Security of Cloud Computing from a Blockchain Perspective

Year : 2024 | Volume :11 | Issue : 01 | Page : –
By

    Vatsal K. Bhuva

  1. Student, Department of Cloud Computing, Conestoga College, Cambrige, Ontario, Canada

Abstract

Originally, the foundation of the Internet was trust. There are increased threats and problems after many information disclosures. We have employed even more modern Internet-based devices in recent years. Among the primary issues raised in literature, privacy, data protection, and trust require particular consideration. In this case, a new paradigm for information security has arisen, one that is built on transparency rather than the closed, cryptic methods used in present models. Recently, certain projects utilising Blockchain technology and techniques have emerged. The aim of this work is to construct a preliminary version of the model based on our preliminary research, which is referred to as systematic mapping in the Methodology. We provide an overview of several Blockchain-based Internet of Things (IoT) platforms, models, strategies, and other projects. We also assess each paper’s compliance with eleven essential IoT requirements. This work adds to the growing corpus of knowledge in the fields of trust, privacy, and security. Our results are helpful for businesses from a variety of industries that are a part of the Internet ecosystem as well as for further research at the Academy. They can profit from the combined knowledge and use it as a guide to define their development methods that are focused on the new IoT paradigms.

Keywords: Blockchain; Cloud computing Internet of Things; IoT; Ontology; Privacy; Security.

[This article belongs to Journal of Advanced Database Management & Systems(joadms)]

How to cite this article: Vatsal K. Bhuva.Security of Cloud Computing from a Blockchain Perspective.Journal of Advanced Database Management & Systems.2024; 11(01):-.
How to cite this URL: Vatsal K. Bhuva , Security of Cloud Computing from a Blockchain Perspective joadms 2024 {cited 2024 Apr 03};11:-. Available from: https://journals.stmjournals.com/joadms/article=2024/view=138398


References

1. Das ML. Privacy and security challenges in internet of things. In Distributed Computing and Internet Technology: 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings 11 2015 (pp. 33-48). Springer International Publishing.
2. Ho G, Leung D, Mishra P, Hosseini A, Song D, Wagner D. Smart locks: Lessons for securing commodity internet of things devices. InProceedings of the 11th ACM on Asia conference on computer and communications security 2016 May 30 (pp. 461-472).
3. Amoozadeh M, Raghuramu A, Chuah CN, Ghosal D, Zhang HM, Rowe J, Levitt K. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Communications Magazine. 2015 Jun 10;53(6):126-32.
4. Skarmeta AF, Hernandez-Ramos JL, Moreno MV. A decentralized approach for security and privacy challenges in the internet of things. In2014 IEEE world forum on Internet of Things (WF- IoT) 2014 Mar 6 (pp. 67-72). IEEE.
5. Gross H, Hölbl M, Slamanig D, Spreitzer R. Privacy-aware authentication in the internet of things. InCryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings 14 2015 (pp. 32-39). Springer International Publishing.
6. Ukil A, Bandyopadhyay S, Pal A. IoT-privacy: To be private or not to be private. In2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2014 Apr 27 (pp. 123-124). IEEE.
7. Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. Decentralized business review. 2008 Oct 31.
8. Decker C, Seidel J, Wattenhofer R. Bitcoin meets strong consistency. InProceedings of the 17th International Conference on Distributed Computing and Networking 2016 Jan 4 (pp. 1-10).
9. Buchmann J. Introduction to Cryptography. Springer Science & Business Media; 2013 Dec 1.
10. Cueva-Sánchez JJ, Coyco-Ordemar AJ, Ugarte W. A blockchain-based technological solution to ensure data transparency of the wood supply chain. In2020 IEEE ANDESCON 2020 Oct 13 (pp. 1-6). IEEE.
11. De Montjoye YA, Shmueli E, Wang SS, Pentland AS. openpds: Protecting the privacy of metadata through safeanswers. PloS one. 2014 Jul 9;9(7):e98790.
12. Josang A, Haller J. Dirichlet reputation systems. InThe Second International Conference on Availability, Reliability and Security (ARES’07) 2007 Apr 10 (pp. 112-119). IEEE.


Regular Issue Subscription Review Article
Volume 11
Issue 01
Received January 17, 2024
Accepted February 7, 2024
Published April 3, 2024