Secure Cloud Computing using Blockchain with Verkle Tree Hash algorithm

Authors

  • Imran Shahid Shaikh  Computer Engineering, AI ARKP, Maharashtra, India

DOI:

https://doi.org/10.32628/IJSRST52411137

Keywords:

Cloud Computing, Blockchain, Security, Information security, Hash values.

Abstract

Cloud computing permits you to avoid the need to install your own dedicated servers machines, run your own software, and manage your own databases. You can access data, applications, and computing hardware resources from anywhere in the world, rather than needing to be installed in office. As a result, the cloud offers faster innovation, flexible resources, and economies of scale. A rapid growth in Cloud Computing adaption observed but, still, the data security concerns in cloud are not addressed. In parallel Blockchain, technology is an emerging technology makes it impossible or difficult for the system to be changed, hacked, or manipulated. This paper enlightening the various aspects of security in Blockchain and Cloud Computing.

References

  1. Yuan Y, Wang F Y. Blockchain: The State of the Art and Future Trends[J]. Acta Automatica Sinica, 2016.22(03):1882.
  2. Pilkington M. Blockchain Technology: Principles and Applications[J]. Social Science Electronic Publishing, 2015.51(07):121-122.
  3. Pass R, Seeman L, Shelat A. Analysis of the Blockchain Protocol in Asynchronous Networks[C]// International Conference on the Theory & Applications of Cryptographic Techniques. 2017.(03).
  4. Cloud Security Report 2023 [online] Available: https://www.cybersecurity-insiders.com/portfolio/2023-cloud-security-report-check-point
  5. John Kuszmaul, 2019 PRIMES Conference Talk on Verkle Trees.
  6. S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, https://bitcoin.org/bitcoin.pdf, 2008, Accessed: 2017-03-08.
  7. P. Rogaway and T. Shrimpton, “Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance, 2004, Accessed: 2017-9-16.
  8. R. C. Merkle, A digital signature based on a conventional encryption function, in Conference on the Theory and Application of Cryptographic Techniques. Springer, 1987, pp. 369–378.
  9. D. Catalano and D. Fiore, Vector commitments and their applications, in Public-Key Cryptography–PKC 2013. Springer, 2013, pp. 55–72.

Downloads

Published

2024-02-29

Issue

Section

Research Articles

How to Cite

[1]
Imran Shahid Shaikh "Secure Cloud Computing using Blockchain with Verkle Tree Hash algorithm" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 11, Issue 1, pp.345-351, January-February-2024. Available at doi : https://doi.org/10.32628/IJSRST52411137