Cloud computing data privacy protection method based on blockchain

被引:0
|
作者
He, Yingjun [1 ]
Ouyang, Wenhui [2 ]
Li, Shaolong [1 ]
Wang, Lin [1 ]
Zhou, Jing [1 ]
Su, Wenwei [1 ]
Li, Shenzhang [1 ]
Mei, Donghui [1 ]
Shi, Yan [1 ]
Jin, Yanxu [1 ]
Li, Chenglin [1 ]
Ren, Yonghui [1 ]
机构
[1] Yunnan Power Grid Co Ltd, Informat Ctr, Kunming, Yunnan, Peoples R China
[2] Yunnan Minzu Univ, Dept Preparatory Educ, Kunming, Yunnan, Peoples R China
关键词
blockchain technology; cloud computing network; user data; privacy data; privacy protection;
D O I
10.1504/IJGUC.2023.133436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Different from the uniqueness and tamper resistance of traditional data, users are always facing greater risk of leakage in the data storage of cloud computing network. In order to ensure the security of users' private data, a cloud computing data privacy protection method based on blockchain is proposed. On the basis of clarifying the infrastructure of blockchain structure and cloud computing storage structure, design cloud computing data privacy protection methods. With the support of blockchain technology, based on the analytic hierarchy process model of cloud computing user privacy protection, based on the definition of blockchain messages and IPFS storage parameter settings. Cloud computing data privacy protection is realised through three parts: cloud computing data privacy disclosure path identification, cloud computing data aggregation algorithm using privacy homomorphism technology and data privacy protection algorithm based on blockchain technology. The experimental results show that the proposed method can enhance the application security of cloud computing privacy data, make it free from the risk of disclosure in the storage process and thus realise the privacy protection of cloud computing data.
引用
收藏
页码:480 / 492
页数:14
相关论文
共 50 条
  • [1] A Medical Data Privacy Protection Scheme Based on Blockchain and Cloud Computing
    Huang, Liang
    Lee, Hyung-Hyo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [2] Wind power prediction method based on cloud computing and data privacy protection
    Zhang, Lei
    Zhu, Shaoming
    Su, Shen
    Chen, Xiaofeng
    Yang, Yan
    Zhou, Bing
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [3] Privacy Protection Method in the Era of Cloud Computing and Big Data
    Liu, Ying
    INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND APPLICATION (ICETA 2015), 2015, 22
  • [4] DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM
    Chen, Zhishe
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 3484 - 3488
  • [5] Privacy protection for fog computing and the internet of things data based on blockchain
    Yanhui Liu
    Jianbiao Zhang
    Jing Zhan
    Cluster Computing, 2021, 24 : 1331 - 1345
  • [6] Data privacy protection model based on blockchain in mobile edge computing
    Wu, Junhua
    Bu, Xiangmei
    Li, Guangshun
    Tian, Guangwei
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (09): : 1671 - 1696
  • [7] Privacy protection for fog computing and the internet of things data based on blockchain
    Liu, Yanhui
    Zhang, Jianbiao
    Zhan, Jing
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1331 - 1345
  • [8] Edge computing privacy protection method based on blockchain and federated learning
    Fang C.
    Guo Y.
    Wang Y.
    Hu Y.
    Ma J.
    Zhang H.
    Hu Y.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (11): : 28 - 40
  • [9] A Homomorphic Encryption and Privacy Protection Method Based on Blockchain and Edge Computing
    Yan, Xiaoyan
    Wu, Qilin
    Sun, Youming
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [10] A User-Centric Method for Data Privacy Protection in Cloud Computing
    Li, Xiaohui
    He, Jingsha
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 355 - +