Secured Data Sharing and Access Control For Cloud Based Data Storage Updated
Secured Data Sharing and Access Control For Cloud Based Data Storage Updated
Secured Data Sharing and Access Control For Cloud Based Data Storage Updated
Abstract—When it comes to the security of data in the cloud techniques are not considered to be reliable in a vulnerable
storage model, access control is the most crucial factor. However, cloud environment within security zones therefore we present
traditional methods of data sharing and access control present solution of various alternate technology which could provide
significant difficulties in the field of study due to issues like
privacy data leakage and key abuse. Electronic health records greater security and less vulnerability. Cloud computing
(EHR) are now able to be shared amongst various healthcare typically involves not requiring end-user knowledge of
apps thanks to cloud-based EHR outsourcing. In addition, the physical connection and location of the overall network in
blockchain model provides safety by authenticating users with order to access storage services, software, installation, and
a number of different kinds of encryption. Although there are information. The cloud is a widely used method in IT today,
risks to patients’ privacy, the benefits of working with the
cloud outweigh them. As a result, this study makes two major shifting the focus from individual computers to massive
contributions to the literature by establishing a framework for data centres [3]. According to NIST, ”cloud computing”
secure data sharing and retrieval in a blockchain-based cloud is ”a model for enabling convenient, on-demand network
environment. The first contribution implements a blockchain- access to a shared pool of configurable, logically isolated
based model for cloud-based access control and data sharing. As computing resources that are managed centrally and made
a result of the access control and data sharing process developed
using Blockchain technology, the issue of a single point of failure available by a service provider with minimal user interaction
in cloud architecture can be effectively addressed. Based on user or intervention.” The widespread availability of high-speed
ID and password, the Data User (DU) generates a registration internet is likely to lead to the distribution of applications as
request that is sent to the Data Owner (DO).The DO data is services across the Internet, reducing the system’s overall cost.
added to a blockchain for conducting financial transactions using
a secret key. Files are encrypted by the DO and then uploaded
to the Interplanetary File System (IPFS). The DO creates the Cloud Computing is the distribution, via Internet as a
ciphertext metadata and incorporates it into the blockchain service, of hardware and software resources on-demand [4].
ledger of transactions by means of the encrypted file location
and encrypted key. The second contribution is a blockchain-
Cloud computing’s primary goal is to efficiently utilise dis-
based system that streamlines the cloud’s data-sharing and persed resources, integrate them to maximise throughput, and
retrieval procedures. In order to ensure safe transmission, an address widespread computation issues. Scalability, virtualiza-
EHR application implements a data protection procedure. The tion, interoperability, the service standard, and delivery models
cloud computing infrastructure incorporates components such (public, private, and hybrid) are all terms associated with cloud
as data consumers, data producers, blockchain transactions,
smart contracts, and the Interplanetary File System (IPFS).
computing [5].
As an added bonus, DO includes a data protection algorithm
for securing EHR, wherein encrypted EHR is converted to a) Cloud computing’s practical uses
IPFS before being shared with the data consumer. The Tracy- Software as a Service, Platform as a Service, and
Singh product and the Conditional Autoregressive Value at risk Infrastructure as a Service are the various types of cloud
(CAViaR)-based Bird swarm algorithm are used to maintain
data privacy during the data protection process (CAViaR-based service providers.
BSA). With a response time of 251.33 seconds, 3.5% information • SaaS
loss, a user detection rate of 36.66%, and 82.87% privacy, the • PaaS
developed blockchain-based access control and data sharing in • IaaS
cloud structure achieved better performance.
Keywords— Cloud Computing, Blockchain Technology, In- b) Models for deploying to the cloud
terplanetary File System, CAViaR-based BSA There are three main types of cloud deployment mod-
els: public, private, and hybrid. In the Clouds Available
1. I NTRODUCTION to the Public, i.e.
The use of VPN services by end users to facilitate • Private Cloud
communication is what gave rise to the term ”cloud” in the • Community Cloud
communications lexicon [1]. As stated in [2], The traditional • Hybrid Cloud
1.1. Cloud-Based Information Exchange Using Blockchains technology was incorporated into this design so that the
Transactions are recorded in an immutable distributed ledger tamper-proof nature of the model could be ensured. System
called a blockchain, which is a product of a decentralised privacy has also been protected thanks to the development of
architectural model. Commonly, blockchain refers to a secure, cryptographic and proxy re-encryption algorithms. Improved
distributed database that stores data in chronological blocks functionality was also achieved through the incorporation of
[6]. When using a blockchain-based system, all types of data features such as tamper resistance, revocability of consent,
that are visible to the nodes are recorded. And it is the and auditability.
transparent, decentralised, and public ledger that records all
business dealings between any two parties in a way that can Blockchain-based distributed key management architecture
be verified at any time and in any place [7]. Information in (BDKMA) was modelled for IoT access control by [14].
a blockchain cannot be altered after it has been recorded, The latency was reduced by employing a fog computing
unless a new record is added to the chain. When it comes to structure, and the cross-domain access model was achieved
blockchain currencies, everyone on the network has access to by having multiple block chains run in the cloud. In
the same, accurate ledger, guaranteeing full consensus among addition, the blockchain model was implemented to ensure
all participants [8] [9]. compliance with privacy and security regulations while still
meeting requirements for granular auditing, decentralisation,
2. L ITERATURE R EVIEW scalability, and extensibility in access management. In
For example, [10] developed an emergency access control addition, models of system operation, as well as a number
management model (EACMS) for a health record blockchain of authorization assignment nodes and group access models,
system, elaborating on the existing research works based on were developed to facilitate system scalability. Multiple
ledger-based blockchain techniques. Rules based on smart structures can be supported by the system thanks to the
contracts were used in this model to regulate time limits and dynamic duration changes in transaction collection. This
unexpected events. In addition, Business Network Archive algorithm significantly improves system performance and
(BNA), which measures the system’s performance, was scales well to large networks.
created with the help of hyperledger composer. In this case,
smart contracts fetched necessary information from the ledger For the purpose of enforcing granular access control
and authorised each transaction. In addition, the model’s systems, [15] developed a blockchain-based system for secure
efficacy, security, and auditability are all dependent on the mutual authentication called BSeIn. This method provides
ledger smart contracts it employs. security and privacy through the use of encryption, integrated
attribute signature, and message authentication code. In this
For a trustworthy system of sharing cloud data, [11] implementation, attribute signatures and the blockchain work
presented a blockchain-driven access control model with together to verify terminals, gateways, and message hashes.
multiple attribute authorities. Each attribute was jointly Further, confidentiality was ensured via a multi-receiver
managed by different authorities in this model to prevent a encryption process. Smart contracts were used to ensure
single point of failure; this model relied on the Shamir secret scalability, and interactions between them handled the request
sharing algorithm and the Hyperledger Fabric implementation process.
process. Also, smart contracts were developed for estimating
tokens for attributes, which reduces the computation and A cross-domain data sharing strategy for electronic health
communication overhead in data users, and the benefits of the records was modelled by Y. Fang and colleagues [16]. This
blockchain model were taken into account to establish trust method incorporates a cryptographic model to ensure the
between multiple parties. In addition, the distributed ledger privacy of patient data while allowing for its secure transfer
technology (blockchain) model facilitates the recording of and exchange. This method deftly incorporates on-demand
the access control procedure in a secure and auditable fashion. revocation, fine-grained access control, and the delegation
model for managing permissions. In addition, both the proxy
This distributed ledger technology (blockchain) was signature model and the role-based model incorporated a
developed by [12]. Metadata about the files was stored on delegation procedure.
the blockchain, while the files themselves were stored in
various locations using Distributed Hash Tables (DHT) in
a peer-to-peer network. Also, the off-chain storage model 3. P ROPOSED M ODEL
that was developed achieves both low latency and high The deployment of EHR in the cloud has enabled the
throughput. This algorithm significantly lessens the burden sharing of medical data along with other healthcare-related
on the project’s central computing resources in terms of applications. Additionally, the blockchain ensures safety by
processing, availability, and accumulation. verifying the identities of its users through a variety of en-
cryption methods. When it comes to patient privacy, however,
Blockchain enabled access control method for personal the benefits of cloud computing’s streamlined administration
health record scheme presented by [13]. Blockchain come with some serious caveats. In this chapter, we’ll look at
the secure block chain-assisted framework that makes cloud- Calculate n value of fitness for the individuals and compute
based data sharing and retrieval possible. A data protection the optimal solution
model is developed for EHR applications to enable the secure
transmission. Interplanetary File System, Smart Agreement,
Data User, and Data Owner are all part of the transactional
block chain and data sharing infrastructure (IPFS). In this
case, the data owner stores a data protection strategy for
securing EHR, with the protected EHR being transmitted
to Inter-Planetary File System before being shared by the
user. In addition, Tracy-Conditional Singh’s Autoregressive
Value at risk-enabled Bird swarm algorithm (CAViaR-BSA),
an integration of BSA [17] and CAViaR [18], is used to protect
data by safeguarding its confidentiality while acquiring the
best privacy-preserving coefficients. In this case, privacy and
utility functions serve as inspiration for the development of
fitness goals.
3.1. CAVIAR-BSA: A Privacy-Protecting Protocol
Two procedures make up the CaViaR-BSA that was devel-
oped. CaViaR-BSA, a combination of BSA [19] and CAViR
[20], is proposed as the first step in determining the best
possible co-efficient. In the second stage, the optimal co-
efficient and input data matrix are offered into a Tracy Singh
product, which converts the raw data into encrypted data based 4. R ESULT AND D ISCUSSION
on the data protection system. In this work, we introduce This section details the developed CaViaR-enabled BSA’s
an optimization-driven searching algorithm to determine the effectiveness in terms of the performance metrics discussed
optimal coefficient values for ensuring the privacy of sensitive earlier (Responsiveness, Genuine user detection, privacy, and
data stored in the cloud and informational value. Optimal information loss). Changing the sample size is used for evalu-
coefficients and the Tracy Singh product are also employed to ation. As an added measure, we use datasets for the evaluation
safeguard cloud-based information. The Tracy Singh product of performance. The developed mechanism is tested using
resolves a problem that arose when converting a pair of the python. In CaViaR-enabled Bird Swarm algorithm we are
operators to their product. At the end of the data retrieval Initializing the population of the birds along with the various
phase, private information is obtained. The developed CaViaR- algorithm parameters and find the global experiences fitness
BSA method for privacy preservation is depicted in Fig 1. for the whole swarm and personal experience for each bird.
Calculate the status of each bird Foraging or Vigilance and
divide the population in to producers and scroungers birds
update the producers and scroungers birds to find the best
fitness or solution.