Augmenting The Cloud Environment Security Through Blockchain Based Hash Algorithms

RAVI KANTH MOTUPALLI

ravikanth51@gmail.com
(India)

Abstract

Many techniques and algorithms are developed to enhance the security in the cloud environment. This helps the users to secure their server from malicious attacks. Hence the study and investigation of the performance enhanced security algorithms is a must demanded field in the research industry. When large number users using same server to store their information in cloud environment security is a must needed component to preserve the privacy and confidentiality of every individual user. This can be further strengthened by detecting the attacks in earlier stages and taking countermeasure to prevent the attack. Thus securing the data network without any leakage and loss of the information is a challenging task in the cloud environment. When the attacks or intrusion is detected after the occurrence there may be damage to the data in the form of data damage or theft. Hence it is necessary to predict and detect the attacks before the occurrence to protect the privacy and confidentiality of the user information.

Keywords: Cloud security; Data privacy; Data confidentiality; Hash Algorithm; Substitutional encryption


Keywords:

Cloud security; Data privacy; Data confidentiality; Hash Algorithm; Substitutional encryption

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, Above the clouds: A berkeley view of cloud com-puting, Technical Report No. UCB/EECS-2009-28, EECS Department, University of California, Berkeley (2009).
  Google Scholar

N. Fernando, S.W. Loke, W. Rahayu, Mobile cloud computing: A survey, Future generation computer systems 29(1) (2013) 84-106.
DOI: https://doi.org/10.1016/j.future.2012.05.023   Google Scholar

C. Yang, Q. Huang, Z. Li, K. Liu, F. Hu, Big Data and cloud computing: innovation opportunities and challenges, International Journal of Digital Earth 10(1) (2017) 13-53.
DOI: https://doi.org/10.1080/17538947.2016.1239771   Google Scholar

S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of network and computer applications 34(1) (2011) 1-11.
DOI: https://doi.org/10.1016/j.jnca.2010.07.006   Google Scholar

M.A. Rababaa, M.A. Kofahi, F.A. Saqqar, S.A. Rababavh, Hash algorithms for security on GSM system, International Review on Computers and Software 4 (2009) 698-703.
  Google Scholar

M. Ali, S.U. Khan, A.V. Vasilakos, Security in cloud computing: Opportunities and challenges, Information sciences 305 (2015) 357-383.
DOI: https://doi.org/10.1016/j.ins.2015.01.025   Google Scholar

N. Santos, K.P. Gummadi, R. Rodrigues, Towards Trusted Cloud Computing, HotCloud 9(9) (2009) 3.
  Google Scholar

H. Hui, D. McLernon, Design and Application of a Service Outsourcing Cloud for the Insurance Industry, Proceedings of the 9th International Conference on Information Communication and Management (2019) 1-5.
DOI: https://doi.org/10.1145/3357419.3357420   Google Scholar

S. Srisakthi, A.P. Shanthi,Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR), Wireless Personal Communications 114(4) (2020) 3003-3015.
DOI: https://doi.org/10.1007/s11277-020-07514-9   Google Scholar

S. Namasudra, R. Chakraborty, A. Majumder, Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 16(3s) (2020) 1-19.
DOI: https://doi.org/10.1145/3392665   Google Scholar

P. Sivakumar, M. NandhaKumar, R. Jayaraj, A. Sakthi Kumaran, Securing Data and Reducing the Time Traffic Using AES Encryption with Dual Cloud, IEEE International Conference on System, Computation, Automation and Networking (ICSCAN) (2019) 1-5.
DOI: https://doi.org/10.1109/ICSCAN.2019.8878749   Google Scholar

A.K. Gautam, R. Kumar, A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks, SN Applied Sciences 3(1) (2021) 1-27.
DOI: https://doi.org/10.1007/s42452-020-04089-9   Google Scholar

S.P. Kumar, A. Aswini, M. Kavithadevi, S. Ramya, Improvised dedupication with keys and chunks in HDFS storage, Third International Conference on Science Technology Engineering & Management (ICONSTEM), (2017) 226-230.
DOI: https://doi.org/10.1109/ICONSTEM.2017.8261419   Google Scholar

M.B. Yassein, S. Aljawarneh, E. Qawasmeh, W. Mardini, Y. Khamayseh, Comprehensive study of symmetric key and asymmetric key encryption algorithms, International conference on engineering and technology (ICET) (2017) 1-7.
DOI: https://doi.org/10.1109/ICEngTechnol.2017.8308215   Google Scholar

A. Bhuvaneshwaran, P. Manickam, M. Ilayaraja, K. Sathesh Kumar, K. Shankar, Clustering Based Cybersecurity Model for Cloud Data, Cyber security and Secure Information Systems (2019) 227-240.
DOI: https://doi.org/10.1007/978-3-030-16837-7_11   Google Scholar

A. El-Yahyaoui, M.D.E.C. El Kettani, Data privacy in cloud computing, 4th International Conference on Computer and Technology Applications (ICCTA) (2018) 25-28.
DOI: https://doi.org/10.1109/CATA.2018.8398650   Google Scholar

Z.H. Mahmood, M.K. Ibrahem, New fully homomorphic encryption scheme based on multistage partial homomorphic encryption applied in cloud computing, 1st Annual International Conference on Information and Sciences (AiCIS) (2018) 182-186.
DOI: https://doi.org/10.1109/AiCIS.2018.00043   Google Scholar

R. Gayatri, Y. Gayatri, Detection of Trojan based DoS Attacks on RSA Cryptosystem using Hybrid Supervised Learning Models, IEEE Third International Conference on Smart Systems and Inventive Technology (ICSSIT) (2020) 1-5.
DOI: https://doi.org/10.1109/ICSSIT48917.2020.9214116   Google Scholar

D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Generation computer systems 28(3) (2012) 583-592.
DOI: https://doi.org/10.1016/j.future.2010.12.006   Google Scholar

A.T. Hashem, I. Yaqoob, N.B. Anuar, S. Mokhtar, A. Gani, The rise of big data on cloud computing: Review and open research issues, Information systems 47 (2015) 98-115.
DOI: https://doi.org/10.1016/j.is.2014.07.006   Google Scholar

D. Sun, G. Chang, L. Sun, X. Wang, Surveying and analyzing security, privacy and trust issues in cloud computing environments, Procedia Engineering 15 (2011) 2852-2856.
DOI: https://doi.org/10.1016/j.proeng.2011.08.537   Google Scholar

Download


Published
2023-03-30

Cited by

MOTUPALLI, R. K. (2023). Augmenting The Cloud Environment Security Through Blockchain Based Hash Algorithms. Journal of Computer Sciences Institute, 26, 1–6. https://doi.org/10.35784/jcsi.3064

Authors

RAVI KANTH MOTUPALLI 
ravikanth51@gmail.com
India

Statistics

Abstract views: 133
PDF downloads: 197