Cloud computing data privacy protection method based on blockchain

被引:0
|
作者
He, Yingjun [1 ]
Ouyang, Wenhui [2 ]
Li, Shaolong [1 ]
Wang, Lin [1 ]
Zhou, Jing [1 ]
Su, Wenwei [1 ]
Li, Shenzhang [1 ]
Mei, Donghui [1 ]
Shi, Yan [1 ]
Jin, Yanxu [1 ]
Li, Chenglin [1 ]
Ren, Yonghui [1 ]
机构
[1] Yunnan Power Grid Co Ltd, Informat Ctr, Kunming, Yunnan, Peoples R China
[2] Yunnan Minzu Univ, Dept Preparatory Educ, Kunming, Yunnan, Peoples R China
关键词
blockchain technology; cloud computing network; user data; privacy data; privacy protection;
D O I
10.1504/IJGUC.2023.133436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Different from the uniqueness and tamper resistance of traditional data, users are always facing greater risk of leakage in the data storage of cloud computing network. In order to ensure the security of users' private data, a cloud computing data privacy protection method based on blockchain is proposed. On the basis of clarifying the infrastructure of blockchain structure and cloud computing storage structure, design cloud computing data privacy protection methods. With the support of blockchain technology, based on the analytic hierarchy process model of cloud computing user privacy protection, based on the definition of blockchain messages and IPFS storage parameter settings. Cloud computing data privacy protection is realised through three parts: cloud computing data privacy disclosure path identification, cloud computing data aggregation algorithm using privacy homomorphism technology and data privacy protection algorithm based on blockchain technology. The experimental results show that the proposed method can enhance the application security of cloud computing privacy data, make it free from the risk of disclosure in the storage process and thus realise the privacy protection of cloud computing data.
引用
收藏
页码:480 / 492
页数:14
相关论文
共 50 条
  • [31] Data Privacy in Cloud Computing
    EL-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-Chrif
    2018 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS (ICCTA), 2018, : 25 - 28
  • [32] A threshold-based model for privacy protection in cloud computing
    Ren X.-Y.
    Chen L.-J.
    Zhang J.-F.
    Ma X.-D.
    Advances in Information Sciences and Service Sciences, 2011, 3 (03): : 163 - 168
  • [33] A full lifecycle privacy protection scheme for sensitive data in cloud computing
    Jinbo Xiong
    Fenghua Li
    Jianfeng Ma
    Ximeng Liu
    Zhiqiang Yao
    Patrick S. Chen
    Peer-to-Peer Networking and Applications, 2015, 8 : 1025 - 1037
  • [34] A full lifecycle privacy protection scheme for sensitive data in cloud computing
    Xiong, Jinbo
    Li, Fenghua
    Ma, Jianfeng
    Liu, Ximeng
    Yao, Zhiqiang
    Chen, Patrick S.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1025 - 1037
  • [35] Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
    Sun, Pan Jun
    IEEE ACCESS, 2019, 7 : 147420 - 147452
  • [36] Privacy and data protection in mobile cloud computing: A systematic mapping study
    Alnajrani, Hussain Mutlaq
    Norman, Azah Anir
    Ahmed, Babiker Hussien
    PLOS ONE, 2020, 15 (06):
  • [37] Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain
    Xu, Ze
    Cao, Sanxing
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023, 136 (01): : 861 - 881
  • [38] Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
    Zhang J.
    Ma J.
    Ma Z.
    Li T.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (10): : 81 - 94
  • [39] Data storage query and traceability method of electronic certificate based on cloud computing and blockchain
    Chen, Huanying
    Wei, Bo
    Huang, Zhaoji
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2024, 18 (04): : 2643 - 2656
  • [40] Privacy-Preserving Vehicular Cloud Computing Based on Blockchain and Decentralized Identifier
    Liu, Zaishuang
    Ma, Xiaoxu
    Bai, Jian
    Xiao, Min
    Tang, Fei
    International Journal of Network Security, 2023, 25 (05) : 849 - 858