Abstract
The advancement of internet-based applications generated enormous voluminous media data, requiring effective storage and processing pipelines to handle the complexity of data and flow of information. For many years, cloud computing platforms provide storage facilities for many user applications and use-cases where voluminous data can be stored and manage effectively. The current research effort is still towards enlarging the storage and processing capacity of cloud servers at different user terminals. However, it is observed by exploring the traditional approaches in cloud storage management is- cloud storage bucket can effectively manage the data. Still, it doesn't ensure a higher degree of security of the data stored in the untrusted cloud storage buckets. Thereby, it is essential to develop security solution modeling to ensure data integrity in the cloud-to-cloud information migration process. Although a research trend indicates substantial effort towards developing cryptography-based solution approaches, most of them intensify the communication burden during execution. The study addresses this problem and applies the strength factor of blockchain-based security measures to preserve the integrity in distributed cloud architecture. The entire concept of the study is represented with an analytical form which shows how high dimensional media data is encrypted in cloud storage buckets using simplified hash-based 2-layers of encryption using SHA-256. The experimental analysis of the security approach shows that it ensures a higher degree of data security in the cloud-to-cloud migration with considerable numerical outcomes.
Similar content being viewed by others
References
Kumar, P., Ravi, P., Raj, H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691–697.
Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204–209.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11.
Swapnali, M., & Chaudhari, S. (2016). Third party public auditing scheme for cloud storage. Procedia Computer Science, 79, 69–76.
Vic, J. R. W. (2011). Securing the Cloud: Cloud computer Security techniques and tactics. Elsevier.
Aruna, M. G., Mohan K. G. (2020). Mitigating the Threat due to Data Deduplication Attacks in Cloud Migration using User Layer Authentication with Light Weight Cryptography. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 9(3)
Lei, K., Du, M., Huang, J., & Jin, T. (2020). Groupchain: Towards a scalable public blockchain in fog computing of IoT services computing. IEEE Transactions on Services Computing, 13(2), 252–262.
Baucas, M. J., Gadsden, S. A., & Spachos, P. (2011). IoT-based smart home device monitor using private blockchain technology and localization. IEEE Networking Letters, 3(2), 52–55. https://doi.org/10.1109/LNET.2021.3070270
Qu, Y., Pokhrel, S. R., Garg, S., Gao, L., & Xiang, Y. (2021). A blockchained federated learning framework for cognitive computing in industry 4.0 networks. IEEE Transactions on Industrial Informatics, 17(4), 2964–2973.
Chen, Y., Wang, L., & Wang, S. (2020). Stochastic blockchain for IoT data Integrity. IEEE Transactions on Network Science and Engineering, 7(1), 373–384.
Guruprakash, J., & Koppu, S. (2020). EC-ElGamal and genetic algorithm-based enhancement for lightweight scalable blockchain in IoT. IEEE Access, 8, 141269–141281.
Liu, Z., Fu, C., Yang, J., Liu, Z., & Xu, L. (2015). Coarser grained multi-user searchable encryption in hybrid cloud. Transactions on Computational Collective Intelligence, 14, 140–156.
Lin, Q., Li, J., Huang, Z., Chen, W., & Shen, J. (2018). A short linearly homomorphic proxy signature scheme. IEEE Access, 6, 12966–12972.
Zhang, X., Tan, Y., Liang, C., Li, Y., and Li, J. (2018). A covert channel over volte via adjusting silence periods. IEEE Access, 10.1109@ACCESS.2018.2802783.
Liu, Z., Huang, Y., Li, J., Cheng, X., & Shen, C. (2018). Divoram: Towards a practical oblivious ram with variable block size. InformationSciences, 447, 1–11.
Liu, Z., Li, T., Li, P., Jia, C., & Li, J. (2018). Verifiable searchable encryption with aggregate keys for data sharing system. Future GenerationComputer Systems, 78, 778–788.
Thereska, E., Ballani, H., O'Shea, G., Karagiannis, T., Rowstron, A., Talpey, T., Black, R., and Zhu, T. (2013). Ioflow: a software-defined storage architecture. In Proceedings of the Twenty-FourthACM Symposium on Operating Systems Principles, pp 182–196
Zyskind, G., Nathan, Oz.(2015). Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), pp. 180–184.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf
Gueron, S., Johnson, S., and Walker, J. (2011). Sha-512/256. In EighthInternational Conference on Information Technology: New Generations, pp. 354–358
Wilkinson, S., Boshevski, T., Brandoff, J., and Buterin, V. (2014). Storj a peer-to-peer cloud storage network. 2014.
Li, H., Lu, R., Zhou, L., Yang, B., & Shen, X. (2014). An efficient Merkle-tree-based authentication scheme for smart grid. IEEE Systems Journal, 8(2), 655–663.
Khan, F., & Anandharaj, G. (2019). A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Applied Sciences, 1(12), 1–7.
Khan, F., Anandharaj, G. (2019). A Multi-layer Security approach for DDoS detection in Internet of Things. International Journal of Intelligent Unmanned Systems, https://doi.org/10.1108/IJIUS-06-2019-0029.
Khan, F., & Anandharaj, G. (2020). An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT. EIG. https://doi.org/10.1016/j.eij.2020.05.004
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Workshop on the theory and application of cryptographic techniques, pp. 47–53
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Aruna, M.G., Mohan, K.G. Designing a Multi-party Collaborator of Explicit Units of the Blockchain to Mitigate the Security Attacks on the Data Migration from Cloud to Cloud. Wireless Pers Commun 121, 3243–3261 (2021). https://doi.org/10.1007/s11277-021-08873-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08873-7