Location
https://www.kennesaw.edu/ccse/events/computing-showcase/sp24-cday-program.php
Document Type
Event
Start Date
25-4-2024 4:00 PM
Description
Cloud services are vulnerable to assaults because of their widespread availability. Since cloud computing is still a relatively new service, there is a real risk that sensitive information might be altered while in transit. Because of this, bad actors may gain an edge by manipulating data. Clients using the cloud for a wide range of use cases want to know that their data is reliable and secure. Blockchain, on the other hand, is an immutable digital ledger that may be used with cloud computing to provide an immutable cloudbased data storage and processing system. In this work, we present a method that integrates blockchain technology with cloud computing to guarantee the security of data encrypted using any homomorphic encryption method. The suggested technique uses a distributed network of processing CSPs determined by client needs to circumvent the CSP's ultimate jurisdiction over the data. All CSPs work together to calculate a single, unified hash value for use in their shared database.Bitcoin and Ethereumblockchain networks keep track of master hash values to guarantee the production of immutable data.
Included in
GMR-107 An Integrated Architecture For Maintaining Security In Cloud Computing Using Blockchain
https://www.kennesaw.edu/ccse/events/computing-showcase/sp24-cday-program.php
Cloud services are vulnerable to assaults because of their widespread availability. Since cloud computing is still a relatively new service, there is a real risk that sensitive information might be altered while in transit. Because of this, bad actors may gain an edge by manipulating data. Clients using the cloud for a wide range of use cases want to know that their data is reliable and secure. Blockchain, on the other hand, is an immutable digital ledger that may be used with cloud computing to provide an immutable cloudbased data storage and processing system. In this work, we present a method that integrates blockchain technology with cloud computing to guarantee the security of data encrypted using any homomorphic encryption method. The suggested technique uses a distributed network of processing CSPs determined by client needs to circumvent the CSP's ultimate jurisdiction over the data. All CSPs work together to calculate a single, unified hash value for use in their shared database.Bitcoin and Ethereumblockchain networks keep track of master hash values to guarantee the production of immutable data.