Banushri, A. and Karthika, R.A. (2023) Hyperledger Blockchain and Lightweight Bcrypt Symmetric Key Encryption to Boost Cloud Computing Security Effectiveness. In: 2023 International Conference on Circuit Power and Computing Technologies (ICCPCT), Kollam, India.
![[thumbnail of Hyperledger Blockchain and Lightweight Bcrypt Symmetric Key Encryption to Boost Cloud Computing Security Effectiveness _ IEEE Conference Publication _ IEEE Xplore.pdf]](https://ir.vistas.ac.in/style/images/fileicons/archive.png)
Hyperledger Blockchain and Lightweight Bcrypt Symmetric Key Encryption to Boost Cloud Computing Security Effectiveness _ IEEE Conference Publication _ IEEE Xplore.pdf
Download (444kB)
Abstract
One of the key business models of contemporary information technology is cloud computing. It offers users a range of services (hardware, software) with little user engagement and at a reasonable price. Utilising a cloud environment raises several challenges, chief among them being security and privacy. This study explores the issues and proposes a Lightweight Bcrypt Symmetric Key (LBSK) data encryption and decryption technique with key rotation. A variety of algorithms and Blockchain technologies are used to protect the information. Encryption is one of the most fascinating features of data security technology. An Aggregated Authority Certificate Provider (AACP) is recommended with blockchain authentication for secured cloud data audit, which lessens the burden on the data owner. The suggested AACP continuously runs on a cloud server and tracks user requests. For the non-trusted provider, the Hyperledger blockchain proxy re-encrypts data to increase protection and privacy. The Blockchain algorithm was used to encrypt the data from beginning to end, and it was then saved in the cloud. Without storing the data locally, a security degree, public verification, and performance factors must be taken into consideration. Compared to current methods, the proposed strategy is intended to deliver a better result. The Blockchain technique was used to encrypt the data from beginning to end, and it was then saved on the cloud. Public verification and performance considerations raise the security level for remote data verification without storing the data locally. In comparison to current methods, the proposed method offers a better result.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Subjects: | Computer Science > Database Management System |
Divisions: | Computer Science |
Depositing User: | Mr IR Admin |
Date Deposited: | 23 Sep 2024 09:34 |
Last Modified: | 23 Sep 2024 09:34 |
URI: | https://ir.vistas.ac.in/id/eprint/6944 |