Proceedings of the XXth Conference of Open Innovations Association FRUCT (Apr 2024)

A Multilayered Approach to Enhance Cloud Security using Homomorphic, AES, and Hashgraph

  • Ayush Verma,
  • Tanuj Chandela,
  • Geetanjali Rathee

DOI
https://doi.org/10.5281/zenodo.11096969
Journal volume & issue
Vol. 35, no. 2
pp. 860 – https://youtu.be/UffhMf9YKe8

Abstract

Read online

The rise of cloud technology is a big deal for how we share and access data together. It makes working together easier and opens up a ton of new possibilities. But with all this sharing, we need to make sure our information stays safe and that everyone follows the rules we've agreed upon for how services should work. Blockchain technology seems like a good way to keep track of these rules by recording everything in a secure and unchangeable way. However, the usual blockchain systems have some weaknesses. They can still be attacked in ways that could disrupt services, like with DDoS attacks. Plus, the way blockchain reaches agreements can slow things down. However, managing SLAs itself does not ensure the security of the data and user's privacy. Various solutions have been proposed, but none comprehensively address all the issues associated cloud environment. This paper introduces a framework constructed using Hashgraph-based distributed ledger technology to enhance scalability, security, and performance in the tamper-proof logging of all events through smart contracts. This structure aids in detecting points of failure and is applicable for automatic Service Level Agreement (SLA) verification. To safeguard user privacy, protect data from intruders, and ensure semantic security, we have implemented double-layer encryption. A homomorphic encryption technique is employed to preserve user privacy, allowing computations to be performed on the encrypted data. Additionally, AES (Advanced Encryption Standard) is used for secure transportation over an open network to prevent potential attacks such as known-plain-text attacks. The performance of our framework was assessed in terms of latency, CPU usage, and memory usage, while the security aspect was conventionally analyzed.

Keywords