skip to main content
10.1145/3390566.3391675acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbctConference Proceedingsconference-collections
research-article

Research on Application of Blockchain Technology in Cloud-Network Collaboration

Authors Info & Claims
Published:29 May 2020Publication History

ABSTRACT

With the deep integration of blockchain, cloud computing and 5G technology, the business model of the Internet is also undergoing subversive changes. Based on the current development trends of the industry, this article illustrates the application prospects of blockchain technology in cloud-network collaboration For users to purchase network services, blockchain technology and consensus accounting are adopted to effectively avoid uploading user data to the Internet company's cloud server, thereby protecting user privacy from threats. This article provides a solution that uses blockchain technology in cloud-network collaboration to ensure transaction security. At the same time, it analyzes the consensus mechanism for the actual application scenario, and selects a consensus mechanism which is suitable for the cloud-network collaborative application scenario.

References

  1. Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. WANG H, SONG Y. Journal of Medical Systems, vol.42 (8), pp. 1--9, 2018.Google ScholarGoogle Scholar
  2. Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas.Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability. InDavid Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang, editors, Proceedings ofthe 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pages 913--930. ACM, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Iddo Bentov, Ariel Gabizon, and Alex Mizrahi. Cryptocurrencies without proof of work. CoRR, abs/1406.5694, 2014.Google ScholarGoogle Scholar
  4. Iddo Bentov, Charles Lee, Alex Mizrahi, and Meni Rosenfeld. Proof of activity: Extending bitcoin's proof of work via proof of stake [extended abstract]y. SIGMETRICS Performance Evaluation Review, 42(3):34--37, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Vitalik Buterin. Long-range attacks: The serious problem with adaptive proof of work. https://blog.ethereum.org/2014/05/15/long-range-attacks-the-serious-problem-with-adaptive-proof-of-work/, 2014.Google ScholarGoogle Scholar
  6. Vitalik Buterin. Proof of stake faq. https://github.com/ethereum/wiki/wiki/Proof-of-Stake, FAQ, 2016.Google ScholarGoogle Scholar
  7. Ran Canetti. Universally composable signature, certification, and authentication. In 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, page 219. IEEE Computer Society, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  8. Mike Burrows. The chubby lock service for loosely-coupled distributed systems. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06, pages 335--350, 2006.G. S. Veronese, M. Correia, A. N. Bessani, and L. C. Lung, "Spin one's wheels? byzantine fault tolerance with a spinning primary," in SRDS, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Clement, E. Wong, L. Alvisi, M. Dahlin, and M. Marchetti, "Making byzantine fault tolerant systems tolerate byzantine faults,"in NSDI, 2009, pp. 153--168.Google ScholarGoogle Scholar
  10. G. Golan-Gueta, I. Abraham, S. Grossman, D. Malkhi, B. Pinkas, M. K. Reiter, D. Seredinschi, O. Tamir, and A. Tomescu,"SBFT: a scalable decentralized trust infrastructure for blockchains," CoRR, vol. abs/1804.01626, 2018.Google ScholarGoogle Scholar

Index Terms

  1. Research on Application of Blockchain Technology in Cloud-Network Collaboration

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICBCT'20: Proceedings of the 2020 The 2nd International Conference on Blockchain Technology
      March 2020
      166 pages
      ISBN:9781450377676
      DOI:10.1145/3390566

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 May 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader