Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …

143

Fig. 4 A review of the security issues of cloud computing [10]

between the cloud service provider and the customer, this is known as the service

level agreement SLA, and this is the most important clause between the two parties.

2.5

Cloud Security Items “CIA” and Requirements

As we said cloud security includes maintaining confidentiality, integrity, and avail-

ability of data stored in the cloud [11] and to achieve the concept of CIA “ISECT

2014a, CSA 2013b, ISO/IEC 2016”, we need to meet certain requirements such

as assurance, trust, governance, monitoring, and strong security, etc. Anyway, the

definition of CIA term is given as below.

2.5.1

Confidentiality

Confidentiality is the protection of customer data and the ability to hide it against

unauthorized parties, whether these clients are individuals, institutions or otherwise,

and confidentiality here does not apply only to customer data but to their services

including their applications and others [12], and achieving confidentiality happen by

using traditional encryption algorithms [13], taking into account that there is a differ-

ence from the traditional storage method, in the cloud and without the customer’s

knowledge, his data are distributed across different geographical locations according

to the locations of the cloud provider servers “ex: AWS”, in addition, CSP can change

the location of the data from one provider to another “VM Relay, especially Direct