Search for collections on FTS Digilib

Investigating Security Enhancement in Hybrid Clouds via a Blockchain-Fused Privacy Preservation Strategy: Pilot Study

Aghaunor, Tabitha Chukwudi and Ugbotu, Eferhire Valentine and Ugboh, Emeke and Onoma, Paul Avwerosuoghene and Emordi, Frances Uchechukwu and Ojugo, Arnold Adimabua and Geteloma, Victor Ochuko and Idama, Rebecca Okeoghene and Ezzeh, Peace Oguguo (2026) Investigating Security Enhancement in Hybrid Clouds via a Blockchain-Fused Privacy Preservation Strategy: Pilot Study. Journal of Computing Theories and Applications, 3 (4). pp. 428-442. ISSN 3024-9104

[thumbnail of 15508-Article Text-55027-1-10-20260224.pdf]
Preview
Text
15508-Article Text-55027-1-10-20260224.pdf - Published Version
Available under License Creative Commons Attribution.

Download (570kB) | Preview

Abstract

The proliferation of cloud infrastructures has intensified concerns regarding data security, integrity, identity and access management, and user privacy. Despite recent advances, existing solutions often lack comprehensive integration of privacy-preserving mechanisms, dynamic trust management, and cross-provider interoperability. This study proposes an AI-enabled, zero-trust, blockchain-fused identity management framework for secure, privacy-preserving multi-cloud environments. The framework integrates homomorphic encryption with differential privacy for aggregate-level protection and secure multi-party computation for collaborative data processing. The proposed system was validated in a simulated multi-cloud environment using CloudSim, Ethereum blockchain, and AWS EC2. Experimental results indicate homomorphic encryption latency of approximately 450ms per operation and statistically significant security improvements (t(128) = 12.47, p < 0.001), privacy (t(95) = 8.93, p < 0.001), and throughput (t(156) = 15.21, p < 0.001). The framework achieved differential privacy with ε = 0.1 while retaining 99.2% data utility, and demonstrated a 34% improvement in processing speed over conventional differential privacy approaches. In addition, the implementation was observed to be 2.3× faster than BGV-based configurations, with 45% lower memory consumption than CKKS and a 67% reduction in ciphertext size relative to baseline implementations. From an operational perspective, the framework shows a 23% reduction in security management costs, a 31% improvement in resource utilization efficiency, and an 18% decrease in compliance audit expenses. The model further indicates a 27% reduction in total cost of ownership (TCO) compared with multi-vendor security solutions, a projected return on investment (ROI) within 14 months, and an 89% reduction in security incident response costs under the evaluated conditions.

Item Type: Article
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Depositing User: dl fts
Date Deposited: 24 Feb 2026 12:45
Last Modified: 24 Feb 2026 12:45
URI: https://dl.futuretechsci.org/id/eprint/156

Actions (login required)

View Item
View Item