| Literature DB >> 35676964 |
Rajit Nair1, Syed Nasrullah Zafrullah2, P Vinayasree3, Prabhdeep Singh4, Musaddak Maher Abdul Zahra5,6, Tripti Sharma7, Fardin Ahmadi8.
Abstract
Cloud computing has increased its service area and user experience above traditional platforms through virtualization and resource integration, resulting in substantial economic and societal advantages. Cloud computing is experiencing a significant security and trust dilemma, requiring a trust-enabled transaction environment. The typical cloud trust model is centralized, resulting in high maintenance costs, network congestion, and even single-point failure. Also, due to a lack of openness and traceability, trust rating findings are not universally acknowledged. "Blockchain is a novel, decentralised computing system. Its unique operational principles and record traceability assure the transaction data's integrity, undeniability, and security. So, blockchain is ideal for building a distributed and decentralised trust infrastructure. This study addresses the difficulty of transferring data and related permission policies from the cloud to the distributed file systems (DFS). Our aims include moving the data files from the cloud to the distributed file system and developing a cloud policy. This study addresses the difficulty of transferring data and related permission policies from the cloud to the DFS. In DFS, no node is given the privilege, and storage of all the data is dependent on content-addressing. The data files are moved from Amazon S3 buckets to the interplanetary file system (IPFS). In DFS, no node is given the privilege, and storage of all the data is dependent on content-addressing.Entities:
Mesh:
Year: 2022 PMID: 35676964 PMCID: PMC9170456 DOI: 10.1155/2022/8209854
Source DB: PubMed Journal: Comput Intell Neurosci
Figure 1Unique Node ID in the form of a hash.
Figure 2Different components of the suggested technique.
Figure 3AWS S3 buckets.
Figure 4AWS S3 to IPFS migration.
Figure 5A typical JSON document structure supported by Amazon's access policies.
Figure 6Blocks (for S3 buckets) of the custom blockchain.
Figure 7Custom blockchain blocks with authorization policies.
Figure 8Satoshi node movement of content.
Figure 9The S3 buckets' admin-only and management's authorization policies.