Mohammed Kareem Hussein

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Cloud Computing Security using Blockchain

MOHAMMED KAREEM HUSSEIN


(213720066)
Altinbas University, Istanbul, Turkey

INTRODUCTION
Cloud customers want Cloud Service Providers to provide them with
administrations (CSP). Outsiders who provide distributed storage administrations
to their clients are known as CSPs. Third-Party Auditor (TPA) and Attribute
Authority (AA) are two more external expert companies that should provide cloud
security functionality. As we all know, the most basic and crucial difficulties while
assisting associations and foundations with cloud are security and trust. There are
several reasons for this, including the fact that cloud clients' information is in high
danger of being lost, spilt, or abused, and they have no way of escaping this
unhappy situation.

Clients of the cloud aren't even aware of who they're entrusting their data to.
Straightforwardness is also important; cloud customers have no information about
the clients of their data or how the data is disseminated inside the cloud.
Blockchain is a novel and emerging technology that cloud customers may utilize to
increase trust and information security while recovering and receiving cloud
administrations. When compared to centralized data base security, blockchain can
provide enhanced security. Blockchain uses a cryptographic hash limit to keep
track of the data that is linked to and protected by the previous block.

A blockchain is a decentralized ledger that keeps track of transactions and prevents


them from being altered. Blockchain is typically guided by a loose connection and
is designed to avoid fervent movements. By storing information in an active
educational list, blockchain can provide exceptional security. Information hoarding
damages and attacks can be avoided, according to board opinion. Furthermore,
because the Blockchain has a receptiveness brand name, it may provide
information clarity when used in an area that requires information clarity. Because
of these characteristics, it has the potential to be used in a variety of areas,
including the financial sector and the Internet of Things (IoT) environment, and its
applications are expected to expand. Because of its versatility and receptiveness,
scattered enrollment has been used in a variety of IT situations. Cloud security and
protection concerns have also been examined from a variety of perspectives.

CHARACTERISTICS OF BLOCKCHAIN
Essentials refers to the wide range of features and attributes that a Blockchain
structure should have, as well as the barriers that the system must overcome in
order to function properly and successfully. As a result, they have an impact on the
general convenience of the Blockchain structure and might have a greater impact
on the system process. Following that, a few of the blockchain organization's less-
than-valuable traits will be discussed.

• Transparency: Blockchain has the ability to use and exchange data throughout a
transaction due to the realistic notion of hubs.

• Simultaneity: Blockchain execution improves when hubs execute at the same


time.

• Flexibility: Blockchain is adaptable due to the addition and deletion of additional


nodes.

Taking everything into account, the three limits receive a lot of attention:

- Exchange Processing Distribution Speed:


– Dimensions:

- Manageability vs. Idleness:

• Non-critical failure adaptation:

The Blockchain organization's issue-tolerant characteristic ensures that any failure


at any hub will be obvious to the other hubs in the Blockchain, allowing the
organization to function properly in the case of a problem.

• Simplicity: Every single hub in the company can see the Blockchain exchanges.

• Security: The Blockchain organization utilizes wonderful cryptographic


conventions, such as SHA-255, to obtain data.

• Quality of Service: In a Blockchain organization, the nature of administration


(QoS) is determined by reaction speed and dependability, as well as the time it
takes for an exchange to complete and the duty to deliver the required services.

• Displeasure Management: There should be a cycle in place that can keep the
Blockchain network running smoothly while also determining the source of
disappointment. It may be able to suggest natural ways to recover from
disappointment.

REQUIREMENT OF CLOUD
A selection of the most important Cloud Requirements that may have an influence
on various Cloud plan examples.

• Versatility: Cloud Network is capable of handling a significant number of


customers or hubs while utilizing Cloud administrations. The hubs may be scaled
in and out, and the equipment engineering is adjustable in size.
• Flexibility: A capable Blockchain System can adjust responsibility by allotting
and de-dispensing assets in a tailored design, ensuring that at any given moment,
all existing assets fulfill the most stringent practical requirements.

• Security: Every client should have complete control over his or her data, and the
framework should assure this.

• Unlimited Computing Resources: Cloud provisioning firms do not need clients to


prepare ahead of time.

• Evaluating: The costs of various Cloud apps and administrations vary, and the
payment is based on how the resources are used.

• Use: The assets can be viably adjusted to calibrate the changeable burden by
allowing the most optimum applications.

• Cost-Effectiveness: Cloud administrations are demand-based throughout the web,


which is advantageous to the end client since the client does not need to purchase
product licenses that are appropriate for the equipment. This will reduce the overall
cost of programming maintenance and activities.

• Execution: Evaluations are often judged in terms of the efficacy of the


applications and capacities operating on the cloud framework.

• Adaptability: Adaptability refers to the ability to share papers or administrations


across the internet. Clients benefit definitely from cloud's versatility.

CHALLENGES FOR BLOCKCHAIN SECURITY


As we all know, Blockchain technology is directly linked to computer-generated
and virtual money, which is used by everyone. Regardless, there are a few
Blockchain security problems to be aware of, which include the following:

1. The Blockchain Accord


2. Security of Exchanges

3. Safety of your wallet

4. Security Programming

Blockchain Agreement
A Blockchain can be split into two because the final two squares, which were
formed quickly, can be used by two different clients, providing two different
buddies supplied an outcome while mining at the same time. If it isn't chosen as the
most recent square by the Bitcoin network's partners, the square will become
obsolete, and endless mining will become pointless. The group will keep track of
Bitcoin peers with more than 50% mining potential.

SECURE BLOCKCHAIN SOLUTION FOR CLOUD


In a distributed computing environment, if a client's confidential information is
exposed, it might result in both operational and emotional problems. In the
distributed computing environment, we primarily focus on information security
when communicating and saving, as well as respectability and protection. If
blockchain is improved to an appropriate support level and integrated with the
distributed computing environment, it can ensure security. A secure e-wallet is
introduced using Blockchain technology. If the e-wallet isn't deleted properly, the
customer data might be misused.

This extra client information can be used to delete the customer's information. The
occurrence of two-sided Blockchain exchanges and the development of the Bitcoin
record is a crucial test. You'll need a good e-wallet to deal with such security
concerns. Typically, e-wallets provided on PCs are used, but as mobile phones
become more popular, it is becoming increasingly important to ensure the security
of e-wallets on cell phones. As a result, an exchange is only complete when the
precision and legality of a mobile phone time stamp guarantee the trade's security.
Limiting, verifying, and underwriting concerns that may arise throughout the
preparedness, requirements assessment, execution and testing, and supporting
stages are all essential components of a robust e-wallet. If the e-security wallet is
breached or hacked by the attackers, a thorough and reliable e-wallet recovery
should be carried out. It should ensure the security of customer exchange
information stored in the e-wallet, as well as the settings required to monitor and
operate the e-wallet. When the electronic wallet isn't being utilized, it should
provide a method for properly and securely erasing any remaining client data, and
the rest of the data should be deleted as well.

Distributed Ledger
Every cloud client can view a comparable form/duplicate of the record since all
record duplicates are highly synced. The record includes a list of services used by
specific cloud clients as well as policies and service level agreements (SLAs).
Cloud clients normalize their data using the theory of diggers in Bitcoin, according
to inventor.

Decentralized Smart Contract


According to, a phrase shrewd agreement is used in Blockchain, which is a product
that retains agreements of the agreement, confirms the terms, and executes the
terms. More trust and transparency on CSP, TPA, and AA parties is enabled by
blockchain mixed with smart contract advancements. Brilliant Contracts are stored
on the Blockchain, with a copy available to all cloud customers. The support is re-
appropriated when the payment is confirmed. All agreement exchanges are stored
on the Blockchain in a sequential sequence for future access, together with the
whole audit trail of events. If a party tries to modify an agreement on the
Blockchain, the remaining cloud clients will be able to detect and prevent it.
CONCLUSION
The overall structure of Blockchain has been investigated in this study. The
characteristics of Blockchain and Cloud Computing security requirements have
also been investigated. As a result of this analysis, it has been determined that
Blockchain may be a cost-effective and fantastic asset for providing security in the
Cloud Computing environment. In addition, several available blockchain
implementations for Cloud security were examined in this article.[1]

REFERENCE
[1] A. Gupta, S. T. Siddiqui, S. Alam, and M. Shuaib, “Cloud computing
security using blockchain,” J. Emerg. Technol. Innov. Res., vol. 6, no. 6, pp.
791–794, 2019.

You might also like