0% found this document useful (0 votes)
7 views

Codebot 1st Review Engg-1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Codebot 1st Review Engg-1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Data Security in Cloud based on Blockchain

Submited by, Presented by,


xxxxxxxxx XXXXXXX
Cloud Security
• Cloud security is the protection of data stored online via cloud computing
platforms from theft, leakage, and deletion.
• Cloud security is a discipline of cyber security dedicated to securing
cloud computing systems.
• This includes keeping data private and safe across online-based
infrastructure, applications, and platforms.
• Securing these systems involves the efforts of cloud providers and the
clients that use them, whether an individual, small to medium business, or
enterprise uses.
Problems Identified

• A data breach is a cyber-attack in which sensitive, confidential or


otherwise protected data has been accessed and/or disclosed in an
unauthorized fashion.
• Data breaches can occur in any size organization, from small businesses to
major corporations.
• They may involve personal health information (PHI), personally
identifiable information (PII), trade secrets or other confidential
information
Abstract

• Cloud storage service has shown its great power and wide popularity which
provides fundamental support for rapid development of cloud computing.
• However, due to management negligence and malicious attack, there still lie
enormous security incidents that lead to quantities of sensitive data leakage at
cloud storage layer.
• this project proposed aMimic model CodeBot that combines cloud computing
with blockchain that assures data integrity for homomorphic
encryptionschemes.
• CodeBot will be hiredto store and perform computations on client data.
• Each CBwill have to periodically compute a master hash value of theirdatabase
to be stored on a private blockchain.
Objective

•The objective of the project is to proposes a scheme that combines cloud


computing with blockchain that assures data integrity for all homomorphic
encryption schemes.
•To overcome the cloud service provider's (CSP) ultimate authority over the
data, the proposed scheme relies on the Code bot consensus to build a
distributed network of processing CSPs based on the client requirements.
EXISTING SYSTEM

• Identity Based Encryption (IBE): This scheme enabling implementation


of different access control policies for cipher-texts against multiple
receivers.
• Attribute Based Encryption (ABE): This schemes that can provide one-
to-many encryption are commonly used as the solutions.
• Proxy Re-Encryption: This scheme will grant legitimate users access to
the data.
• Public Audit Schemes : This scheme allow users to authorize third-party
auditors (TPA) to verify the integrity of cloud data.
Disadvantages

• security risks, such as identity privacy and data privacy disclosure.


• inflexibility of access control policy
• authority abuse of group managers
• collusion attacks during user revocation.
• computation burden of users’ systems
• Difficulty in user revocation.
• Whenever owner wants to change the access right of user, it is not
possible to do efficiently.
LITERATURE SURVEY
Sl.No. Title Author and Year Objective Methods/Algorithms/
Hardware

1 Enhanced Security in Zhanli Li, Fawad Javaidi This article proposed to homomorphic encryption
Cloud Computing using protect privacy and provide
Neural Network and high accuracy in a
Encryption reasonable amount of time
when compared to other
state-of-the-art techniques

Merits:Using a cloud
environment is the
availability of resources,
cost reduction, and storage
flexibility.

DemeritsThis may produce


possible privacy and
security risk as direct
access to raw data is
required.
LITERATURE SURVEY
Sl.No. Title Author and Year Objective Methods/Algorithms/Hardware

2 Using Block Chain in Azman Samsudin This article provides an optimal cloud-RDB is based on simulating
Cloud Computing to solution based on encrypting data BC security
Enhance Relational using HE cryptosystems and
Database Security simulating BC technology in the
cloud RDB structure.

Merits:The cloud service provider


(CSP) manages cloud computing
systems remotely and runs the cloud
smoothly

DemeritsModern applications need a


better level of security that includes
saving data from internal breaches.
LITERATURE SURVEY
Sl.No. Title Author and Year Objective Methods/Algorithms/
Hardware

3 Block Chain Based Cloud Ch. V. N. U. Bharathi In this survey developed popular digital Crypto
Computing: Architecture Murthy, an architecture integrating currency
andResearch Challenges block chain with cloud
revealing the
communication between
block chain and cloud.

Merits:Block chain
Technology is the future of
the industries striving for
security and privacy
improvements

DemeritsSecurity issues
and the cloud’s challenges
are significant drawbacks
of hampering the cloud.
PROPOSED SYSTEM
• Proposed a Mimic model Virtual Assistant that combines cloud computing
with blockchain that assures data integrity for Fully homomorphic encryption.
• Blockchain Network (BN) and Smart Contract intended to record information
on the file stored in the cloud to verify its integrity.
• A smart contract that allows DO to define DU access control policy.
• Virtual Assistant will be hired to store and perform computations on client
data.
• FHE will be used for encrypt/decrypt the stored data.
• Integrity Check Services (ICS)
Advantages

• Provides confidentiality, decentralization, audit availability, and the


secure sharing of file integrity monitoring results, without overloading.
• Possibility of auditing all stages of the file storage and integrity check
processes.
• Immutability, inviolability and resilience provided by the Blockchain
technology.
• Virtual Assistant plays major role of Data Owner for time consumption
process.
• Fine-grained access to data.
• Guarantee data owners’ complete control over their data
Software specification
Server Side : Python 3.7.4(64-bit) or (32-bit)
Client Side : HTML, CSS, Bootstrap
IDE : Flask 1.1.1
Back end : MySQL 5.
Server : WampServer 2i
BC DLL : pyBlock, pyenv, pyFHE
MODULES
1.Cloud Server API
1.1Data Owner
2BlockCloud Integration
2.1Smart Contract
2.2Data storage and sharing:
2.3Integrity Verification
3.Key Generation Centre (KGC).
3.1HomomorphicKey Generation
3.2Homomorphic Encryption and Decryption
4.Code bot
4.1Data Retrieval Request.
4.2Data Retrieval and Response.
5.Performance Analysis
6.System Security Analysis
References
• [1] M. Du, Q. Wang, M. He and J. Weng, "Privacy-preserving indexing and query processing
for secure dynamic cloud storage", IEEE Trans. Inf. Forensics Security, vol. 13, no. 9, pp.
2320-2332, Sep. 2018.

• [2] Y. Li, K. Gai, L. Qiu, M. Qiu and H. Zhao, "Intelligent cryptography approach for secure
distributed big data storage in cloud computing", Inf. Sci., vol. 387, pp. 103-115, May 2017.

• [3] W. Shen, J. Qin, J. Yu, R. Hao and J. Hu, "Enabling identity-based integrity auditing and
data sharing with sensitive information hiding for secure cloud storage", IEEE Trans. Inf.
Forensics Security, vol. 14, no. 2, pp. 331-346, Feb. 2019.

• [4] Y. Zhang, C. Xu, X. Lin and X. S. Shen, "Blockchain-based public integrity verification
for cloud storage against procrastinating auditors", IEEE Trans. Cloud Comput., Mar. 2019.

• [5K. Qian and H. Huang, "A new identity-based public auditing against malicious auditor in
the cloud", Int. J. Embedded Syst., vol. 11, no. 4, pp. 452-460, 2019.

You might also like