skip to main content
10.1145/3584202.3584251acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Blockchain-based solutions for Cloud Computing Security: A Survey

Authors Info & Claims
Published:09 May 2023Publication History

ABSTRACT

Cloud computing is a technology that provides infrastructure and data services at an affordable cost, with minimal effort, and with a high level of scalability. And it is continuously increasing demands daily. Furthermore, it raised many security challenges that had to be addressed. Blockchain has become a critical technology for providing security, particularly regarding integrity, authenticity, and confidentiality. It also can help cloud computing growth by overcoming security challenges. Many blockchain-based solutions were proposed for security challenges in cloud computing. This survey gives a background about cloud computing and blockchain. Also, it briefly studies how blockchain can affect cloud computing, especially the security improvements it can provide. The main contribution of this paper is to explore and summarizes existing blockchain-based solutions for cloud computing security challenges.

References

  1. Ruba Awadallah and Azman Samsudin. 2021. Using Blockchain in Cloud Computing to Enhance Relational Database Security. IEEE Access 9 (2021), 137353–137366. https://doi.org/10.1109/ACCESS.2021.3117733Google ScholarGoogle ScholarCross RefCross Ref
  2. Reinaldo Padilha França, Ana Carolina Borges Monteiro, Rangel Arthur, and Yuzo Iano. 2021. An Introduction to Blockchain Technology and Their Applications in the Actuality with a View of Its Security Aspects. In Transforming Cybersecurity Solutions using Blockchain. Springer, 31–53.Google ScholarGoogle Scholar
  3. Ch VNU Bharathi Murthy, M Lawanya Shri, Seifedine Kadry, and Sangsoon Lim. 2020. Blockchain based cloud computing: Architecture and research challenges. IEEE Access 8 (2020), 205190–205205.Google ScholarGoogle ScholarCross RefCross Ref
  4. Ch. V. N. U. Bharathi Murthy, M. Lawanya Shri, Seifedine Kadry, and Sangsoon Lim. 2020. Blockchain Based Cloud Computing: Architecture and Research Challenges. IEEE Access 8 (2020), 205190–205205. https://doi.org/10.1109/ACCESS. 2020.3036812Google ScholarGoogle ScholarCross RefCross Ref
  5. S Pavithra, S Ramya, and Soma Prathibha. 2019. A survey on cloud security issues and blockchain. In 2019 3rd International Conference on Computing and Communications Technologies (ICCCT). IEEE, 136–140.Google ScholarGoogle ScholarCross RefCross Ref
  6. Nikita Sanghi, Rupali Bhatnagar, Gaganjot Kaur, and Vinay Jain. 2018. BlockCloud: blockchain with cloud computing. In 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN). IEEE, 430–434.Google ScholarGoogle ScholarCross RefCross Ref
  7. Pratima Sharma, Rajni Jindal, and Malaya Dutta Borah. 2020. Blockchain technology for cloud storage: A systematic literature review. ACM Computing Surveys (CSUR) 53, 4 (2020), 1–32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Shams Tabrez Siddiqui, Mohammed Shuaib, Ashok Kumar Gupta, and Shadab Alam. 2020. Implementing blockchain technology: way to avoid evasive threats to information security on cloud. In 2020 international conference on computing and information technology (ICCIT-1441). IEEE, 1–5.Google ScholarGoogle ScholarCross RefCross Ref
  9. Nasrin Sohrabi, Xun Yi, Zahir Tari, and Ibrahim Khalil. 2020. BACC: BlockchainBased Access Control For Cloud Data. In Proceedings of the Australasian Computer Science Week Multiconference (Melbourne, VIC, Australia) (ACSW ’20). Association for Computing Machinery, New York, NY, USA, Article 10, 10 pages. https://doi.org/10.1145/3373017.3373027Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hamed Tabrizchi and Marjan Kuchaki Rafsanjani. 2020. A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing 76, 12 (2020), 9493–9532.Google ScholarGoogle Scholar
  11. Deepak Tosh, Sachin Shetty, Xueping Liang, Charles Kamhoua, and Laurent L. Njilla. 2019. Data Provenance in the Cloud: A Blockchain-Based Approach. IEEE Consumer Electronics Magazine 8, 4 (2019), 38–44. https://doi.org/10.1109/MCE. 2019.2892222Google ScholarGoogle ScholarCross RefCross Ref
  12. Shangping Wang, Xu Wang, and Yaling Zhang. 2019. A secure cloud storage framework with access control based on blockchain. IEEE access 7 (2019), 112713– 112725.Google ScholarGoogle ScholarCross RefCross Ref
  13. Caixia Yang, Liang Tan, Na Shi, Bolei Xu, Yang Cao, and Keping Yu. 2020. AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud. IEEE Access 8 (2020), 70604–70615.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Blockchain-based solutions for Cloud Computing Security: A Survey
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ICFNDS '22: Proceedings of the 6th International Conference on Future Networks & Distributed Systems
              December 2022
              734 pages
              ISBN:9781450399050
              DOI:10.1145/3584202

              Copyright © 2022 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 9 May 2023

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited
            • Article Metrics

              • Downloads (Last 12 months)98
              • Downloads (Last 6 weeks)12

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format