Blockchain-Augmented Cloud Computing Models for Secure Decentralized Data Management
DOI:
https://doi.org/10.63282/3117-5481/AIJCST-V5I4P101Keywords:
Blockchain, Cloud Computing, Decentralized Data Management, Data Security, Smart Contracts, Distributed Ledger Technology (DLT), Proof of Integrity (PoI), IPFS, Hybrid Cloud ModelAbstract
Cloud computing has revolutionized global data storage and processing but remains vulnerable due to its centralized structure, posing risks to data security, integrity, and privacy. This paper proposes a Blockchain-Augmented Cloud Computing (BACC) model that integrates blockchain technology to create a secure, transparent, and decentralized data management system. The architecture comprises three layers—Cloud Storage Layer (CSL), Blockchain Service Layer (BSL), and Access Control Layer (ACL)—working together to ensure decentralized authentication, integrity verification, and transaction transparency. A novel Proof-of-Integrity (PoI) consensus mechanism is introduced to enhance security while maintaining computational efficiency. Incorporating smart contracts, IPFS, and a hybrid blockchain model balances performance with security. Experimental evaluations using Ethereum test networks and AWS demonstrate significant improvements, including 37% higher data integrity, 42% fewer unauthorized access incidents, and 18% reduced computational overhead. The findings confirm that blockchain integration strengthens cloud infrastructures, paving the way for next-generation, trustworthy, and decentralized cloud ecosystems for digital enterprises and government applications
References
[1] M. Ali, S. U. Khan, and A. V. Vasilakos, “Security in cloud computing: Opportunities and challenges,” Information Sciences, vol. 305, pp. 357–383, 2015.
[2] C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” The Journal of Supercomputing, vol. 63, no. 2, pp. 561–592, 2013.
[3] G. Zyskind, O. Nathan, and A. Pentland, “Decentralizing privacy: Using blockchain to protect personal data,” in Proc. IEEE Security and Privacy Workshops (SPW), 2015, pp. 180–184.
[4] J. Li, X. Yu, Y. Lou, and M. Chen, “A hybrid blockchain architecture for secure data storage and sharing in cloud environments,” Future Generation Computer Systems, vol. 96, pp. 485–495, 2019.
[5] S. Zhang and J. Wang, “CloudChain: A blockchain-based cooperative cloud storage architecture,” IEEE Access, vol. 7, pp. 41922–41930, 2019.
[6] Y. Chen, S. Li, and X. Zhang, “Smart contract-based access control for the Internet of Things using blockchain,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2719–2725, 2019.
[7] Efficient Broadcast Time Stamping — J. Benaloh & M. de Mare, Microsoft Research TR 1991 2, April 1991.
[8] M. Kaur and S. Singh, “Federated blockchain model for secure and scalable cloud data sharing,” Journal of Network and Computer Applications, vol. 162, p. 102656, 2020.
[9] K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Computing, vol. 14, no. 5, pp. 14–22, 2010.
[10] Improving the Efficiency and Reliability of Digital Time Stamping — D. Bayer, S. Haber & W. S. Stornetta, Springer (Lecture Notes in Computer Science), 1999.
[11] M. S. Ali, M. Vecchio, M. Pincheira, K. Dolui, F. Antonelli, and M. H. Rehmani, “Applications of blockchains in the Internet of Things: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1676–1717, 2019.
[12] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” White Paper, 2008.
[13] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for IoT security and privacy: The case study of a smart home,” in Proc. IEEE PerCom Workshops, 2017, pp. 618–623.
[14] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An overview of blockchain technology: Architecture, consensus, and future trends,” in Proc. IEEE BigData Congress, 2017, pp. 557–564.
[15] X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, “Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control,” Journal of Medical Systems, vol. 40, no. 10, pp. 1–8, 2016.
[16] Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du, and M. Guizani, “MeDShare: Trust-less medical data sharing among cloud service providers via blockchain,” IEEE Access, vol. 5, pp. 14757–14767, 2017.
[17] M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, “Bubbles of trust: A decentralized blockchain-based authentication system for IoT,” Computers & Security, vol. 78, pp. 126–142, 2018.
[18] Designing LTE-Based Network Infrastructure for Healthcare IoT Application - Varinder Kumar Sharma - IJAIDR Volume 10, Issue 2, July-December 2019. DOI 10.71097/IJAIDR.v10.i2.1540
[19] Thallam, N. S. T. (2020). Comparative Analysis of Data Warehousing Solutions: AWS Redshift vs. Snowflake vs. Google BigQuery. European Journal of Advances in Engineering and Technology, 7(12), 133-141.
[20] Kanji, R. K. (2020). Federated Learning in Big Data Analytics Privacy and Decentralized Model Training. Journal of Scientific and Engineering Research, 7(3), 343-352.
[21] The Role of Zero-Emission Telecom Infrastructure in Sustainable Network Modernization - Varinder Kumar Sharma - IJFMR Volume 2, Issue 5, September-October 2020. https://doi.org/10.36948/ijfmr.2020.v02i05.54991
[22] Thallam, N. S. T. (2021). Performance Optimization in Big Data Pipelines: Tuning EMR, Redshift, and Glue for Maximum Efficiency.
[23] Security and Threat Mitigation in 5G Core and RAN Networks - Varinder Kumar Sharma - IJFMR Volume 3, Issue 5, September-October 2021. DOI: https://doi.org/10.36948/ijfmr.2021.v03i05.54992
[24] Kanji, R. K. (2021). Federated data governance framework for ensuring quality-assured data sharing and integration in hybrid cloud-based data warehouse ecosystems through advanced ETL/ELT techniques. International Journal of Computer Techniques, 8(3), 1-9.
[25] Garg, A. (2022). Unified Framework of Blockchain and AI for Business Intelligence in Modern Banking . International Journal of Emerging Research in Engineering and Technology, 3(4), 32-42. https://doi.org/10.63282/3050-922X.IJERET-V3I4P105
[26] Kulasekhara Reddy Kotte. 2022. ACCOUNTS PAYABLE AND SUPPLIER RELATIONSHIPS: OPTIMIZING PAYMENT CYCLES TO ENHANCE VENDOR PARTNERSHIPS. International Journal of Advances in Engineering Research , 24(6), PP – 14-24, https://www.ijaer.com/admin/upload/02%20Kulasekhara%20Reddy%20Kotte%2001468.pdf
[27] Varinder Kumar Sharma - AI-Based Anomaly Detection for 5G Core and RAN Components - International Journal of Scientific Research in Engineering and Management (IJSREM) Volume: 06 Issue: 01 | Jan-2022 .DOI: 10.55041/IJSREM11453
[28] Kanji, R. K. (2022). A Unified Data Warehouse Architecture for Multi-Source Forest Inventory Integration and Automated Remote Sensing Analysis. Sarcouncil Journal of Engineering and Computer Sciences, 1, 10-16.
[29] Gopi Chand Vegineni. 2022. Intelligent UI Designs for State Government Applications: Fostering Inclusion without AI and ML, Journal of Advances in Developmental Research, 13(1), PP – 1-13, https://www.ijaidr.com/research-paper.php?id=1454
[30] Naga Surya Teja Thallam. (2022). Cost Optimization in Large-Scale Multi-Cloud Deployments: Lessons from Real-World Applications. International Journal of Scientific research in Engineering and Management, 6(9).
