Professional Documents
Culture Documents
Immediate Detection of Data Corruption by Integrating Blockchain in Cloud Computing
Immediate Detection of Data Corruption by Integrating Blockchain in Cloud Computing
Immediate Detection of Data Corruption by Integrating Blockchain in Cloud Computing
Proof of stake is slightly different from proof of work. For this block, a hash is generated and sent to next block. In
In proof of stake, the validator of a block will be selected on this way, each and every block is connected in the chain [15]. If
the basis of the capacity or the amount of assets the miner an unauthorized user tries to make any changes in the data about
holds [12,13]. This validator then validates a block before the transactions, written in the block, the chain will be affected
adding into the chain. completely, i.e. modification in any block will affect its previous
block which in turn affects the whole chain.
III. BLOCKCHAIN IN BITCOIN
TRANSACTIONS This happens because of the immutability property of the
blockchain. Decentralization property of the blockchain allows it
Blockchain technology is initially used for bitcoin to be replicated by all of it’s nodes. The nodes are nothing but the
transactions[14]. Let us consider an example, where money users in the networks that can participate in the transactions. The
2
2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN)
nodes have the local copies of the blockchain. Every updation to modify the data in the server, the blockchain function is
in the blockchain will be recorded in the local copies of the invoked immediately. The blockchain gets the data ID that is
nodes also. If a block is modified and the act is identified, suspected to be corrupted and it insists the server to generate a
then the data can be rolled back to the original form by using hash value for the particular data again.
the data stored in the other copies of the nodes. In this way,
data recovery can be achieved. This new hash value is compared against the old hash value
that is stored in the block. If these values don’t match with each
IV. BLOCKCHAIN IN CLOUD COMPUTING other, then the notification is sent to the particular client about
corruption. This process is explained in Fig. 2.
In this paper, we propose a model, where the users can
store their immutable data in the cloud and can preserve it
without any data corruption..
3
2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN)
are compared and tabulated in Table 2 along with the other Computing (CCGRID), 2017.
required parameters. [7] A. P. Joshi, M. Han and Y. Wang, A survey on security and privacy
issues of blockchain technology, Mathematical foundations of
By the comparison made in the table below, the computing, pp. 121-147, 2018
proposed scheme can be termed as more efficient than the
[8] P. J. Ho and P. J. Hyuk, Blockchain security in cloud computing: Use
existing provable data possession protocols. cases, challenges and solutions, Symmetry, 1–13, 2017.
[9] L. Lamport, R. Shostak and M. Pease, The byzantine generals
TABLE 2: COMPARISON OF VERIFICATION TIME AND OTHER problem, ACM Transactions on Programming Languages and
PARAMETERS Systems, Vol. 4, No. 3, 1982
Verification Probability Usage Verification Time [10] .R. Kotla, L. Alvisi, M. Dahlin, A. Clement and E. Wong,
Method of of TPA Style Taken Zyzzyva: Speculative byzantine fault tolerance, in ACM
Detection ms/GB SIGOPS Operating Systems Review , ACM, pp. 45– 58, 2007.
Atneise et. al 1-(1-ρ)t Yes On 62.5 [11] M. Vukolic, The quest for scalable blockchain fabric: Proof-of-
[2] demand work vs. BFT replication, International Workshop on Open
Erway et. al 1-(1-ρ)t Yes On 30 Problems in Network Security, Springer,112–125, 2015.
[3] demand [12] D. Larimer, Transactions as proof-of-stake, 2013.
Block-chain 1 No Auto- 8
based integrity generated [13] D. Larimer, Delegated proof-of-stake white paper, 2014.
verification [14] J. A. Garay, A. Kiayias and N. Leonardos, The bitcoin
backbone protocol: Analysis and applications., in
VII. CONCLUSION EUROCRYPT, Lecture notes in Computer Science, pp. 281–
310, 2015.
A design for integrating blockchain in the cloud storage is [15] G. Wood, Ethereum: A secure decentralised generalised
proposed and discussed. The working model of the original transaction ledger, Ethereum Project Yellow Paper, pp. 1–32,
blockchain that is used in bitcoin transactions have been 2014.
explained. In this way, we can implement blockchain in the
cloud for storing data and detecting the tampering of data. The
immutability and the decentralization properties of the
blockchain technology can be incorporated into different
fields to obtain different results. In the proposed model, we
took advantage of these properties to achieve the data
integrity. The proposed model has been compared against the
existing protocols in terms of cost and time, and have been
proved efficient than other protocols. In future, this can be
extended to attain other properties of data protection too.
Also, the data recovery can be addressed in the upcoming
researches. The proposed design will be suitable for all
immutable records like a government's data about its citizens.
This design can be modified further to allow data
modifications, so that it suits the mutable data storage in
future.
REFERENCES
[1] E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi , A. Margheri
and V. Sassone, Blockchain-based database to ensure data integrity
in cloud computing environments, in Proceedings of the First Italian
Conference on Cybersecurity (ITASEC17), Venice, Italy, 2017.
[2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L.
Kissner, Z. Peterson and D. Song, Remote data checking using
provable data possession, ACM Transactions on Informatin and
System Security (TISSEC), pp 12:1-12:34, 2011.
[3] C.C. Erway, A. Kupcu, C. Papamanthou and R. Tamassia, Dynamic
Provable Data Possession, ACM Transactions on Information and
System Security, Vol. 17, No. 4, Article 15, 2015.
[4] H. Wang, D. He, J. Yu and Z. Wang , Incentive and unconditionally
anonymous Identity-based public Provable Data Possession, IEEE
Transactions on Service Computing, 2016.
[5] S. Shen, H. Lin and W. Tzeng, An effective integrity check scheme
for secure erasure code- based storage systems, IEEE transactions
on Reliability,vol. 64, no. 3,pp. 840-851, 2015.
[6] D. K. Tosh, S. Shetty, X. Liang, C. A. Kamhoua, K. A. Kwiat
and L. Njilla, Security implications of blockchain cloud with
analysis of block withholding attack.,17th IEEE/ACM
International Symposium on Cluster, Cloud and Grid