryption application using the advanced encryption Standard Algorithm. Jurnal Media Comput. Sci. 2(1), 57–62 (2023)
Liu, T., Wu, J., Li, J., Li, J., Li, Y.: Efficient decentralized access control for secure data sharing in cloud computing. Concurrency Computation: Pract. Experience. 35(17), e6383 (2023)
CRahman, A., Islam, M.J., Band, S.S., Muhammad, G., Hasan, K., Tiwari, P.: Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT. Digit. Commun. Networks. 9(2), 411–421 (2023)
Selvarajan, S., Mouratidis, H.: A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems. Sci. Rep. 13(1), 7107 (2023)
Choudhary, D., Pahuja, R.: A blockchain-based cyber-security for Connected Networks, pp. 1–16. Peer-to-Peer Networking and Applications (2023)
Fan, Q., Xin, Y., Jia, B., Zhang, Y., Wang, P.: COBATS: A Novel Consortium Blockchain-Based Trust Model for Data Sharing in Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems (2023)
Dehalwar, V., Kolhe, M.L., Deoli, S., Jhariya, M.K.: Blockchain-based trust management and authentication of devices in smart grid. Clean. Eng. Technol. 8, 100481 (2022)
Mangalagowri, R., Venkataraman, R.: Ensure secured data transmission during virtual machine migration over a cloud computing environment. Int. J. Syst. Assur. Eng. Manage., pp.1–12. (2023)
Sun, W.B., Xie, J., Yang, X., Wang, L., Meng, W.X.: Efficient computation Offloading and Resource Allocation Scheme for Opportunistic Access Fog-Cloud Computing Networks. IEEE Trans. Cogn. Commun. Netw. 9(2), 521–533 (2023)
Pramanik, K.K., Rahane, S.B., Jayamani, V.N., Mehra, R., Manjunath, C.R., Athawale, S.V.: Cloud Computing based Wireless Sensor Network in Data Transmission with Routing Analysis Protocol and Deep Learning technique. Int. J. Intell. Syst. Appl. Eng. 11(3s), 165–169 (2023)
Azad, S., Mahmud, M., Zamli, K.Z., Kaiser, M.S., Jahan, S., Razzaque, M.A.: iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems. Expert Syst. Appl. 238, 121676 (2024)
Author information
Authors and Affiliations
Contributions
All authors contributed to the design and implementation of the research, to the analysis of the results and to the writing of the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Akbar, M., Waseem, M.M., Mehanoor, S.H. et al. Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04481-9
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10586-024-04481-9