Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …
155
encryption to obtain data confidentiality, the next stage was done using the SHA-2
and DSA algorithm to achieve digital signature and thus maintain the integrity of
the information. This study [43] suppose an idea of avoiding weaknesses in dealing
with public key certificates, and the proposed security against counterfeiting and
hacker attacks through symmetric linear signature based on identifiers according to
Oracle’s random pattern via blockchain technology. This talking [44] about using
a blockchain to ensure data integrity and protection it against counterfeiting and
misuse by performing authentication and review transactions, which is a lightweight
alternative to the MAC algorithm that requires the presence of two entries: secret
key and variable-length data, so this algorithm (MAC) computes value in user side
for authentication, and the data is stored in external resources in the cloud, whenever
the information owner needs to ensure its integrity, which has to be redownloaded it
and contrasted with the MAC value, therefore, there will be a large calculation cost.
Another suggestion is to solve the problem of ad-hoc data access safely, using the
blockchain technology to control the information stored in the cloud away from the
presence or intervention of a third party and without the problems of redundancy
experienced by participants in cloud storage services [45]. Managing sensitive and
huge data for smart homes and other critical systems resulting from the Internet of
Things and protecting them and ensuring that no cases of forgery have occurred by
applying blockchain technology instead of sending that information to one central
server with the security challenges it carries [46]. Introduce the idea of an improved
customer identity management system by applying blockchain technology enables
network access via a pseudonym out of the access identity and rebuilding subscriber
IDs [47]. Checking the sources of data in the cloud and discovering cases of fraud
through the ProvChain structure consists of three steps: collecting source data and
then verifying and maintaining its privacy against change by using blockchain [48].
The use of a blockchain decentralization structure is to check data integrity and avail-
ability [49]. A hybrid algorithm is proposed using a combination of Blowfish, AES,
and ECDH so that build authentication and data security layer before you save it in
the cloud [50]. The use of a blockchain will provide a decentralized infrastructure that
ensures the concept of identity authentication and prevents DDoS attacks that affect
the cloud’s infrastructure and data stored in it, which positively reflects on security
issues [51]. A distributed model proposal provides a secure connection away from
problems associated with the insecure data collection process in the cloud, using
IPFS (Inter Planetary File System) and blockchain (Cryptouch) [52]. Blockchain
technology can be applied to electronic health records (EHRs) so that patients are
able to control and manage their medical records without hospital intervention, where
multiple powers are used with a pair of keys so that each patient has a public and
private key to resist any attempt of counterfeiting in addition to providing a security
signature MA-ABS schema to repel hacker attacks [53]. In this study [54], it was
talked about the application of health care systems for blockchain technology in
order to protect patient data and maintain its availability upon request and put it in
a distributed manner between health centers in a safe and integrated way, and it is
expected to increase the spread of the use of the cloud and data protection techniques
in it such as blockchain especially after the spread of COVID-19.