Real-Time User-Service Centric Historical Trust Model Based Access Restriction in Collaborative Systems with Blockchain Public Auditing in Cloud

Authors

  • N. Vel Murugesh Kumar Department of Computer Science and Engineering, R.M.K. Engineering College, Kavaraipettai-601206, Gummidipoondi Tk, Thiruvallur Dist., Tamil Nadu,India
  • D. Naveen Raju Department of Computer Science and Engineering, R.M.K. Engineering College, Kavaraipettai-601206, Gummidipoondi Tk, Thiruvallur Dist., Tamil Nadu,India
  • Gopirajan PV Department of Computational Intelligence, SRM institute of science and technology, Kattankulathur campus
  • P. Subhashini Department of Information Technology, Vel Tech Multi Tech dr.rangarajan dr.sakunthala engineering college, Chennai

Keywords:

Cloud System, Collaborative Systems, Data Security, Access Restriction, Public Auditing, USHTM-BPA, UCTS, SCTS, FLBPA

Abstract

The recent collaborative systems works over the cloud environment which is being encouraged by various service providers in reality. The organizations maintain numerous data in cloud which has been accessed and shared by various users of the environment. The service provider has the responsibility in maintaining the originality of the data and maintaining the security of the data. To enforce both of them, various access restriction and public auditing schemes are available. Number of approaches uses different features of user as well as service. However they suffer to achieve expected performance in data security and public auditing. To handle this issue, a novel real-time User-Service Centric Historical Trust Model with Blockchain Public Auditing (USHTM-BPA) is presented in this article. The method computes User Centric Trust Score (UCTS) and Computes Service Centric Trust Score (SCTS) to measure Trust Weight for the user towards secure access restriction. Further, the method adapts Feature Level Blockchain Public Auditing (FLBPA) which measures feature centric trusted access score (FCTAS) in restricting illegal access to improve data security in public auditing. The proposed method improves the performance of public auditing in collaborative systems and improves data security in cloud.

Downloads

Download data is not yet available.

References

H. Amintoosi et al., "Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems," in IEEE Internet of Things Journal, vol. 9, no. 7, pp. 5368-5379, 1 April1, 2022, doi: 10.1109/JIOT.2021.3109274.

H. R. Hasan, K. Salah, R. Jayaraman, I. Yaqoob, M. Omar and S. Ellahham, "Blockchain-Enabled Telehealth Services Using Smart Contracts," in IEEE Access, vol. 9, pp. 151944-151959, 2021, doi: 10.1109/ACCESS.2021.3126025.

C. Hahn, H. Kwon, D. Kim and J. Hur, "Enabling Fast Public Auditing and Data Dynamics in Cloud Services," in IEEE Transactions on Services Computing, vol. 15, no. 4, pp. 2047-2059, 1 July-Aug. 2022, doi: 10.1109/TSC.2020.3030947.

P. Huang, K. Fan, H. Yang, K. Zhang, H. Li and Y. Yang, "A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System," in IEEE Access, vol. 8, pp. 94780-94794, 2020, doi: 10.1109/ACCESS.2020.2993606.

X. Yang, X. Pei, M. Wang, T. Li and C. Wang, "Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain," in IEEE Access, vol. 8, pp. 144809-144822, 2020, doi: 10.1109/ACCESS.2020.3014510.

Y. Zhang, J. Yu, R. Hao, C. Wang and K. Ren, "Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data," in IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 3, pp. 608-619, 1 May-June 2020, doi: 10.1109/TDSC.2018.2829880.

Zhitao Guan, Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach, ACM Transactions on Internet TechnologyVol. 21, No. 1, 2021.

Xiaolong Xu, Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain, ACM Transactions on Internet TechnologyVol. 21, No. 1, 2021.

Juhno Kim, Intelligent Mediator-based Enhanced Smart Contract for Privacy Protection, ACM Transactions on Internet Technology Volume 21Issue 1February 2021 .

Jidian Yang et al., “A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks”, Sensors, Vol.19, pp.1-19, 2019.

Wei She, Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks, Research Gate, 2019.

Qi Liu, Research on trust mechanism of cooperation innovation with big data processing based on blockchain, Springer Link (WCN), 2019.

Chen Y, A Blockchain-Based Collocation Storage Architecture for Data Security Process Platform of WSN, IEEE (CSCWD), 2018.

S. Mudepalli, et. Al "An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing," IEEE (ICICCS), pp. 267-271, 2017.

R. Nivedhaa and J. J. Justus, "A Secure Erasure Cloud Storage System Using advanced Encryption Standard Algorithm and Proxy Re-Encryption," IEEE (ICCSP), pp. 0755-0759, 2018.

M. Bouchaala, et.al "Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing," IEEE (IWCMC), pp. 1860-1865, 2019.

V. R. Prabha and P. Latha, "Fuzzy trust protocol for malicious node detection in wireless sensor networks", Wireless Pers. Commun., vol. 94, no. 4, pp. 2549-2559, 2017.

Architecture of Proposed USHTAR-FLBPA Model

Downloads

Published

27.01.2023

How to Cite

Kumar, N. V. M. ., Raju, D. N. ., PV, G. ., & Subhashini, P. (2023). Real-Time User-Service Centric Historical Trust Model Based Access Restriction in Collaborative Systems with Blockchain Public Auditing in Cloud. International Journal of Intelligent Systems and Applications in Engineering, 11(2s), 69–75. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2509

Issue

Section

Research Article