0% found this document useful (0 votes)
62 views9 pages

(IJCST-V12I2P5) :pratik Patil, Prerna Tulsiani, Dr. Sunil Mane

Public Cloud Computing has become a fundamental part of modern IT infrastructure as its adoption has transformed the way businesses operate. However, cloud security concerns introduce new risks and challenges related to data protection, sharing, and access control. A synergistic integration of blockchain with the cloud holds immense potential. Blockchain's distributed ledger ensures transparency, immutability, and efficiency as it reduces the reliance on centralized authorities.

Uploaded by

editor1ijcst
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views9 pages

(IJCST-V12I2P5) :pratik Patil, Prerna Tulsiani, Dr. Sunil Mane

Public Cloud Computing has become a fundamental part of modern IT infrastructure as its adoption has transformed the way businesses operate. However, cloud security concerns introduce new risks and challenges related to data protection, sharing, and access control. A synergistic integration of blockchain with the cloud holds immense potential. Blockchain's distributed ledger ensures transparency, immutability, and efficiency as it reduces the reliance on centralized authorities.

Uploaded by

editor1ijcst
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

International Journal of Computer Science Trends and Technology (IJCST) – Volume 12 Issue 2, Mar - Apr 2024

RESEARCH ARTICLE OPEN ACCESS

Mitigating Data Sharing in Public Cloud using Blockchain


Pratik Patil [1], Prerna Tulsiani [2], Dr. Sunil Mane [3]
1
Department of Computer Science and Engineering, College of Engineering Pune Technological University,
2
Department of Computer Science and Engineering, College of Engineering Pune Technological University,
3
Department of Computer Science and Engineering, College of Engineering Pune Technological University,
Pune, India

ABSTRACT
Public Cloud Computing has become a fundamental part of modern IT infrastructure as its adoption has transformed the way
businesses operate. However, cloud security concerns introduce new risks and challenges related to data protection, sharing, and
access control. A synergistic integration of blockchain with the cloud holds immense potential. Blockchain’s distributed ledger
ensures transparency, immutability, and efficiency as it reduces the reliance on centralized authorities. Motivated by this, our
framework proposes a secure data ecosystem in the cloud with the key aspects being Data Rights, Data Sharing, and Data
Validation. Also, this approach aims to increase its interoperability and scalability by eliminating the need for data migration.
This will ensure that existing public cloud-based systems can easily deploy blockchain enhancing trustworthiness and non-
repudiation of cloud data.
Keywords —Cloud Security, Blockchain, Trust Management, Off-Chain Data Storage

I. INTRODUCTION Table I: Cloud Deployment Models


Rapidly progressing technology is highly driven by
interdisciplinary collaboration. It is fueled by breakthrough Factor Public Hybrid Private
advancing research in the field of Big Data, Internet of Things Cloud Cloud Cloud
(IoT), Artificial Intelligence, Machine Learning, and many Auto –
more. The iterative nature of these evolving technologies Scaling High Moderate Limited
requires substantial computation power, heavy upfront
investments, and on-demand scaling. Cloud technology plays Security Good Very Secure Most Secure
an indispensable role in this contemporary digital landscape.
Cloud incorporates specialized tools and frameworks that Low High
Cost (Pay as you Moderate (Special
facilitate quick deployment and testing of live applications, go Model) Staff
thus offering organizations a competitive edge. The most Required)
widely accepted definition of cloud computing technology Good Banks and
Who is it Fast growing amount of Financial
was given by the National Institute of Standards and for? companies critical data Firms
Technology [1]: “Cloud computing is a model for enabling
ubiquitous, convenient, on-demand network access to a shared
pool of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or
service provider interaction.”
A. Decoding Cloud Computing Essentials
Cloud services are globally accessible, and they help
improve operational excellence by reducing human
interventions. This is achieved through multiple cloud
deployment models provided by cloud service providers
which cater to the diverse needs of organizations. Cloud
deployment refers to the process of configuring and managing
resources so that they become easily available over the
Internet. This eliminates the need for organizations to
maintain physical data infrastructure systems. Following are
the three major types of cloud deployment models, which
offer services according to client business needs [2]:

ISSN: 2347-8578 www.ijcstjournal.org Page 44


International Journal of Computer Science Trends and Technology (IJCST) – Volume 12 Issue 2, Mar - Apr 2024

programmatically and hence act as a standardized mechanism


for seamless communication. At the bottom is the Data Layer
which consists of the physical backbone of the cloud
architecture. It includes the servers, storage devices, etc. The
pooling and resource allocation of this layer is completely
managed by the Cloud Service Providers based on the support
requested by the processing layer.
B. Harnessing Benefits of Blockchain
The fundamental shift in how organizations store and
process their data is greatly impacted by the public cloud
deployment model. Cloud architecture provides a virtualized
isolated environment for all the stakeholders. This allows
them to run their applications independently. However, the
multi-tenancy model involving multiple users or “tenants”
sharing the same platform and resources, introduces a lot of
security risks, and hence maintaining a balance between
robust security measures and resource optimization has
become a crucial concern [4]. Therefore, the shared nature of
the public cloud introduces many complexities related to data
transferring and data protection. Blockchain, a transforming
technology is gaining momentum due to its unique approach
to managing data and enforcing trust. Its emergence can be
traced back to the introduction of Bitcoin in 2008 by Santoshi
Nakamoto [5]. Since then, blockchain has gained a lot of
attention due to its decentralized, transparent, tamper-resistant,
anonymous, and auditability properties.

Fig. 1 Cloud Architecture

A public cloud deployment model benefits its users by


making all the resources publicly available over the Internet
with a very cost-effective and scalable architecture [3].
Starting with the top-most layer i.e. Application Layer -
Variety of applications are hosted in this layer and users
interact with the cloud environment leveraging the interactive Fig. 2 Blockchain Architecture
front-end technologies. This layer helps an organization to
highlight the functionality of their system. The layer below Blockchain is a peer-to-peer network where the distributed
the application layer is the Service Provider Layer. This layer participants known as nodes communicate directly with each
encompasses the services delivered by the Cloud Service other. This reduces the need for any intermediaries. Data is
Providers like the storage facilities, security features, stored in blockchain by inter-linking blocks where each block
networking strategies, and many more. The next layer is the is linked to the previous one through a cryptographic hash
Processing Layer, which provides virtualization resources, forming a chain. A new block is added to blockchain by
allowing multiple virtual machines to run on a single physical circulating an agreement protocol among nodes [6]. A self-
server. APIs (Application Programming Interfaces) act as a executing data agreement known as a Smart Contract is
bridge between applications and underlying virtual deployed on blockchain which enables real-time settlement of
infrastructure. They control the resource sharing data transactions. It acts as a transit between applications and

ISSN: 2347-8578 www.ijcstjournal.org Page 45


International Journal of Computer Science Trends and Technology (IJCST) – Volume 12 Issue 2, Mar - Apr 2024

blockchain by embedding predefined terms and programmable In [12], authors found various security risks in cloud and
logic. This logic gets triggered when specified conditions are network issues like compromised credentials, hacked
satisfied which ensures automate the processes of transferring interfaces and APIs, account hijacking, permanent data loss,
assets or updating records. To attain the core principle of DoS attacks, and inadequate diligence. Further, they proposed
security i.e. trust, a resolution process is required for the group how various aspects of cloud security could be solved with the
of nodes so that a decision can be made regardless of any help of blockchain technology. Thus, making the system more
individual choices and this technique to reach a conclusion is secure by adding data encryption, service-level agreements,
known as Consensus Mechanism. In the field of cloud cloud data management, and interoperability. However, the
computing, a voting-based consensus mechanism exhibits increasing size of this distributed ledger may impact the cost
notable efficiency over proof-based counterparts, as it is and degrade the performance.
resource-effective, scalable and prioritizes efficiency [7]. Here [13], the authors proposed a novel blockchain-based
data preservation system for medical data and demonstrated
II. RELATED WORK various performance evaluation results by showing many
The shared infrastructure of the public cloud environment comparisons. They focused on explaining why they used
faces many security vulnerabilities due to dependencies on Ethereum over Bitcoin. The key parameters of comparison
third-party providers introducing concerns about data privacy. were block size, response time, and transactional gas required.
For example, AWS (Amazon Web Services) had 4 hours of Also, their research highlighted the importance of fixed block
downtime on February 28th, 2017, resulting in thousands of size. If the block storage capacity is under-utilized this will
websites and applications becoming completely inaccessible lead to wastage of resources while, if it is over-utilized then
[8]. Hence, integrating blockchain with the cloud offers breaking the data into chunks and then storing will increase
immense scope. Moreover, blockchain’s decentralized and the time required to verify the consistency of blockchain.
tamper-resistant framework complements the cloud’s scalable
and flexible infrastructure. Leveraging this integrated III. RESEARCH GAPS
ecosystem organizations can easily mitigate risks associated The public cloud environment is indeed a very vast and
with data sharing and strengthen trust among stakeholders. complex distributed system architecture. This is because the
In [9], authors designed an architecture to store Electronic cloud architecture not only addresses the continuous growth of
Health Records in a blockchain-based network. This shows the industrial ecosystem but also empowers organizations to
how fast blockchain technology has evolved since its adapt to digital transformation. This in turn leads to seamless
emergence. As it maintains stringent security standards and integration of all the dynamic stakeholders. Organizations
safeguards sensitive health information. This proposed need to enforce legal compliance regulations to protect
architecture introduced a new incentive mechanism for the financial records, strategic plans, customer confidential
creation of new blocks in the blockchain. Also, their design information, and intellectual property. Systems accessing
cloud services have become sophisticated and involve a
ensures that each block gives equal contribution in this
diverse range of individuals, hence, distinguishing
process for conducting the new block insertion process.
responsibilities and roles optimizes the productivity of such
Blocks with the least significance are selected in each iteration
comprehensive systems.
and after completing the task their significance gets updated Based on a comprehensive review of previous research in
and they are given incentive charges. this field, we classified various frameworks into four distinct
BigchainDB [10] is a blockchain database that is a types.
combination of blockchain and database supporting a wide Table II: Comparison of Core Strategy Adoption
range of proof-of-concepts. It allows developers to deploy Off-Chain
Access Validation
their applications with high throughput, low latency, Session and On-
Name Control and
decentralized control, and immutable data storage. With user Tokens Chain
Policies Verification
feedback and iterative improvements, the next version of Bifurcation
BigchainDB software aims to include the integration of Electronic
Tendermint for inter-node networking and Byzantine fault Health
Records ✓ ✓  
tolerant (BFT) consensus.
ProvChain [11] is a blockchain-based data provenance Blockchain
architecture in a cloud environment. This architecture Based
ProvChain
System ✓ ✓ ✓ 
presented a solution to embed metadata of the history of
creation and operations performed on a cloud object in a BigchainDB ✓ ✓  
tamper-proof blockchain, thus enhancing user privacy and
reliability. However, the implementation of ProvChain for
multiple cloud servers may require a lot of computational
speed and cost and, hence limit the scalability.

ISSN: 2347-8578 www.ijcstjournal.org Page 46


International Journal of Computer Science Trends and Technology (IJCST) – Volume 12 Issue 2, Mar - Apr 2024

On-chain vs IV. PROPOSED METHODOLOGY


off-chain Harnessing the wide-range security benefits of blockchain
storage for   ✓ ✓ technology, our framework offers a solution to mitigate data
blockchain sharing and data trust vulnerabilities in multifaceted public
integration cloud environments. Our approach blends advanced access
control policies, robust digital certificate mechanism, and
A. Strategy for Protection and Compliance
cost-effective off-chain data storage strategy integrated with
Access Control plays a pivotal role in governing how users on-chain verification and validation. Following is the outline
with different roles will access cloud resources and under of our proposed architecture describing the sequence of how
which circumstances [14]. The framework stores role-based the cloud data flows via protected blockchain immutable,
access control policies in blockchain. Distributed ledgers in decentralized, and non-tampered ledger:
blockchain are non-tampered as they are spread across
multiple nodes and each participant in the blockchain network
maintains an identical copy of the ledger. Each block has a
recorded date timestamp and is provided with a unique
cryptographic hash signature which guarantees the integrity of
the ledger [15]. Specifically, there is a critical need to
understand how development of blockchain-based systems
can align with legal standards of an organization.
B. Verifying Trust
Organizations prioritize trusted cloud service providers,
crucial for their reputation and public perception. A
foundation of trust can only be achieved by establishing a
secure flow of data transactions in the cloud environment.
Digital Certificates create a chain of trust. They confirm the
legitimacy of individuals affirming secure online transactions.
A digital certificate is a digital statement issued by a
Certifying Authority (CA) that vouches for the identity of the
certificate holder and enables parties to communicate securely
by creating an encrypted channel [16]. Hence there is no
doubt that digital certificates boost data sharing security.
However, there are growing concerns surrounding digital
certificates, regarding data manipulation and central authority
reliance. A gap lies in exploring blockchain’s potential to
counter these vulnerabilities and enhance
certificate management.
C. Solutions to Mitigate Energy Consumption
Fig. 3 Proposed Methodology
As discussed earlier, previous research presented a solution
to store entire cloud data on a blockchain network as this 1) Assigning Pre-Defined Access Privileges:
immutable ledger offers a lot of security benefits. However, This step involves categorizing the stakeholders of an
storing entire cloud data on the blockchain also poses organization based on their responsibilities and granting them
numerous hurdles. The energy-intensive storage mechanism permissions aligned with their roles. This is done to regulate
of blockchain could lead to very high computing costs and high compliance standards within the organization. The data
speed of transactions. Firstly, if whole cloud data is stored on administrators will have the authority to make these role-
blockchain then the entire information will become publicly based settings. After data updation from the frontend
accessible hampering the confidentiality of whole data. application, these rules will get saved in the blockchain
Secondly, variable-sized blocks are employed to network.
accommodate diverse amounts of cloud data. This may give
rise to many issues such as transaction delays, data 2) Authentication:
fragmentation, and consensus complexity. Hence, there is a After a user logs into the system the credentials are
need to explore solutions that reconcile security while compared. The role assigned to the user will be verified from
mitigating energy-intensive processes and optimize the access control policies stored in the blockchain network.
blockchain performance [17]. Next, the logic embedded in the smart contract is executed

ISSN: 2347-8578 www.ijcstjournal.org Page 47


International Journal of Computer Science Trends and Technology (IJCST) – Volume 12 Issue 2, Mar - Apr 2024

and the specified conditions are compared. According to the • Fixed-size cryptographic hash generated from off-
result obtained following actions are performed: chain requested data.
2.1) Rejection: If a user attempts to access data
for which they are not intended, then the smart contract
will deny the request and the system administrator will V. ALGORITHM DESIGNS
get alerted. This section focuses on the strategic development of three
2.2) Acceptance: If a user has authorised access critical algorithms: the Dynamic Access Control Algorithm
to the requested data, then smart contract will accept this for Data Security, the Check if a user has permission to
request and the system will trigger the generation of a perform a system functionality algorithm, and Blockchain-
session token. This session token will be used to authorise Based Verification in Off-Chain Storage. These algorithms are
a particular user for future data request accesses till it is meticulously crafted to address key challenges in data security,
valid. The session token has attributes containing user’s access control management, and data verification. The design
unique identification number, user role and time validity, principles behind these algorithms have been highlighted by
this token is cryptographically encrypted and will serve as incorporating examples of real-world scenarios. This
a temporary access credential for the user inside our showcases the relevance and easy integration of our
system. framework with existing cloud database systems.
3) Logging: The Dynamic Access Control Algorithm (as shown in
The acceptance / rejection of a user captured from the smart Algorithm 1) defines a procedure to manage and update
contract is recorded in the form logs. These logs are very access permissions based on individual roles. It categorizes
useful for identifying percentage of legitimate users entering individuals into “Controllers” and “Users”. This algorithm
the system. Also logs contribute as a valuable resource for grants Controller authority to onboard new individuals to the
monitoring and auditing purposes. organization and assign them roles. In addition, controllers
can modify access control settings to align with the
4) Off-Chain Data: organization’s compliance regulations. Let’s consider an
Generation of a session token, indicates the user is example for instance:
legitimate and is completely authenticated. This initiates a
successful connection with the cloud servers. Within this • Admin controller logs into the system and he/she has to
connected ecosystem our architecture is connected to both off- onboard a new employee to his organization. This
chain and on-chain data. Off-chain data typically resides in
employee will be working in the HR Department. Thus,
traditional database systems, that are not part of the
the employee should be able to access all HR
blockchain itself. The contents of this off-chain data vary from
department data.
large multimedia files, sensitive customer information,
transaction details, logs, and other proprietary documents.
• From the front end of the application, the controller will
Reference of off-chain data is linked via cryptographic fixed-
size hashes. These hashes are then stored on the blockchain. navigate to the “Access Control Settings” Page. This
Conventional methods store whole data on the blockchain will call the function UPDATE_ACCESS_CONTROL
which is then queried according to the user’s request. This in the backend. First, the function will check whether
increases the response times, transaction gas fees, and latency userRole is Controller or not then only it will allow the
levels. Thus, the linkage of on-chain and off-chain data helps controller to access other actions. After validating the
in compact representation of large existing datasets. It also controller will be able to see these actions: Onboard
facilitates trustworthiness by verifying on-chain hash and off- new users, assign roles, create policy, update
chain cloud data. permission, check control, and audit trail.

5) Digital Certificate: • Now controller will onboard the new employee and
In dynamic cloud environments, continuous real-time data assign role to the employee. Let’s consider userId =
transactions occur at changing frequencies. Thus, a non- “123”.
repudiation mechanism is essential to provide assurance that
the involved parties cannot deny the origin of the message or • The controller will create a new policy named “HR
action performed. A digital certificate is a source of irrefutable Data Access” and then grant permission to the
evidence illustrating the proof of origin and the proof of
employee with userId = “123”. This will ensure that this
receipt [18]. Our framework creates a digital certificate which
new employee can view the HR Department’s Data on
comprises of the following essential components:
his/her dashboard.
• Server’s unique identifier
• User’s unique identifier Algorithm 1: Dynamic Access Control Algorithm for Data
• Expiration date Security

ISSN: 2347-8578 www.ijcstjournal.org Page 48


International Journal of Computer Science Trends and Technology (IJCST) – Volume 12 Issue 2, Mar - Apr 2024

INPUTS: violations. Now, continuing the previous example


demonstrated earlier in this section, we will try to understand
userRole, where userRole ∈ [Controller, User] how our framework checks if userId = “123” can access HR
action, where action ∈ [Onboarding, Assign Role, Department functionalities.
Create Policy, Update Permission, Check Control, Audit
Trail]
OUTPUT: validAction, where validAction ∈
[True, False]
1: function UPDATE_ACCESS_CONTROL
(userRole, action):
2: if userRole = Controller then
3: set validAction = True
4: if action = Onboarding then
5: // Onboard new user and assign the
user a particular role
6: else if action = Assign Role then
7: // Assign or update role of a user
8: else if action = Create Policy then Fig. 4 Access Control Policies

9: // Create a policy corresponding to The front end will call the function
a particular system functionality CHECK_PERMISSION with parameters “123” (userId) and
“HR Data Access” (functionalityName). The algorithm will
10: else if action = Update Permission then search the dictionary for the key “HR Data Access” and then
11: // Grant or Revoke permission to a it will check if “123” belongs to the list of userIds. Finally, the
user for a particular system functionality algorithm will return user permission status.

12: else if action = Check Control then Algorithm 2: Check if a user has permission to perform a
13: // View if a user has permission to system functionality
INPUTS:
perform a particular system functionality
userId, which is a unique identification number
14: else if action = Audit Trail then corresponding to a user
15: // Check past audit trails functionalityName, where functionalityName is a particular
system functionality
16: end if
OUTPUT:
17: else if userRole = user then hasPermission, where hasPermission ∈ [True, False]
18: set validAction = False // Since ASSUMPTION:
only admin controller can update policies “policiesDictionary” is a global variable with key:
19: end if functionalityName & corresponding values: list of
userIds who have permission to access that
20: RECORD_AUDIT_TRAIL (userId, action,
functionality
timestamp, validAction)
1: function CHECK_PERMISSION (userId,
21: return validAction functionalityName):
2: if userId ∈ policiesDictionary[functionalityName]
User Experience plays a significant role as it provides then
seamless access to authorized system functionalities while 3: set hasPermission = True
restricting access to unauthorized areas. Algorithm 2 4: else
automates the process of checking permissions of different 5: set hasPermission = False
users. It ensures that access permissions are granted and 6: end if
revoked appropriately, reducing the risk of compliance

ISSN: 2347-8578 www.ijcstjournal.org Page 49


International Journal of Computer Science Trends and Technology (IJCST) – Volume 12 Issue 2, Mar - Apr 2024

7: return hasPermission 30: end function


31: end class

The Blockchain-Based Verification in Off-Chain Storage


algorithm is designed to bolster integrity and security. This
Algorithm 3: Blockchain-Based Verification in Off-Chain algorithm comprises three classes: BLOCKCHAIN,
Storage CLOUD_DATABASE, and LINKER. The BLOCKCHAIN
1: class BLOCKCHAIN: class is responsible for initializing the blockchain structure
2: function INIT: and adding new blocks to the chain. This structure stores a
3: set chain = [] // creates an empty sequential chain of blocks containing references to off-chain
array for storing chain of blocks cloud data. On the other hand, the CLOUD_DATABASE
4: end function class manages the actual storage of data, including file
5: function ADD_BLOCK (fileContentHash, contents and digital certificates. The LINKER class acts as a
coordinator, and facilitates the process of linking Off-Chain
certificateId, serverId, userId, expiry):
data (such as file contents and certificates stored in the cloud
6: chain.append({“fileContentHash” : database) to the On-Chain blockchain. This involves adding
fileContentHash, “certificateId” : blocks to the blockchain that contain relevant information
certificateId, “serverId”: serverId, “userId”: about Off-Chain data, ensuring a tamper-proof
userId, “expiry”: expiry}) verification mechanism.
7: end function VI. IMPLEMENTATION AND
8: end class
DISCUSSIONS
9: class CLOUD_DATABASE:
10: function INIT: The integration of blockchain’s distributed ledger with
11: set certificates = {} // creates a public cloud computing environment provides a robust
foundation for secure data storage and data trust.
dictionary for storing certificate linked to a particular
file A. Addressing Vulnerabilities and Single Points of Failure
12: set files = {} // creates a in Cloud Access Control
dictionary for storing file contents The centralized nature of traditional public cloud
13: end function architecture leads to ineffective access management. Also,
14: function UPLOAD_DATA (fileContentHash, there is a possibility of a lot of vulnerabilities being caused
fileContent, certificateId, certificateContent): due to a single point of failure making it difficult to track user
15: set certificates[certificateId] = activities. Limited visibility of user permissions across diverse
certificateContent cloud services hampers the privacy of confidential data. Our
16: set files[fileContentHash] = fileContent proposed framework, however, stores these access control
17: end function policies in an immutable ledger which thus ensures that logs
18: end class remain unaltered and access management becomes easily
19: class LINKER: auditable.
20: function INIT:
21: set B = BLOCKCHAIN, set C =
CLOUD_DATABASE
22: B.INIT, C.INIT
23: end function
24: function HASH_FILE_CONTENTS
(fileContent):
25: set fileContentHash = HASH (fileContent)
26: end function
27: function
LINK_OFF_CHAIN_TO_ON_CHAIN:
28: B.ADD_BLOCK
(fileContentHash, certificateId, serverId, userId,
expiry)
29: C.UPLOAD_DATA
(fileContentHash, fileContent, certificateId,
certificateContent)

ISSN: 2347-8578 www.ijcstjournal.org Page 50


International Journal of Computer Science Trends and Technology (IJCST) – Volume 12 Issue 2, Mar - Apr 2024

Integration of blockchain with cloud computing, while


enhancing security, may introduce network congestion and
slower transaction processing speeds. Thus, striking a balance
between block size and transaction throughput is crucial in
optimizing the performance. Block size is critical in
determining the computation speed and storage requirements.
This is because a large block size can accommodate more
transactions but may lead to slower validation speed and
increased storage requirements. Smaller blocks enhance
transaction processing speed but limit scalability. Hence, our
Fig. 5 Creating and Granting Policies proposed framework resolves this issue by storing the fixed
size of cryptographic hashes of the digital certificate on the
blockchain which is interlinked with the off-chain repositories.
Also, if all cloud data is stored on blockchain this will
increase the processing fees and will reduce the feasibility of
the proposed architecture. So, this scheme of on-chain
verification and off-chain storage will also be advantageous
for organizations to adopt our solution and connect their
existing database systems with blockchain instead of
migrating whole data to blockchain networks.

Fig. 6 Successful Transaction

B. Overcoming Third-Party Dependency in Data Integrity


Assurance
This architecture uses digital certificates to maintain the
integrity of high-frequency data transactions occurring in the
cloud environment. However, the conventional working of
digital certificates relies on a third party i.e. Certifying
Authority (CA) for the issuance and validation of certificates.
The involvement of such external entities increases the risk of Fig. 9 Front end depicting functionalities an individual can execute
unauthorized access and malicious activities thus, leading to
potential compromise of security concerns. We tackle this VII. CONCLUSION
issue by using smart contracts and encoding them with
The proposed blockchain-based architecture stands as a
predefined rules. Their cryptographic underpinning ensures
resilient solution and lays the groundwork for Trust
that even minimal tampering in the data can be easily
Management in the realm of the public Cloud environment.
identified. Hence this automates the process of data transfer
As it addresses key challenges such as vulnerabilities in
between different parties in a secure way contributing to a
access control, third-party dependency in data integrity
resilient system.
assurance, and processing fees in blockchain-cloud integration.
Moreover, this combination provides an appealing solution for
organizations who are seeking enhanced security with their
current cloud infrastructure. The framework’s design
minimizes processing fees by implementing an optimized
methodology linking block size and transaction throughput. In
essence, this holistic solution will create a strategic pathway
Fig. 7 Cryptographic Hashing for organizations. Thus, organizations will seamlessly
integrate blockchain components with their existing cloud
infrastructure without requiring a complete migration of data
to the blockchain network.

Fig. 8 Audit Trail of different Blocks


REFERENCES
[1] Mell, Peter, and Tim Grance. "The NIST definition of
C. Addressing Processing Fees and Feasibility in cloud computing." (2011).
Blockchain-Cloud Frameworks

ISSN: 2347-8578 www.ijcstjournal.org Page 51


International Journal of Computer Science Trends and Technology (IJCST) – Volume 12 Issue 2, Mar - Apr 2024

[2] SAP. “Cloud Computing: The Future of IT | SAP,” n.d. [11] Liang, Xueping, Sachin Shetty, Deepak Tosh, Charles
https://www.sap.com/india/products/technology- Kamhoua, Kevin Kwiat, and Laurent Njilla. "Provchain:
platform/what-is-cloud-computing.html. A blockchain-based data provenance architecture in
[3] Amazon Web Services, Inc. “AWS Re:Invent 2022 cloud environment with enhanced privacy and
Storage Leadership Session - AWS Storage Innovations availability." In 2017 17th IEEE/ACM International
at Exabyte Scale,” n.d. Symposium on Cluster, Cloud and Grid Computing
https://aws.amazon.com/products/storage/. (CCGRID), pp. 468-477. IEEE, 2017.
[4] Samarati, Pierangela, and Sabrina De Capitani di [12] Rani, Meena, Kalpna Guleria, and Surya Narayan Panda.
Vimercati. "Cloud security: Issues and concerns." "Blockchain technology novel prospective for cloud
Encyclopedia of cloud computing (2016): 205-219. security." In 2022 10th International Conference on
[5] Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic Reliability, Infocom Technologies and Optimization
cash system." (2008). (Trends and Future Directions)(ICRITO), pp. 1-6. IEEE,
[6] Mohanta, Bhabendu Kumar, Debasish Jena, 2022.
Soumyashree S. Panda, and Srichandan Sobhanayak. [13] Li, Hongyu, Liehuang Zhu, Meng Shen, Feng Gao,
"Blockchain technology: A survey on applications and Xiaoling Tao, and Sheng Liu. "Blockchain-based data
security privacy challenges." Internet of Things 8 (2019): preservation system for medical data." Journal of
100107. medical systems 42 (2018): 1-13.
[7] Pahlajani, Sunny, Avinash Kshirsagar, and Vinod [14] “What Is Access Control? | Microsoft Security,” n.d.
Pachghare. "Survey on private blockchain consensus https://www.microsoft.com/en-
algorithms." In 2019 1st International Conference on in/security/business/security-101/what-is-access-control.
Innovations in Information and Communication [15] McLean, Sue, and Simon Deane-Johns. "Demystifying
Technology (ICIICT), pp. 1-6. IEEE, 2019. blockchain and distributed ledger technology–hype or
[8] Amazon Web Services, Inc. “Summary of the Amazon hero?." Computer Law Review International 17, no. 4
S3 Service Disruption in the Northern Virginia (US- (2016): 97-102.
EAST-1) Region,” n.d. [16] Sevend. “Transport Layer Security and Digital
https://aws.amazon.com/cn/message/41926/. Certificates - SQL Server.” Microsoft Learn, March 27,
[9] Yang, Guang, and Chunlei Li. "A design of blockchain- 2023. https://learn.microsoft.com/en-us/sql/database-
based architecture for the security of electronic health engine/configure-windows/certificate-
record (EHR) systems." In 2018 IEEE International overview?view=sql-server-ver16.
conference on cloud computing technology and science [17] Hepp, Thomas, Matthew Sharinghousen, Philip Ehret,
(CloudCom), pp. 261-265. IEEE, 2018. Alexander Schoenhals, and Bela Gipp. "On-chain vs.
[10] McConaghy, Trent, Rodolphe Marques, Andreas Müller, off-chain storage for supply-and blockchain integration."
Dimitri De Jonghe, Troy McConaghy, Greg McMullen, it-Information Technology 60, no. 5-6 (2018): 283-291.
Ryan Henderson, Sylvain Bellemare, and Alberto [18] Coffey, Tom, and Puneet Saidha. "Non-repudiation with
Granzotto. "Bigchaindb: a scalable blockchain database." mandatory proof of receipt." ACM SIGCOMM
white paper, BigChainDB (2016): 53-72. Computer Communication Review 26, no. 1 (1996): 6-
17.

ISSN: 2347-8578 www.ijcstjournal.org Page 52

You might also like