2022
DOI: 10.1007/s11276-022-02924-y
|View full text |Cite
|
Sign up to set email alerts
|

A blockchain and smart contract-based data provenance collection and storing in cloud environment

Abstract: Data uploading needs security and privacy in the cloud. But there are some problems like centralized provenance data (PD) collection, storage, lack of security, integrity, and more time consumption. There are methods like Rabin, Knapsack, McEliece, Elagamal, and Rivest–Shamir–Adleman for the generation of keys but it increases the encryption and decryption time and less security. Therefore, the blockchain and smart contract-based data provenance (BSCDP) Architecture is proposed for providing secure storage in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…For largescale data, the data outsourcing computation becomes very important. At present, outsourcing non-core IT business and its business processes to professional service providers has become the first choice for enterprise users to improve their business professionalism [1] [2]. In the data outsourcing computation transaction, there are mutual distrust problems between the transaction parties, including the return of wrong results by the service provider and the non-payment of enterprise customers to the service provider, which affect the universality of the data outsourcing computation [3].…”
Section: Introductionmentioning
confidence: 99%
“…For largescale data, the data outsourcing computation becomes very important. At present, outsourcing non-core IT business and its business processes to professional service providers has become the first choice for enterprise users to improve their business professionalism [1] [2]. In the data outsourcing computation transaction, there are mutual distrust problems between the transaction parties, including the return of wrong results by the service provider and the non-payment of enterprise customers to the service provider, which affect the universality of the data outsourcing computation [3].…”
Section: Introductionmentioning
confidence: 99%
“…This experiment represented a standard terminal-to-fog server device. The simulation includes (Jyoti & Chauhan, 2022) based on catastrophic algorithms. Data about computing capacity for resources and calculations are extracted from randomly generated data in MATLAB.…”
Section: Discussionmentioning
confidence: 99%
“…The actual infrastructure design has been presented referring to the papers by Sun et al (2022), Popovic et al (2022), and Jyoti and Chauhan (2022). The block records will be transmitted over encrypted links in the form of block files (preferably in JavaScript Object Notation format), which can be parsed by parsers written in Core Java and then encrypted before storing as read only records.…”
Section: Provenance Blockchain For Ensuring It Security In Cloud Manu...mentioning
confidence: 99%
“…The interaction topology and algorithm was presented referring to the designs by Jyoti and Chauhan (2022) in their secure provenance-based smart contracting architecture, and by Malik et al (2022) in their PrivChain architecture. A simplified representation of the secure provenance-based smart contracting architecture is presented in Figure 3 and PrivChain architecture is presented in Figure 4.…”
Section: Provenance Blockchain For Ensuring It Security In Cloud Manu...mentioning
confidence: 99%