Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …
143
Fig. 4 A review of the security issues of cloud computing [10]
between the cloud service provider and the customer, this is known as the service
level agreement SLA, and this is the most important clause between the two parties.
2.5
Cloud Security Items “CIA” and Requirements
As we said cloud security includes maintaining confidentiality, integrity, and avail-
ability of data stored in the cloud [11] and to achieve the concept of CIA “ISECT
2014a, CSA 2013b, ISO/IEC 2016”, we need to meet certain requirements such
as assurance, trust, governance, monitoring, and strong security, etc. Anyway, the
definition of CIA term is given as below.
2.5.1
Confidentiality
Confidentiality is the protection of customer data and the ability to hide it against
unauthorized parties, whether these clients are individuals, institutions or otherwise,
and confidentiality here does not apply only to customer data but to their services
including their applications and others [12], and achieving confidentiality happen by
using traditional encryption algorithms [13], taking into account that there is a differ-
ence from the traditional storage method, in the cloud and without the customer’s
knowledge, his data are distributed across different geographical locations according
to the locations of the cloud provider servers “ex: AWS”, in addition, CSP can change
the location of the data from one provider to another “VM Relay, especially Direct