Application and Usability of Blockchain in Cloud Computing

Abhineet Anand*, Achintya Jha**
* Department of Computer Science and Engineering, Chitkara University Institute of Engineering Technology, Chitkara University, Punjab, India.
** Department of Computer Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh, India.
Periodicity:July - December'2019
DOI : https://doi.org/10.26634/jcc.6.2.16449

Abstract

Data or any kind of information is an important resource. Storing the data and securing it is one of the main concern of nowadays. Everyday, the industry is dealing with major privacy issues. The common user want a solution for these issues so that they can protect their data from third party or from any kind of data hacking; And this problem is solved with the involvement of cloud technology. Nowadays, everyone is familiar with cloud environment and cloud environment has also ruled over the market whether anyone from technology side or non-technology somewhere is storing their data on cloud; Because storing data into memory is also a very tedious task and even requires lots of maintenance. So, everyone is bound to store data in cloud storage to free from these burden. Blockchain has recently emerged as fascinating and innovative technology to face data integrity problems in the environment like cloud. In this literature, usability of Blockchain in cloud has been discussed and shown how it can be used to make cloud more secure. Major threats have came to an end after the participation of technology like blockchain.

Keywords

Blockchain, Cloud Computing, Cryptocurrencies, Data Center.

How to Cite this Article?

Anand, A., Jha, A.(2019). Application and Usability of Blockchain in Cloud Computing, i-manager's Journal on Cloud Computing, 6(2), 26-34. https://doi.org/10.26634/jcc.6.2.16449

References

[1]. Alansari, S., Paci, F., Margheri, A., & Sassone, V. (2017, June). Privacy-preserving access control in cloud federations. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), (pp. 757-760). IEEE. https://doi.org/10.1109/CLOUD.2017.108
[2]. Esposito, C., De Santis, A., Tortora, G., Chang, H., & Choo, K. K. R. (2018). Blockchain: A panacea for healthcare cloud-based data security and privacy?. IEEE Cloud Computing, 5(1), 31-37. https://doi.org/10.1109/ MCC.2018.011791712
[3]. Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2017). Blockchain-based database to ensure data integrity in cloud computing environments. In Italian Conference on Cybersecurity, Retrieved from https://eprints.soton.ac.uk/411996/.
[4]. Hashmi, A., Ranjan, A., & Anand, A. (2018). Security and compliance management in cloud computing. International Journal of Advanced Studies in Computers Science and Engineering, 7(1), 47-54. Retrieved from http://www.i-scholar.in/index.php/IJA SCSE/article/ view/168052
[5]. Kumar, R.,& Anand, A. (2017). Internet Banking System & Security Analysis. International Journal of Engineering and Computer Science, 6 (4), 21051-21060. https://doi.org/10.18535/ijecs/v6i4.43
[6]. Kumar, V., Sisodia, A., Maini, U., Pankaj., & Anand, A. (2016). Comparing algorithms of community structure in networks. Indian Journal of Science and Technology, 9(44). https://doi.org/10.17485/ijst/2016/v9i44/105088
[7]. Li, Z., Lu, Q., Chen, S., Liu, Y., & Xu , X. (2019). A landscape of cryptocurrencies. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 165-66. https://doi.org/10.1109/ BLOC.2019.8751469
[8]. Mishra, S. K., Sahoo, B., & Parida, P. P. (2018). Load balancing in cloud computing: A big picture. Journal of King Saud University-Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2018.01.003
[9]. Rohith, K. P. S. S., & Anand, A. (2018). Analytical study of different load balancing algorithms. International Journal of Advanced Studies in Computers Science and Engineering, 7(1), 21-26. Retrieved from http://www.ischolar. in/index.php/IJASCSE/article/view/168044
[10]. Sai, A. R., Buckley, J., & Le Gear, A. (2019, March). Privacy and security analysis of cryptocurrency mobile applications. In 2019 5th Conference on Mobile and Secure Services (MobiSecServ), (pp. 1-6). IEEE. https://doi.org/10.1109/MOBISECSERV.2019.8686583
[11]. Sharma, S. G., Ahuja, L., & Goyal, D. P. (2018, June). Building secure infrastructure for cloud computing using blockchain. In 2018 2nd International Conference on Intelligent Computing and Control Systems (ICICCS), (pp. 1985-1988). IEEE. https://doi.org/10.1109/ICCONS. 2018.8663145
[12]. Tosh, D., Shetty, S., Foytik, P., Kamhoua, C., & Njilla, L. (2018, July). CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), (pp. 302-309). IEEE.https://doi.org/10.1109/CLOUD.2018.00045
[13]. Wang, R., He, J., Liu, C., Li, Q., Tsai, W. T., & Deng, E. (2018, November). A privacy-aware PKI system based on permissioned blockchains. In 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS) (pp. 928-931). IEEE. https://doi.org/ 10.1109/ICSESS.2018.8663738
[14]. Zyskind, G., Nathan, O., & Pentland, A.S. (2015, May). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). https://doi.org/10.1109/ SPW.2015.27

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

If you have access to this article please login to view the article or kindly login to purchase the article
Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.