A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment
Abstract
:1. Introduction
- We suggest a new file sharding technique that is combined with blockchain smart contracts to improve privacy and security of data.
- To guarantee data integrity and secrecy during storage and retrieval processes, we create a zero-knowledge proof technique.
- We carry out a thorough performance study, showing how effective our strategy is in comparison to other approaches.
2. Related Work
3. Novelty of the Work
4. Secure Cloud Environment for Data Storage and Data Transmission
4.1. Sharding and Encryption Modelling
4.1.1. Variables and Definitions of the Model
4.1.2. Sharding Model
- -
- is the remainder when the file size is divided by the number of pieces n.
- -
- denotes the floor function, which rounds down to the nearest integer.
4.1.3. Encryption of Shards
4.1.4. Hashing and Metadata
4.1.5. Storing Metadata
- -
- represents the list of hashes for all encrypted shards along with their respective indices.
- -
- is the type or format of the original file.
- -
- specifies the encryption algorithm used
4.2. Data Migration Using ZK-SNARK
4.2.1. Variables and Definitions
4.2.2. zk-SNARKs Construction
- Circuit Definition: Define a circuit C that represents the computation verifying the correctness of the reassembly and integrity of the encrypted shards.
- Public Parameters: Generate proving key (PK) and verifying key (VK):
4.2.3. Proving Phase
- Inputs and Witness: The public input x includes the commitments and the hash . The witness w consists of and .
- Proof Generation: The proof is generated as follows:
4.2.4. Verification Phase
- Verification: Verify the proof against the public input:
4.2.5. Summary
4.3. Smart Contract for Access Control and Metadata Storage
4.3.1. Variables and Definitions
4.3.2. Smart Contract Model for Access Control
- Storing Metadata function: Refer to Section 4.1.5 to know about Metadata function.
- Access Function: The smart contract function that controls the access of user data:
- -
- is the identifier of the file.
- -
- u is the user address.
- Grant Access Function: The smart contract function for granting access to a user:
- Revoke Access Function: The smart contract function for revoking access from a user:
- Check Access Function: The smart contract function for checking if a user has access:
4.4. Challenges and Solutions
- Protecting Data Privacy and Privacy-Aware Method in Blockchain Data ManagementAs discussed earlier, We encrypt metadata prior to its storage on the blockchain as part of our strategy to safeguard data privacy in blockchain systems. Since the user’s crypto wallet’s private keys are used for this encryption, only the wallet owner is able to decode and view the metadata that has been stored. We improve the privacy of data on the blockchain by integrating this encryption process, which prevents unauthorized parties from viewing or changing the metadata. By protecting sensitive data and utilizing the transparency and immutability of the blockchain, this approach not only preserves the data but also conforms to privacy-preserving strategies and Privacy-Aware Methods such as SymmeProof, BlockShare and VQL.
- Practical Implementation ChallengesA certain hardware and software infrastructure is needed for our system to be implemented in practice, especially for the smooth operation of cryptographic and blockchain transactions. However, by utilizing cloud-based systems that provide scalable and affordable solutions, these requirements can be lessened. For instance, the demand for specialized hardware can be decreased by leveraging cloud services like AWS or Azure for blockchain nodes and sharding operations. Furthermore, our approach works with open-source blockchain frameworks like Ethereum and Hyperledger, which provide a wealth of tools for developers to create and implement the system.
- Cost-Effectiveness and Gas Fees for Blockchain Transactions.There are extra expenses associated with using smart contracts and blockchain technology, such as gas prices. But by cutting out pointless calculations and storage activities, we have optimized the design of our smart contracts to use the least amount of gas possible. In addition, implementing the system on layer-2 scaling platforms such as Polygon can considerably reduce gas expenses while preserving the blockchain’s advantages in terms of security and decentralization. Although these technologies have initial costs, improved data security, privacy, and verifiability can have long-term benefits that exceed these costs, making the system cost-effective in situations where data integrity is crucial.
5. Experimental Results and Discussion
- is the sharding time with n servers.
- is the sharding time with 4 servers.
- n is the number of servers.
- represents the minimum number of servers required, and is constrained by the system’s resources, typically equal to the number of shards
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Alshammari, M.A.; Hamdi, H.; Mahmood, M.A.; El-Aziz, A.A.A. Cloud Computing Access Control Using Blockchain. Int. J. Intell. Syst. Appl. Eng. 2024, 12, 380–390. [Google Scholar]
- Ressi, D.; Romanello, R.; Piazza, C.; Rossi, S. AI-enhanced blockchain technology: A review of advancements and opportunities. J. Netw. Comput. Appl. 2024, 225, 103858. [Google Scholar] [CrossRef]
- Thakur, A.; Chauhan, S.; Tomar, I. Self-Healing Nodes with Adaptive Data-Sharding. arXiv 2024, arXiv:2405.00004. [Google Scholar]
- Almasian, M.; Shafieinejad, A. Secure cloud file sharing scheme using blockchain and attribute-based encryption. Comput. Stand. Interface 2024, 87, 103745. [Google Scholar] [CrossRef]
- Hamid, I.; Frikha, M. Blockchain-Enhanced Cybersecurity and Privacy in Cloud Computing: A Systematic Literature Review. J. Theor. Appl. Inf. Technol. 2024, 102, 514–531. [Google Scholar]
- Behera, S.; Prathuri, J.R. FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data. Cryptography 2024, 8, 8. [Google Scholar] [CrossRef]
- Chen, C.; Yang, G.; Li, Z.; Xiao, F.; Chen, Q.; Li, J. Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols. Cryptography 2024, 8, 6. [Google Scholar] [CrossRef]
- Jiang, Y.; Baee, M.A.R.; Simpson, L.R.; Gauravaram, P.; Pieprzyk, J.; Zia, T.; Zhao, Z.; Le, Z. Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. Cryptography 2024, 8, 5. [Google Scholar] [CrossRef]
- Bespalov, Y.; Kovalchuk, L.; Nelasa, H.; Oliynykov, R.; Viglione, R. Models for Generation of Proof Forest in zk-SNARK Based Sidechains. Cryptography 2023, 7, 14. [Google Scholar] [CrossRef]
- Sucharitha, G.; Sitharamulu, V.; Mohanty, S.N.; Matta, A.; Jose, D. Enhancing Secure Communication in the Cloud Through Blockchain Assisted-CP-DABE. IEEE Xplore 2023, 11, 99005–99015. [Google Scholar] [CrossRef]
- Dhinakaran, D.; Selvaraj, D.; Dharini, N. Towards A Novel Privacy-Preserving Distributed Multiparty Data Outsourcing Scheme For Cloud Computing With Quantum Key Distribution. Int. J. Intell. Syst. Appl. Eng. 2023, 12, 286–300. [Google Scholar]
- Dubey, H.; Roy, K. Secure Access Control in Cloud Computing Environments: Smart Contract Blockchain. Vidhyayana 2023, 8, 392–404. [Google Scholar]
- Prasad, S.N.; Rekha, C. Block chain based IAS protocol to enhance security and privacy in cloud computing. Meas. Sens. 2023, 28, 100813. [Google Scholar] [CrossRef]
- Jansirani, E.; Kowsalya, R.N. Analysis of ECC and ZKP Based Security Algorithms in Cloud Data. J. Theor. Appl. Inf. Technol. (JATIT) 2023, 101, 6354–6368. [Google Scholar]
- Stodt, F.; Reich, C. A Review on Digital Wallets and Federated Service for Future of Cloud Services Identity Management. In Proceedings of the 15th International Conference on Advanced Service Computing (SERVICE COMPUTATION 2023), Nice, France, 26–30 June 2023; pp. 16–20. [Google Scholar]
- Rajguru, S.N.; Choubey, S.K. Blockchain in Cloud Computing for Securing Documents. Int. Res. J. Mod. Eng. Technol. Sci. (IRJMETS) 2023, 5, 123–130. [Google Scholar] [CrossRef]
- Alsuwat, W.; Alsuwat, H. A Survey on Cloud Storage System Security via Encryption Mechanisms. Int. J. Comput. Sci. Netw. Secur. 2022, 22, 52–61. [Google Scholar]
- Jadhav, G.C.; Awale, K.I.; Patil, A.A.; Rode, K.N. Cloud Cryptography. Int. J. Res. Publ. Rev. (IJRPR) 2022, 3, 2200–2202. [Google Scholar]
- Avstein, E. Zero-Knowledge Cloud Storage: What is it and Why You Need it Now. Codemot. Mag. 2021. [Google Scholar] [CrossRef]
- Mandal, S.; Khan, D.A.; Jain, S. Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-from-Home Driven by COVID-19 Pandemic. New Gener. Comput. 2021, 39, 599–622. [Google Scholar] [CrossRef]
- Ghosh, P. The State-of-the-Art in Zero-Knowledge Authentication Proof for Cloud. In Machine Learning Techniques and Analytics for Cloud Security, 1st ed.; Wiley: Hoboken, NJ, USA, 2021; pp. 149–170. [Google Scholar] [CrossRef]
- Hamid, I.; Frikha, M. A Review on Cryptography in Cloud Computing. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2024, 6, 225–230. [Google Scholar]
- Ragul, R.; Rajan, R.A.P. Efficient Horizontal Scaling of Databases Using Data Sharding Technique. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 2020, 9, 590–593. [Google Scholar] [CrossRef]
- Zhang, F.; Fan, X.; Zhou, P.; Zhou, W. Zero Knowledge Proofs for Cloud Storage Integrity Checking. arXiv 2019, arXiv:1912.00446. [Google Scholar]
- Mahmood, G.S.; Huang, D.J.; Jaleel, B.A. A Secure Cloud Computing System by Using Encryption and Access Control Model. J. Inf. Process. Syst. 2019, 15, 538–549. [Google Scholar] [CrossRef]
- Edris, E.K.K.; Aiash, M. ZKPVM: A Zero-Knowledge Authentication Protocol for VMs’ Live Migration in Mobile Cloud Computing. In Proceedings of the 13th International Conference on Software Technologies (ICSOFT), Porto, Portugal, 26–28 July 2018; pp. 858–864. [Google Scholar]
- Shaik, A.; Madhurima, B.; Neelakantappa, M. An Approach To Zero Knowledge Proof For Secure Data Sharing in Cloud Storage: New Direction. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 2018, 8, 195–201. [Google Scholar]
- Jain, T.; Khan, J.A. Secure Big Data Access Control Policies for Cloud Computing Environment. Int. J. Innov. Res. Comput. Sci. Technol. (IJIRCST) 2017, 5, 254–256. [Google Scholar] [CrossRef]
- Bagui, S.; Nguyen, L.T. Database Sharding: To Provide Fault Tolerance and Scalability of Big Data on the Cloud. Int. J. Cloud Appl. Comput. (IJCAC) 2015, 5, 36–52. [Google Scholar] [CrossRef]
- Costa, C.H.; Filho, J.V.B.M.; Maia, P.H.M.; Oliveira, F.C.M.B. Sharding By Hash Partitioning—A Database Scalability Pattern To Achieve Evenly Sharded Database Clusters. In Proceedings of the 17th International Conference on Enterprise Information Systems (ICEIS), Barcelona, Spain, 27–30 April 2015; Volume 2, pp. 313–320. [Google Scholar] [CrossRef]
- Patel, M.P.; Hasan, M.I.; Vasava, H.D. Survey Study On Issues In Mongodb In Cloud Environment. Int. J. Adv. Innov. Res. 2014, 3, 18–21. [Google Scholar]
- Balasubramaniam, S.; Kavitha, V. A survey on data encryption tecniques in cloud computing. Asian J. Inf. Technol. 2014, 13, 494–505. [Google Scholar]
Authors | Citation | Title | Objectives | Findings |
---|---|---|---|---|
M. A. Alshammari, H. Hamdi, M. A. Mahmood, and A. A. A. El-Aziz (2024) | [1] | Cloud Computing Access Control Using Blockchain. | Secure solution for access control in cloud computing environments using blockchain. | By using blockchain technology efficiently, a more secure, scalable, and Transparent access control framework can be implemented. |
Dalila Ressi, Riccardo Romanello, Carla Piazza, Sabina Rossi, (2024) | [2] | AI-enhanced blockchain technology: A review of advancements and opportunities. | Integrating AI into Blockchain applications to improve performance like security, consensus, scalability, and interoperability. | The research work highlights that AI-based blockchain provides a better solution for scalability, thereby reducing gas fee. |
Ayush Thakur, Sanskar Chauhan, and Ilisha Tomar (2024) | [3] | Self-Healing Nodes with Adaptive Data-Sharding. | Improve Data Storage Efficiency In Cloud Systems. | It is shown that breaking down large datasets into smaller components enhances storage efficiency, scalability, and overall performance. |
M. Almasian, A Shafieinejad (2024) | [4] | Secure cloud file sharing scheme using blockchain and attribute-based encryption. | Leveraging blockchain technology for secure access control of the user data. | Using blockchain to implement access control as smart contract, wherein user can request to access his file by logging a transaction in the blockchain. |
G. Sucharitha, V. Sitharamulu, S. N. Mohanty, A. Matta, and D Jose (2023) | [10] | Enhancing Secure Communication in the cloud Through Blockchain-Assisted CP-DABE. | Use of encryption to protect sensitive data. | Usage of Blockchain technology for secure key generation, and for access control while the immutability of the blockchain ensures the confidentiality of ciphertext. |
D. Dhinakaran, D. Selvaraj, and N. Dharini. (2023) | [11] | Towards A Novel Privacy-Preserving Distributed Multiparty Data Outsourcing Scheme For Cloud Computing With Quantum Key Distribution. | Encryption And Distribution Techniques In Enhancing Data Privacy And Access Speed. | Leveraging encryption technique to store and migrate data from one source to another. |
F. Stodt and C. Reich (2023) | [15] | A Review of Digital Wallets and Federated Service for Future of Cloud Services Identity Management. | Utilizing Digital Wallets For Encryption And Key Management. | Digital wallets can play a key role in both identity of the user as well as security of user’s data. |
W. Alsuwat and H. Alsuwat (2022) | [17] | A Survey on Cloud Storage System Security via Encryption Mechanisms. | Choosing efficient encryption algorithm that is suitable for cloud environment. | Searchable encryption, attribute-based, identity-based encryption, homomorphic encryption and cloud DES algorithms. Each of the above methods has some limitations and disadvantages. |
G. C. Jadhav, K. I. Awale, A. A. Patil, and K. N. Rode (2022) | [18] | Cloud Cryptography. | Use of cryptographic algorithm for secure data. | When users upload or store data during cloud service, the data owner does not seem to understand the path of data transfer. Users do not know whether the data is collected, analyzed and accessed by third parties. |
E. Avstein (2021) | [19] | Zero-Knowledge Cloud Storage: What is it and Why You Need it Now. | Utilization of zkcs, users can securely store data on a remote server without disclosing the actual information. | Employ zk-snarks to create zkps for secure data transmission, ensuring that encrypted information remains hidden. |
R. Ragul and R. Arokia Paul Rajan (2020) | [23] | Efficient Horizontal Scaling of Databases Using Data Sharding Technique. | Enhancing cloud data protection using aes and rsa encryption. | Combining data privacy and integrity measures in cloud storage approach aligns with the project’s current focus on encryption and secure data migration using zero-knowledge proofs (zkps). |
F. Zhang, X. Fan, P. Zhou, and W. Zhou (2020) | [24] | Zero Knowledge Proofs for Cloud Storage Integrity Checking. | Efficient and secure storage for decentralized systems provides valuable insights into zero knowledge proofs for cloud storage integrity checking. | Examine proof-of-replication (porep) to guarantee that storage providers store data in multiple locations, improving security and efficiency. |
G. S. Mahmood, D. J. Huang, and B. A. Jaleel (2019) | [25] | A Secure Cloud Computing System by Using Encryption and Access Control Model. | Access control model that can safeguard data in cloud computing. | Employing encryption and access control to guarantee the confidentiality, integrity, and appropriate control of access to sensitive data. |
E. K. K. Edris and M. Aiash (2018) | [26] | ZKPVM: A Zero-Knowledge Authentication Protocol for VMs’ Live Migration in Mobile Cloud Computing. | Application of ZKPs in both contexts demonstrates their versatility and effectiveness in enhancing security protocols for cloud-based operations. | Employing ZK-SNARKs to generate Zero-Knowledge Proofs, allowing secure and privacy-preserving data migration between cloud services. |
C. H. Costa, J. V. B. Moreira Filho, P. H. M. Maia, and F. C. M. B. Oliveira (2015) | [30] | Sharding By Hash Partitioning—A Database Scalability Pattern To Achieve Evenly Sharded Database Clusters | Hashing partition method to increase the scalability of the database. | Efficient scalable and data management in cloud storage and data migration, underscores the significance of sharding in improving performance and reliability in distributed computing applications. |
M. P. Patel, M. I. Hasan, and H. D. Vasava (2014) | [31] | Survey Study On Issues In Mongodb In Cloud Environment. | Security enhancement by using encryption, data fragmentation, and distributed storage methods. | Adopting robust encryption techniques and effective data fragmentation methods, which can emphasize the use of the sharding concept and the encryption technique for secure user data storage and sharing. |
File Size (MB) | Without Sharding (ms) | With Sharding, for n = 4 (ms) | With Sharding, for n = 10 (ms) | With Sharding, for n = 20 (ms) | With Sharding, for n = 30 (ms) |
---|---|---|---|---|---|
10 | 69.5 | 40.158 | 16.06 | 8.03 | 5.35 |
50 | 117.57 | 112.25 | 44.9 | 22.45 | 14.97 |
100 | 295.65 | 197.109 | 78.84 | 39.42 | 26.28 |
200 | 577.76 | 450.16 | 180.60 | 90.03 | 60.02 |
1000 | 4595 | 2540 | 1016 | 508 | 338.67 |
File Size (MB) | Our System (Sharding, for n = 4) (ms) | Amazon S3 (ms) | Google Cloud Storage (ms) | Microsoft Azure Blob Storage (ms) |
---|---|---|---|---|
100 MB | 797.109 | 950 | 899 | 912 |
200 MB | 1050.16 | 1525 | 1311 | 1482 |
1 GB | 3140 | 4231 | 4018 | 4211 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rangappa, K.; Ramaswamy, A.K.B.; Prasad, M.; Kumar, S.A. A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment. Cryptography 2024, 8, 39. https://doi.org/10.3390/cryptography8030039
Rangappa K, Ramaswamy AKB, Prasad M, Kumar SA. A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment. Cryptography. 2024; 8(3):39. https://doi.org/10.3390/cryptography8030039
Chicago/Turabian StyleRangappa, Komala, Arun Kumar Banavara Ramaswamy, Mahadeshwara Prasad, and Shreyas Arun Kumar. 2024. "A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment" Cryptography 8, no. 3: 39. https://doi.org/10.3390/cryptography8030039
APA StyleRangappa, K., Ramaswamy, A. K. B., Prasad, M., & Kumar, S. A. (2024). A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment. Cryptography, 8(3), 39. https://doi.org/10.3390/cryptography8030039