2020
DOI: 10.1109/access.2020.3035271
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring File Integrity Using Blockchain and Smart Contracts

Abstract: The adoption of cloud computing solutions is an established reality in government agencies and in small, medium, and large companies due to procurement easiness and the variety of available services, as well as its low cost compared to the acquisition and management of own infrastructures. Among the most used services is cloud file storage, and the security of this storage has been an essential subject of recent research, particularly customer data integrity. Thus, this article proposes a solution for the moni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(20 citation statements)
references
References 20 publications
0
20
0
Order By: Relevance
“…The formulas adopted in the calculation processes to increase or decrease the TV/CSS, executed by the methods and , respectively, are described in Section 4.6.4 . As for the conversion of TV/CSS to the trust level attributed to CSS (TL/CSS), the SSTMC uses the trust level classification model shown in Table 2 [ 11 ], which is an adaptation of the classification model proposed in Pinheiro et al [ 10 ]. The TL/CSS and the other information in Table 2 are used in the process of generating and submitting challenges ( Section 4.6.1 ).…”
Section: Architecture For Monitoring the Integrity Of Files In The Cloudmentioning
confidence: 99%
See 4 more Smart Citations
“…The formulas adopted in the calculation processes to increase or decrease the TV/CSS, executed by the methods and , respectively, are described in Section 4.6.4 . As for the conversion of TV/CSS to the trust level attributed to CSS (TL/CSS), the SSTMC uses the trust level classification model shown in Table 2 [ 11 ], which is an adaptation of the classification model proposed in Pinheiro et al [ 10 ]. The TL/CSS and the other information in Table 2 are used in the process of generating and submitting challenges ( Section 4.6.1 ).…”
Section: Architecture For Monitoring the Integrity Of Files In The Cloudmentioning
confidence: 99%
“…The trust value calculation process (P4 in Figure 7 ) uses the trust calculation model proposed by Pinheiro et al [ 10 ] and adapted by [ 11 ] to allow its implementation in smart contracts and to accelerate the penalization of services that present recurrent failures with the progression of their classification through the various levels of distrust. Conversely, the trust model should also ensure that the CSPs, which maintain their history free from the integrity violation records and strictly comply with the deadlines for generating responses to challenges, are gradually reclassified from the lowest to the highest trust level.…”
Section: Architecture For Monitoring the Integrity Of Files In The Cloudmentioning
confidence: 99%
See 3 more Smart Citations