Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …

155

encryption to obtain data confidentiality, the next stage was done using the SHA-2

and DSA algorithm to achieve digital signature and thus maintain the integrity of

the information. This study [43] suppose an idea of avoiding weaknesses in dealing

with public key certificates, and the proposed security against counterfeiting and

hacker attacks through symmetric linear signature based on identifiers according to

Oracle’s random pattern via blockchain technology. This talking [44] about using

a blockchain to ensure data integrity and protection it against counterfeiting and

misuse by performing authentication and review transactions, which is a lightweight

alternative to the MAC algorithm that requires the presence of two entries: secret

key and variable-length data, so this algorithm (MAC) computes value in user side

for authentication, and the data is stored in external resources in the cloud, whenever

the information owner needs to ensure its integrity, which has to be redownloaded it

and contrasted with the MAC value, therefore, there will be a large calculation cost.

Another suggestion is to solve the problem of ad-hoc data access safely, using the

blockchain technology to control the information stored in the cloud away from the

presence or intervention of a third party and without the problems of redundancy

experienced by participants in cloud storage services [45]. Managing sensitive and

huge data for smart homes and other critical systems resulting from the Internet of

Things and protecting them and ensuring that no cases of forgery have occurred by

applying blockchain technology instead of sending that information to one central

server with the security challenges it carries [46]. Introduce the idea of an improved

customer identity management system by applying blockchain technology enables

network access via a pseudonym out of the access identity and rebuilding subscriber

IDs [47]. Checking the sources of data in the cloud and discovering cases of fraud

through the ProvChain structure consists of three steps: collecting source data and

then verifying and maintaining its privacy against change by using blockchain [48].

The use of a blockchain decentralization structure is to check data integrity and avail-

ability [49]. A hybrid algorithm is proposed using a combination of Blowfish, AES,

and ECDH so that build authentication and data security layer before you save it in

the cloud [50]. The use of a blockchain will provide a decentralized infrastructure that

ensures the concept of identity authentication and prevents DDoS attacks that affect

the cloud’s infrastructure and data stored in it, which positively reflects on security

issues [51]. A distributed model proposal provides a secure connection away from

problems associated with the insecure data collection process in the cloud, using

IPFS (Inter Planetary File System) and blockchain (Cryptouch) [52]. Blockchain

technology can be applied to electronic health records (EHRs) so that patients are

able to control and manage their medical records without hospital intervention, where

multiple powers are used with a pair of keys so that each patient has a public and

private key to resist any attempt of counterfeiting in addition to providing a security

signature MA-ABS schema to repel hacker attacks [53]. In this study [54], it was

talked about the application of health care systems for blockchain technology in

order to protect patient data and maintain its availability upon request and put it in

a distributed manner between health centers in a safe and integrated way, and it is

expected to increase the spread of the use of the cloud and data protection techniques

in it such as blockchain especially after the spread of COVID-19.