Security of Cloud Computing from a Blockchain Perspective

Year : 2024 | Volume :11 | Issue : 01 | Page : 7-11

Vatsal K. Bhuva

  1. Student Department of Cloud Computing, Conestoga College, Cambridge Ontario Canada


Originally, the foundation of the Internet was trust. There are increased threats and problems after many information disclosures. We have employed even more modern Internet-based devices in recent years. Among the primary issues raised in literature, privacy, data protection, and trust require particular consideration. In this case, a new paradigm for information security has arisen, one that is built on transparency rather than the closed, cryptic methods used in present models. Recently, certain projects utilising Blockchain technology and techniques have emerged. The aim of this work is to construct a preliminary version of the model based on our preliminary research, which is referred to as systematic mapping in the methodology. We provide an overview of several Blockchain-based Internet of Things (IoT) platforms, models, strategies, and other projects. We also assess each paper’s compliance with 11 essential IoT requirements. This work adds to the growing corpus of knowledge in the fields of trust, privacy, and security. Our results are helpful for businesses from a variety of industries that are a part of the Internet ecosystem as well as for further research at the Academy. They can profit from the combined knowledge and use it as a guide to define their development methods that are focused on the new IoT paradigms.

Keywords: Blockchain, cloud computing, Internet of Things, IoT, ontology, privacy, security

[This article belongs to Journal of Advanced Database Management & Systems(joadms)]

How to cite this article: Vatsal K. Bhuva. Security of Cloud Computing from a Blockchain Perspective. Journal of Advanced Database Management & Systems. 2024; 11(01):7-11.
How to cite this URL: Vatsal K. Bhuva. Security of Cloud Computing from a Blockchain Perspective. Journal of Advanced Database Management & Systems. 2024; 11(01):7-11. Available from:


  1. Das ML. Privacy and security challenges in internet of things. In Distributed Computing and Internet Technology: 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings 11. Springer International Publishing. 2015; 33–48.
  2. Ho G, Leung D, Mishra P, Hosseini A, Song D, Wagner D. Smart locks: Lessons for securing commodity internet of things devices. In Proceedings of the 11th ACM on Asia conference on computer and communications security. 2016 May 30; 461–472.
  3. Amoozadeh M, Raghuramu A, Chuah CN, Ghosal D, Zhang HM, Rowe J, Levitt K. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun Mag. 2015 Jun 10; 53(6): 126–32.
  4. Skarmeta AF, Hernandez-Ramos JL, Moreno MV. A decentralized approach for security and privacy challenges in the internet of things. In 2014 IEEE world forum on Internet of Things (WF-IoT). 2014 Mar 6; 67–72.
  5. Gross H, Hölbl M, Slamanig D, Spreitzer R. Privacy-aware authentication in the internet of things. In Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10–12, 2015, Proceedings 14. Springer International Publishing. 2015; 32–39.
  6. Cueva-Sánchez JJ, Coyco-Ordemar AJ, Ugarte W. A blockchain-based technological solution to ensure data transparency of the wood supply chain. In 2020 IEEE ANDESCON. 2020 Oct 13;1–6.
  7. Ukil A, Bandyopadhyay S, Pal A. IoT-privacy: To be private or not to be private. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 2014 Apr 27;123–124.
  8. Brodkin J. (2008). Gartner: Seven cloud-computing security risks. [online] InfoWorld. Available from:
  9. Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. Decentralized business review. SSRN. 2008 Oct 31.
  10. Buchmann J. Introduction to Cryptography. New York: Springer Science & Business Media; 2013 Dec 1.
  11. De Montjoye YA, Shmueli E, Wang SS, Pentland AS. Openpds: Protecting the privacy of metadata through safe answers. PloS one. 2014 Jul 9; 9(7): e98790.
  12. Josang A, Haller J. Dirichlet reputation systems. In the IEEE 2nd International Conference on Availability, Reliability and Security (ARES’07). 2007 Apr 10; 112–119.

Regular Issue Subscription Review Article
Volume 11
Issue 01
Received January 17, 2024
Accepted February 7, 2024
Published April 3, 2024