Location

https://www.kennesaw.edu/ccse/events/computing-showcase/sp24-cday-program.php

Streaming Media

Document Type

Event

Start Date

25-4-2024 4:00 PM

Description

Cloud services are vulnerable to assaults because of their widespread availability. Since cloud computing is still a relatively new service, there is a real risk that sensitive information might be altered while in transit. Because of this, bad actors may gain an edge by manipulating data. Clients using the cloud for a wide range of use cases want to know that their data is reliable and secure. Blockchain, on the other hand, is an immutable digital ledger that may be used with cloud computing to provide an immutable cloudbased data storage and processing system. In this work, we present a method that integrates blockchain technology with cloud computing to guarantee the security of data encrypted using any homomorphic encryption method. The suggested technique uses a distributed network of processing CSPs determined by client needs to circumvent the CSP's ultimate jurisdiction over the data. All CSPs work together to calculate a single, unified hash value for use in their shared database.Bitcoin and Ethereumblockchain networks keep track of master hash values to guarantee the production of immutable data.

Share

COinS
 
Apr 25th, 4:00 PM

GMR-107 An Integrated Architecture For Maintaining Security In Cloud Computing Using Blockchain

https://www.kennesaw.edu/ccse/events/computing-showcase/sp24-cday-program.php

Cloud services are vulnerable to assaults because of their widespread availability. Since cloud computing is still a relatively new service, there is a real risk that sensitive information might be altered while in transit. Because of this, bad actors may gain an edge by manipulating data. Clients using the cloud for a wide range of use cases want to know that their data is reliable and secure. Blockchain, on the other hand, is an immutable digital ledger that may be used with cloud computing to provide an immutable cloudbased data storage and processing system. In this work, we present a method that integrates blockchain technology with cloud computing to guarantee the security of data encrypted using any homomorphic encryption method. The suggested technique uses a distributed network of processing CSPs determined by client needs to circumvent the CSP's ultimate jurisdiction over the data. All CSPs work together to calculate a single, unified hash value for use in their shared database.Bitcoin and Ethereumblockchain networks keep track of master hash values to guarantee the production of immutable data.