Researchers from the Department of Computer Engineering and Department of Computer Science at Jamia Millia Islamia, New Delhi, India, have proposed a blockchain-based data integrity verification scheme to enhance data security in cloud storage. The scheme uses a blind signature algorithm, lattice cryptography, a puzzle optimization algorithm, an upgraded Merkle tree, and a vacuum filter to ensure data integrity and security. Simulations showed the approach was more effective in terms of data security and integrity than existing methods. The researchers concluded that the scheme could offer a solution to data security and integrity challenges in cloud storage.
What is the Role of Blockchain in Enhancing Data Integrity in Cloud and Internet of Everything?
The Internet of Everything (IoE) has seen a significant expansion in its capabilities, thanks to the integration of cloud resources. However, the processing and storage capacities of the IoE platform are limited. To overcome this limitation, cloud service providers (CSPs) offer scalable storage resources where additional data can be stored. This method allows for the storage of user data over the CSP while ensuring data integrity and security. However, the secure storage of data is often threatened by concerns such as malicious system damage, despite the highly centralized nature of the CSPs’ storage devices.
In recent years, blockchain technology has emerged as a promising solution to these security concerns. Blockchain technology has been used to protect data transported to networks, resulting in significant security advancements. Moreover, the use of blockchain technology enhances the overall efficacy of the systems, thereby reducing costs compared to previous systems.
The primary objective of the study conducted by Pranav Shrivastava, Bashir Alam, and Mansaf Alam from the Department of Computer Engineering and Department of Computer Science at Jamia Millia Islamia, New Delhi, India, was to present a blockchain-based data integrity verification scheme. This scheme aims to enhance the scalability and utilization of cloud resources while preventing data from being corrupted as it enters the cloud.
How is Blockchain Implemented to Enhance Data Security in Cloud Storage?
The researchers proposed a novel method of implementing blockchain to enhance the security of data stores in the cloud. This method involves the use of a blockchain-based data integrity verification scheme. This scheme is designed to provide greater scalability and utilization of cloud resources while preventing data from being corrupted as it enters the cloud.
The proposed approach involves the use of several key components, including a blind signature algorithm, lattice cryptography, a puzzle optimization algorithm, an upgraded Merkle tree, and a vacuum filter. These components work together to ensure data integrity and security in the cloud.
The blind signature algorithm is used to verify the integrity of the data, while lattice cryptography provides a quantum-resistant layer of security. The puzzle optimization algorithm is used to enhance the efficiency of the system, while the upgraded Merkle tree and vacuum filter are used to improve the scalability of the system.
What are the Results and Conclusions of the Study?
The effectiveness of the proposed approach was evaluated through simulations. The results indicated that the proposed approach is more effective in terms of data security and data integrity compared to existing methodologies. Furthermore, the comparative investigation demonstrated that the proposed methodology is far more effective and competent.
The model evaluations demonstrated that the proposed approach is quite effective in data security. The researchers concluded that the blockchain-based data integrity verification scheme provides a promising solution to the challenges of data security and integrity in cloud storage.
In conclusion, the study presents a novel approach to enhancing data security and integrity in cloud storage using blockchain technology. The proposed approach offers greater scalability and utilization of cloud resources while preventing data corruption. The results of the study demonstrate the effectiveness of the proposed approach, suggesting its potential for widespread adoption in the future.
Publication details: “Blockchain based Quantum Resistant Signature Algorithm for Data Integrity Verification in Cloud and Internet of Everything”
Publication Date: 2024-03-20
Authors: Pranav Shrivastava, Bashir Alam and Mansaf Alam
Source: ICST transactions on scalable information systems
DOI: https://doi.org/10.4108/eetsis.5488
