Security of Cloud Computing from a Blockchain Perspective

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : April 3, 2024 at 1:45 pm | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Vatsal K. Bhuva

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Department of Cloud Computing, Conestoga College, Cambrige, Ontario, Canada
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nOriginally, the foundation of the Internet was trust. There are increased threats and problems after many information disclosures. We have employed even more modern Internet-based devices in recent years. Among the primary issues raised in literature, privacy, data protection, and trust require particular consideration. In this case, a new paradigm for information security has arisen, one that is built on transparency rather than the closed, cryptic methods used in present models. Recently, certain projects utilising Blockchain technology and techniques have emerged. The aim of this work is to construct a preliminary version of the model based on our preliminary research, which is referred to as systematic mapping in the Methodology. We provide an overview of several Blockchain-based Internet of Things (IoT) platforms, models, strategies, and other projects. We also assess each paper’s compliance with eleven essential IoT requirements. This work adds to the growing corpus of knowledge in the fields of trust, privacy, and security. Our results are helpful for businesses from a variety of industries that are a part of the Internet ecosystem as well as for further research at the Academy. They can profit from the combined knowledge and use it as a guide to define their development methods that are focused on the new IoT paradigms.

n

n

n

Keywords: Blockchain; Cloud computing Internet of Things; IoT; Ontology; Privacy; Security.

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Advanced Database Management & Systems(joadms)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Advanced Database Management & Systems(joadms)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Vatsal K. Bhuva Security of Cloud Computing from a Blockchain Perspective joadms April 3, 2024; 11:-

n

How to cite this URL: Vatsal K. Bhuva Security of Cloud Computing from a Blockchain Perspective joadms April 3, 2024 {cited April 3, 2024};11:-. Available from: https://journals.stmjournals.com/joadms/article=April 3, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘joadms’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

1. Das ML. Privacy and security challenges in internet of things. In Distributed Computing and Internet Technology: 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings 11 2015 (pp. 33-48). Springer International Publishing.
2. Ho G, Leung D, Mishra P, Hosseini A, Song D, Wagner D. Smart locks: Lessons for securing commodity internet of things devices. InProceedings of the 11th ACM on Asia conference on computer and communications security 2016 May 30 (pp. 461-472).
3. Amoozadeh M, Raghuramu A, Chuah CN, Ghosal D, Zhang HM, Rowe J, Levitt K. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Communications Magazine. 2015 Jun 10;53(6):126-32.
4. Skarmeta AF, Hernandez-Ramos JL, Moreno MV. A decentralized approach for security and privacy challenges in the internet of things. In2014 IEEE world forum on Internet of Things (WF- IoT) 2014 Mar 6 (pp. 67-72). IEEE.
5. Gross H, Hölbl M, Slamanig D, Spreitzer R. Privacy-aware authentication in the internet of things. InCryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings 14 2015 (pp. 32-39). Springer International Publishing.
6. Ukil A, Bandyopadhyay S, Pal A. IoT-privacy: To be private or not to be private. In2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2014 Apr 27 (pp. 123-124). IEEE.
7. Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. Decentralized business review. 2008 Oct 31.
8. Decker C, Seidel J, Wattenhofer R. Bitcoin meets strong consistency. InProceedings of the 17th International Conference on Distributed Computing and Networking 2016 Jan 4 (pp. 1-10).
9. Buchmann J. Introduction to Cryptography. Springer Science & Business Media; 2013 Dec 1.
10. Cueva-Sánchez JJ, Coyco-Ordemar AJ, Ugarte W. A blockchain-based technological solution to ensure data transparency of the wood supply chain. In2020 IEEE ANDESCON 2020 Oct 13 (pp. 1-6). IEEE.
11. De Montjoye YA, Shmueli E, Wang SS, Pentland AS. openpds: Protecting the privacy of metadata through safeanswers. PloS one. 2014 Jul 9;9(7):e98790.
12. Josang A, Haller J. Dirichlet reputation systems. InThe Second International Conference on Availability, Reliability and Security (ARES’07) 2007 Apr 10 (pp. 112-119). IEEE.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal of Advanced Database Management & Systems

n

[if 344 not_equal=””]ISSN: 2393-8730[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received January 17, 2024
Accepted February 7, 2024
Published April 3, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]