ISSN:1005-3026

Vol. 26 Issue 1 2023
AN INTEGRATED ARCHITECTURE FOR MAINTAINING SECURITY IN CLOUD COMPUTING USING LIGHT COMPUTATION CHA - CHA ALGORITHM IN BLOCKCHAIN
  1. Ramesh1, Dr. A.P. Siva Kumar2

1PG-Scholar, Department of CSE (AI), JNTUACEA, Ananthapuramu, Andhra Pradesh, India

2Associate Professor, Department of CSE, JNTUACEA, Ananthapuramu, Andhra Pradesh, India

 kattelaramesh762@gmail.com1, sivakumar.cse@jntua.ac.in2

Abstract

In this paper, widespread availability, cloud services are an easy target for actors with malicious intentions. Cloud computing is a relatively new technology that falls under the umbrella of cloud services. Cloud computing presents a significant risk to the integrity of data if improper actions are taken with the data, as cloud services are an umbrella term for cloud computing. As a consequence of this, bad actors might gain an advantage by manipulating data. Customers of cloud computing services in a diverse array of industries are becoming increasingly concerned about the veracity of the information they store in the cloud. On the other hand, blockchain is a digital ledger that cannot be altered, and it has the potential to be utilized with cloud computing to produce a cloud service that cannot be hacked. The authors of this study propose a solution that combines blockchain technology with cloud computing as a means of assuring the confidentiality of all homomorphic encryption procedures. The proposed plan calls for the utilization of the Byzantine Fault Tolerance consensus in order to build a decentralized network of cloud service providers (CSPs) that are capable of processing data based on the requirements of individual customers. This will result in the elimination of the monopoly that the CSP has on the storage and management of data. Every CSP collaborates in order to arrive at a single, standardized hash value that can be stored in the shared database they all use. Blockchain networks, such as Bitcoin’s and Ethereum’s, keep a record of the values of their master hashes to ensure the production of data that is incorruptible. Keeping track of the address of the block header is the first step; next, obtain the master hash values for use in auditing functions. An in-depth theoretical analysis of the costs that have already been incurred in producing new master hash values for each cryptocurrency is presented here. Bitcoin’s online performance is slower and more expensive than Ethereum’s, whereas Ethereum leads to reduced client financial expenses due to its lower transaction fees. In addition, we detail the application of the suggested methodology, discuss the criteria for data security that it satisfies, and offer potential directions for further development. The suggested verification method uses a publicly available cryptocurrency as a backend service. It also does not require any special configuration from the user, other than the installation of a wallet for the desired cryptocurrency. Computing in the cloud, companies that provide cloud services (also known as CSPs), and blockchain are all examples of terms that can be used to describe this rapidly expanding industry.

Keywords: Cloud service providers (CSPs), Blockchain networks, Cloud computing, Concrete Hash Algorithm (CHA), Cloud Security Alliance (CSA).