[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
tutorial

Blockchain Technology for Cloud Storage: A Systematic Literature Review

Published: 03 August 2020 Publication History

Abstract

The demand for Blockchain innovation and the significance of its application has inspired ever-progressing exploration in various scientific and practical areas. Even though it is still in the initial testing stage, the blockchain is being viewed as a progressive solution to address present-day technology concerns, such as decentralization, identity, trust, character, ownership of data, and information-driven choices. Simultaneously, the world is facing an increase in the diversity and quantity of digital information produced by machines and users. While effectively looking for the ideal approach to storing and processing cloud data, the blockchain innovation provides significant inputs. This article reviews the application of blockchain technology for securing cloud storage.

References

[1]
Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, and Kui Ren. 2016. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Info. Forensics Secur. 11, 11 (2016), 2594--2608. https://doi.org/10.1109/TIFS.2016.2590944
[2]
Xueping Liang, Sachin Shetty, Deepak Tosh, Charles Kamhoua, Kevin Kwiat, and Laurent Njilla. 2017. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing. 468--477. https://doi.org/10.1109/CCGRID.2017.8
[3]
David S. Linthicum. 2010. Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide. Pearson Education.
[4]
Rajnish Choubey, Rajshree Dubey, and Joy Bhattacharjee. 2011. A survey on cloud computing security, challenges, and threats. Int. J. Comput. Sci. Engineer. 3 (2011), 1227--1231.
[5]
Bin Feng, Xinzhu Ma, Cheng Guo, Hui Shi, Zhangjie Fu, and Tie Qiu. 2016. An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access 4 (2016), 7899--7911. https://doi.org/10.1109/ACCESS.2016.2621005
[6]
Cong Wang, Kui Ren, and Jia Wang. 2016. Secure optimization computation outsourcing in cloud computing: A case study of linear programming. IEEE Trans. Comput. 65, 1 (2016), 216--229. https://doi.org/10.1109/TC.2015.2417542
[7]
Jin Li, Yinghui Zhang, Xiaofeng Chen, and Yang Xiang. 2018. Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72 (2018), 1--12. https://doi.org/10.1016/j.cose.2017.08.007
[8]
Ping Li, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wen-Bin Chen, and Kai Chen. 2017. Privacy-preserving outsourced classification in cloud computing. Cluster Comput. 21, 1 (2017), 1--10. https://doi.org/10.1007/s10586-017-0849-9
[9]
Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, and Yang Xiang. 2015. Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 1 (2015), 1--1. https://doi.org/10.1109/TC.2015.2401036
[10]
Michael Nofer, Peter Gomber, Oliver Hinz, and Dirk Schiereck. 2017. Blockchain. Bus. Info. Syst. Engineer. 59, 3 (2017), 183--187. https://doi.org/10.1007/s12599-017-0467-3
[11]
Chenhan Xu, Kun Wang, and Mingyi Guo. 2017. Intelligent resource management in blockchain-based cloud data centers. IEEE Cloud Comput. 4, 6 (2017), 50--59. https://doi.org/10.1109/MCC.2018.1081060
[12]
Harleen Kaur, M. Afshar Alam, Roshan Jameel, Ashish Kumar Mourya, and Victor Chang. 2018. A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment. J. Med. Syst. 42, 8 (2018), 156. https://doi.org/10.1007/s10916-018-1007-5
[13]
Farid Daryabar, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2017. Cloud storage forensics: MEGA as a case study. Austral. J. Forensic Sci. 49, 3 (2017), 344--357. https://doi.org/10.1080/00450618.2016.1153714
[14]
Sushant Rajkumar Patil. 2016. A comparative review on Ceph and Swift open source cloud storage platform, global trends in signal processing. In Proceedings of the IEEE International Conference on Information Computing and Communication (ICGTSPICC’16). https://doi.org/10.1109/ICGTSPICC.2016.7955300
[15]
David Brian Ferriera. 2014. Policy driven cloud storage management and cloud storage policy router. 5 (2014), 8.
[16]
A. Maxmen. 2018. AI researchers embrace bitcoin technology to share medical data. Nature, 555 (2018), 7696.
[17]
Wei Cai, Zehua Wang, Jason B. Ernst, Zhen Hong, Chen Feng, and Victor C. M. Leung. 2018. Decentralized applications: the blockchain-empowered software system. IEEE Access 6 (2018), 53019–53033. https://doi.org/10.1109/ACCESS.2017
[18]
Saveen A. Abeyratne, and Radmehr P. Monfared. 2016. Blockchain ready manufacturing supply chain using distributed ledger. International Journal of Research in Engineering and Technology 5, 9 (2016). Retrieved from https://repository.lboro.ac.uk/articles/Blockchain_ready_manufacturing_supply_chain_using_distributed_ledger/9566069 https://doi.org/10.15623/ijret.2016.0509001.
[19]
Santoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf.
[20]
Zachary Baynham-Herd, 2017. Enlist blockchain to boost conservation. Nature 548, 7669 (2017), 523--523. https://doi.org/10.1038/548523c
[21]
Selena Ahmed, and Noah ten Broek. 2017. Blockchain could boost food security. Nature 550, 7674 (2017), 43--43. https://doi.org/10.1038/550043e
[22]
Jong-Hyouk Lee and Marc Pilkington. 2017. How the blockchain revolution will reshape the consumer electronics industry [future directions]. IEEE Consumer Electron. Mag. 6, 3 (2017), 19--23. https://doi.org/10.1109/MCE.2017.2684916
[23]
Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. 2017. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the IEEE International Congress on Big Data (BigData’17). 557--564. https://doi.org/10.1109/BigDataCongress.2017.85
[24]
Mosakheil and Jamal Hayat. 2018. Security threats classification in blockchains. Culminating Projects in Information Assurance. Retrieved from https://repository.stcloudstate.edu/msia_etds/48.
[25]
Lakshmi Siva Sankar, M. Sindhu, and M. Sethumadhavan. 2017. Survey of consensus protocols on blockchain applications. Proceedings of the 4th IEEE International Conference on Advanced Computing and Communication Systems (ICACCS’17). https://doi.org/10.1109/ICACCS.2017.8014672
[26]
Ao Lei, Haitham Cruickshank, Yue Cao, Philip Asuquo, Chibueze P. Anyigor Ogah, and Zhili Sun. 2017. Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4, 6 (2017), 1832--1843. https://doi.org/10.1109/JIOT.2017.2740569
[27]
Chinmay A. Vyas and Munindra Lunagaria. 2014. Security concerns and issues for bitcoin. In Proceedings of the National Conference cum Workshop on Bioinformatics and Computational Biology (NCWBCB’14).
[28]
Luca Ferretti, Mirco Marchetti, Mauro Andreolini, and Michele Colajanni. 2018. A symmetric cryptographic scheme for data integrity verification in cloud databases. Info. Sci. 422 (2018), 497--515. https://doi.org/10.1016/j.ins.2017.09.033
[29]
Yunxue Yan, Lei Wu, Ge Gao, Hao Wang, and Wenyu Xu. 2018. A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter. J. Info. Secur. Appl. 39 (2018), 10--18. https://doi.org/10.1016/j.jisa.2018.01.004
[30]
Guangwei Xu, Miaolin Lai, Jing Li, Li Sun, and Xiujin Shi. 2018. A generic integrity verification algorithm of version files for cloud deduplication data storage. EURASIP J. Info. Secur. 12 (2018), 1. https://doi.org/10.1186/s13635-018-0083-x
[31]
Hao Jin, Ke Zhou, Hong Jiang, Dongliang Lei, Ronglei Wei, and Chunhua Li. 2018. Full integrity and freshness for cloud data. Future Gen. Comput. Syst. 80 (2018), 640--652. https://doi.org/10.1016/j.future.2016.06.013
[32]
Rajat Saxena and Somnath Dey. 2016. Cloud audit: A data integrity verification approach for cloud computing. Procedia Comput. Sci. 89 (2016), 142--151. https://doi.org/10.1016/j.procs.2016.06.024
[33]
Jian Mao, Yan Zhang, Pei Li, Teng Li, Qianhong Wu, and Jianwei Liu. 2017. A position aware Merkle tree for dynamic cloud data integrity verification. Soft Comput. 21, 8 (2017), 2151--2164. https://doi.org/10.1007/s00500-015-1918-8
[34]
Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, and Xiaojun Zhang. 2017. Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans. Info. Forensics Secur. 12, 3 (2017), 676--688. https://doi.org/10.1109/TIFS.2016.2631951
[35]
Tao Jiang, Xiaofeng Chen, and Jianfeng Ma. 2016. Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65, 8 (2016), 2363--2373. https://doi.org/10.1109/TC.2015.2389955
[36]
Marcus Brandenburger, Christian Cachin, and Nikola Knežević. 2017. Don't trust the cloud, verify: Integrity and consistency for cloud object stores. ACM Trans. Privacy Secur. 20 (2017), 3. https://doi.org/10.1145/3079762
[37]
Jiawei Yuan and Shucheng Yu. 2015. Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Info. Forensics Secur. 10, 8 (2015), 1717--1726. https://doi.org/10.1109/TIFS.2015.2423264
[38]
Yibin Li, Keke Gai, Longfei Qiu, Meikang Qiu, and Zhao Hui. 2017. Intelligent cryptography approach for secure distributed big data storage in cloud computing. Info. Sci. 387 (2017), 103--115. https://doi.org/10.1016/j.ins.2016.09.005
[39]
Zahra Pooranian, Kang-Cheng Chen, Chai-Mu Yu, and Mauro Conti. 2018. RARE: Defeating side channels based on data-deduplication in cloud storage. In Proceedings of the Infocom Workshop. https://doi.org/10.1109/INFCOMW.2018.8406888
[40]
Chia-Mu Yu, Sarada P. Gochhayat, Mauro Conti, and Chun-Shien Lu. 2018. Privacy aware data deduplication for side channel in cloud storage. IEEE Trans. Cloud Comput. 1 (2018), 1--1. https://doi.org/10.1109/TCC.2018.2794542
[41]
Ioannis Konstantinidis, Georgious Siaminos, Christos Timplalexis, Panagiotis Zervas, Vassilios Peristeras, and Stefan Decker. 2018. Blockchain for business applications: A systematic literature review. In Proceedings of the International Conference on Business Information Systems. Springer, Cham, 384--399. https://doi.org/10.1007/978-3-319-93931-5_28
[42]
Qalab E. Abbas, and Jang S. Bong. 2019. A survey of blockchain and its applications. In Proceedings of the International Conference on Artificial Intelligence in Information and Communication (ICAIIC’19). 1--3. https://doi.org/10.1109/ICAIIC.2019.8669067
[43]
F. Rizal Batubara, Jolien Ubacht, and Marijn Janssen. 2018. Challenges of blockchain technology adoption for e-government: A systematic literature review. In Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age. 1--9. https://doi.org/10.1145/3209281.3209317
[44]
Cornelius C. Agbo, Qusay H. Mahmoud, and J. Mikael Eklund. 2019. Blockchain technology in healthcare: A systematic review. Healthcare Multidisc. Digital Publish. Inst. 7, 2 (2019), 56. https://doi.org/10.3390/healthcare7020056
[45]
Seyednima Khezr, Md Moniruzzaman, Abdulsalam Yassine, and Rachid Benlamri. 2019. Blockchain technology in healthcare: A comprehensive review and directions for future research. Appl. Sci. 1--28. https://doi.org/10.3390/app9091736
[46]
Asad A. Siyal, Aisha Z. Junejo, Muhammad Zawish, Kainat Ahmed, Aiman Khalil, and Georgia Soursou. 2019. Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives. Cryptography 3, 1 (2019), 1--16. https://doi.org/10.3390/cryptography3010003
[47]
Rui Zhang, Rui Xue, and Ling Liu. 2019. Security and privacy issues on blockchain. ACM Comput. Surveys 52, 3 (2019), 1--35. https://doi.org/10.1145/3316481
[48]
Joanna Kołodziej, Andrezej Wilczyński, Damian F. Cerero, and Alejandro F. Montes. 2018. Blockchain secure cloud: A new generation integrated cloud and blockchain platforms-general concepts and challenges. Eur. Cybersecur. J. 28--34.
[49]
Guangsheng Yu, Xu Wang, Kan Yu, Wei Ni, J. Andrew Zhang, and Ren P. Liu. 2019. Survey: Sharding in blockchains. IEEE Access 8 (2019), 14155--14181. https://doi.org/10.1109/ACCESS.2020.2965147
[50]
Shaoan Xie, Zibin Zheng, Weili Chen, Jiajing Wu, Hong N. Dai, and Muhammad Imran. 2019. Blockchain for cloud exchange: A survey. Comput. Electric. Engineer. 81 (2019), 1--20. https://doi.org/10.1016/j.compeleceng.2019.106526
[51]
Ruizhe Yang, F. Richard Yu, Pengbo Si, Zhaoxin Yang, and Yanhua Zhang. 2018. Integrated blockchain and edge computing systems: A survey, some research issues and challenges. IEEE Commun. Surveys Tutor. 21, 2 (2018), 1--22. https://doi.org/10.1109/COMST.2019.2894727
[52]
Tara Salman, Maede Zolanvari, Aiman Erbad, Raj Jain, and Mohammed Samaka. 2019. A security services using blockchains: A state of the art survey. IEEE Commun. Surveys Tutor. 21, 1 (2019), 858--879. https://doi.org/10.1109/COMST.2018.2863956
[53]
Bhabendu K. Mohanta, Debasish Jena, Soumyashree S. Panda, and Srichandan Sobhanayak. 2019. Blockchain technology: A survey on applications and security privacy challenges. Internet Things 8 (2019), 1--19. https://doi.org/10.1016/j.iot.2019.100107
[54]
Youngjoo Shin, Dongyoung Koo, and Junbeom Hur. 2017. A survey of secure data deduplication schemes for cloud storage systems. ACM Comput. Surveys 49 (2017), 4. https://doi.org/10.1145/3017428 54=137
[55]
Hoang Giang Do and Wee Keong Ng. 2017. Blockchain-based system for secure data storage with private keyword search. In Proceedings of the IEEE World Congress on Services (SERVICES’17). 90--93. https://doi.org/10.1109/SERVICES.2017.23
[56]
Li, Jingyi, Jigang Wu, Long Chen, and Jiaxing Li. 2018. Deduplication with blockchain for secure cloud storage. In Proceedings of the CCF Conference on Big Data. Springer, 558--570. https://doi.org/10.1007/978-981-13-2922-7_36
[57]
Xiao-Long Liu, Ruey-Kai Sheu, Shyan-Ming Yuan, and Yu-Ning Wang. 2016. A file-deduplicated private cloud storage service with CDMI standard. Comput. Stand. Interfaces 44, 18--27. https://doi.org/10.1016/j.csi.2015.09.010
[58]
S. Supriya and S. Mythili. 2017. Study on data deduplication in cloud computing. Int. J. Adv. Res. Comput. Sci. 8 (2017), 8. https://doi.org/10.26483/ijarcs.v8i8.4689
[59]
Liu, Bin, Xiao Liang Yu, Shiping Chen, Xiwei Xu, and Liming Zhu. 2017. Blockchain based data integrity service framework for IoT data. In Proceedings of the IEEE International Conference on Web Services (ICWS’17). 468--475. https://doi.org/10.1109/ICWS.2017.54
[60]
Yue, Dongdong, Ruixuan Li, Yan Zhang, Wenlong Tian, and Chengyi Peng. 2018. blockchain based data integrity verification in p2p cloud storage. In Proceedings of the IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS’18). 561--568. https://doi.org/10.1109/PADSW.2018.8644863
[61]
Deka Ganesh Chandra, Ravi Prakash, and Swati Lamdharia. 2012. A study on cloud database. In Proceedings of the 4th IEEE International Conference on Computational Intelligence and Communication Networks (CICN’12). 513--519. https://doi.org/10.1109/CICN.2012.35
[62]
Vandana Bhatia and Ajay Jangra. 2014. SETiNS: Storage efficiency techniques in No-SQL database for Cloud based design. In Proceedings of the IEEE International Conference on Advances in Engineering and Technology Research (ICAETR’14). https://doi.org/10.1109/ICAETR.2014.7012839
[63]
Josef Gattermayer and Pavel Tvrdik. 2017. Blockchain-based multi-level scoring system for P2P clusters. In Proceedings of the 46th International Conference on Parallel Processing Workshops (ICPPW’17). 301--308. https://doi.org/10.1109/ICPPW.2017.50
[64]
Hussam Abu-Libdeh, Lonnie Princehouse, and Hakim Weatherspoon. 2010. RACS: A case for cloud storage diversity. In Proceedings of the 1st ACM Symposium on Cloud Computing. https://doi.org/10.1145/1807128.1807165
[65]
Ambarish Kumar Patel. 2017. Cloud storage and its secure techniques. Int. J. Engineer. Sci. 7 (2017), 6603.
[66]
Jiaxing Li, Jigang Wu, and Long Chen. 2018. Block-Secure: Blockchain based scheme for secure P2P cloud storage. Info. Sci. 465, 219--231. https://doi.org/10.1016/j.ins.2018.06.071
[67]
Ilya Sukhodolskiy and Sergey Zapechnikov. 2018. A blockchain-based access control system for cloud storage. In Proceedings of the IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus’18). 1575--1578. https://doi.org/10.1109/EIConRus.2018.8317400
[68]
Qi Xia, Emmanuel Sifah, Abla Smahi, Sandro Amofa, and Xiaosong Zhang. 2017. BBDS: Blockchain-based data sharing for electronic medical records in cloud environments. Information 8, 2 (2017), 44. https://doi.org/10.3390/info8020044
[69]
Jason Paul Cruz, Yuichi Kaji, and Naoto Yanai. 2018. RBAC-SC: Role-based access control using smart contract. IEEE Access 6 (2018), 12240--12251. https://doi.org/10.1109/ACCESS.2018.2812844
[70]
Ittay Eyal, Adem E. Gencer, Emin G. Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16). 45--59.
[71]
Christopher Natoli and Vincent Gramoli. 2016. The blockchain anomaly. In Proceedings of the IEEE 15th International Symposium on Network Computing and Applications (NCA’16), 310--317. https://doi.org/10.1109/NCA.2016.7778635
[72]
Yinghui Zhang, Robert H. Deng, Ximeng Liu, and Dong Zhen. 2018. Blockchain based robust and efficient fair payment for outsourcing services in cloud computing. Info. Sci. 462 (2018), 262--277. https://doi.org/10.1016/j.ins.2018.06.018
[73]
S. Pavithra, S. Ramya, and S. Prathibha. 2019. A survey on cloud security issues and blockchains. In Proceedings of the 3rd International Conference on Computing and Communication Technologies (ICCCT’19), 136--140. https://doi.org/10.1109/ICCCT2.2019.8824891
[74]
Changsang Yang, Xiaofeng Chen, and Yang Xiang. 2018. Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103 (2018), 185--193. https://doi.org/10.1016/j.jnca.2017.11.011
[75]
Pasquale Giungato, Roberto Rana, Angela Tarabella, and Caterina Tricase. 2017. Current trends in sustainability of bitcoins and related blockchain technology. Sustainability 9, 12 (2017), 2214. https://doi.org/10.3390/su9122214
[76]
Mahdi H. Miraz and Maaruf Ali. 2018. Applications of blockchain technology beyond cryptocurrency. International Association of Educators and Researchers (IAER) 2, 1 (2018), 1–6. https://doi.org/10.33166/AETiC.2018.01.001
[77]
Huige Li, Haibo Tian, and Jiejie He. 2018. Blockchain-based searchable symmetric encryption scheme. Comput. Electric. Engineer. 73 (2018), 32--45. https://doi.org/10.1016/j.compeleceng.2018.10.015
[78]
Hong Giang Do and Wee Keong Ng. 2017. Blockchain-based system for secure data storage with private keyword search. In Proceedings of the IEEE World Congress on Services (SERVICES’17) 90--93. https://doi.org/10.1109/SERVICES.2017.23
[79]
Han Wang, Xu An Wang, Shuai Xiao, and Zichen Zhou. 2019. Blockchain-based public auditing scheme for shared data. In Proceedings of the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Springer, Cham, 197--206. https://doi.org/10.1007/978-3-030-22263-5_19
[80]
Hiayang Yu and Zhen Yang. 2018. Decentralized and smart public auditing for cloud Storage. In Proceedings of the IEEE 9th International Conference on Software Engineering and Service Science (ICSESS’18) (491--494). IEEE. https://doi.org/10.1109/ICSESS.2018.8663780
[81]
Jin Ho Park and Jong Hyuk Park. 2017. Blockchain security in cloud computing: Use cases, challenges and solutions. Symmetry 9, 8 (2017), 1--13. https://doi.org/10.3390/sym9080164
[82]
Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, and Dong Zheng. 2018. TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6 (2018), 31077--31087. https://doi.org/10.1109/ACCESS.2018.2844400
[83]
Jacob Eberhardt and Stefan Tai. 2017. On or off the blockchain? Insights on off-chaining computation and data. In Service-Oriented and Cloud Computing (ESOCC'17), F. De Paoli, S. Schulte, and Johnsen E. Broch (Eds.). Lecture Notes in Computer Science, Vol. 10465, Springer, Cham. https://doi.org/3-15. 10.1007/978-3-319-67262-5_1.
[84]
Xiaolong Liu, Riqing Chen, Yu-Wen Chen, and Shyan-Ming Yuan. 2018. Off-chain data fetching architecture for ethereum smart contract. In Proceedings of the International Conference on Cloud Computing, Big Data and Blockchain (ICCBB’18). 1--4. https://doi.org/10.1109/ICCBB.2018.8756348
[85]
Storage Needs for Blockchain Technology. 2019. IBM storage. Retrieved from https://www.ibm.com/blogs/systems/storage-for-blockchain-and-modern-distributed-database-processing/.
[86]
Pradip K. Sharma, Mu-Yen Chen, and Jong H. Park. 2017. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6 (2017), 115--124. https://doi.org/10.1109/ACCESS.2017.2757955
[87]
Syed S. Hasan, Nazatul H. Sultan, and Ferdous A. Barbhuiya. 2019. Cloud data provenance using ipfs and blockchain technology. In Proceedings of the 7th International Workshop on Security in Cloud Computing. 5--12. https://doi.org/10.1145/3327962.3331457
[88]
Ahsan Manzoor, Madhsanka Liyanage, An Braeke, Salil S. Kanhere, and Mika Ylianttila. 2019, May. Blockchain based proxy re-encryption scheme for secure IOT data sharing. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC’19). 99--103. https://doi.org/10.1109/BLOC.2019.8751336
[89]
Yuan Zhang, Chunxiang Xu, Xiaodong Lin, and Xuemin S. Shen. 2019. Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. https://doi.org/10.1109/TCC.2019.2908400
[90]
Shangping Wang, Xu Wang, and Yaling Zhang. 2019. A secure cloud storage framework with access control based on blockchain. IEEE Access. 7 (2019), 112713--112725. https://doi.org/10.1109/ACCESS.2019.2929205
[91]
Yuan Zhang, Chunxiang Xu, Jianbing Ni, Hongwei Li, and Xuemin S. Shen. 2019. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Trans. Cloud Comput. https://doi.org/10.1109/TCC.2019.2923222
[92]
Deepak Tosh, Sachin Shetty, Xueping Liang, Charles Kamhoua, and Laurent L. Njilla. 2019. Data provenance in the cloud: A blockchain-based approach. IEEE Consumer Electron. Mag. 84, 38--44. https://doi.org/10.1109/MCE.2019.2892222
[93]
Yi Chen, Shuai Ding, Zheng Xu, Handong Zheng, and Shanlin Yang. 2019. Blockchain-based medical records secure storage and medical service framework. J. Med. Syst. 43, 1 (2019), 5. https://doi.org/10.1007/s10916-018-1121-4
[94]
Sheng Cao, Gexiang Zhang, Pengfei Liu, Xiaosong Zhang, and Ferrante Neri. 2019. Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain. Info. Sci. 485, 427--440. https://doi.org/10.1016/j.ins.2019.02.038
[95]
Shangping Wang, Yinglong Zhang, and Yaling Zhang. 2018. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6, 38437--38450. https://doi.org/10.1109/ACCESS.2018.2851611
[96]
Wuhui Chen, Yufei Chen, Xu Chen, and Zibin Zheng. 2019. Toward secure data sharing for the IoV: A quality-driven incentive mechanism with on-chain and off-chain guarantees. IEEE Internet Things J. 7, 3 (2019), 1625--1640. https://doi.org/10.1109/JIOT.2019.2946611
[97]
Nick Lambert, Qi Ma, and David Irvine. 2015. Safecoin: The decentralized network token. Retrieved from https://docs.maidsafe.net/Whitepapers/pdf/Safecoin.pdf.
[98]
Vitalik Buterin. 2013. Ethereum white paper: A next generation smart contract and decentralized application platform. Retrieved from https://blockchainlab.com/pdf/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf.
[99]
David Vorick. and Luke Champine. 2014. Sia: Simple decentralized storage. Nebulous Inc. Retrieved from https://sia.tech/sia.pdf.
[100]
Storj Labs, Inc. 2018. Storj: A decentralized cloud storage network framework. Retrieved from https://storj.io/storj.pdf.
[101]
Swarm. 2017. Retrieved from https://swarm-guide.readthedocs.io/en/latest/introduction.html.
[102]
Protocol Labs. 2017. Filecoin: A Decentralized Storage Network. Retrieved from https://filecoin.io/filecoin.pdf.
[103]
Juan Benet. IPFS: Content Addressed, Versioned, P2P File System. Retrieved from https://ipfs.io/ipfs/QmR7GSQM93Cx5eAg6a6yRzNde1FQv7uL6X1o4k7zrJa3LX/ipfs.draft3.pdf.
[104]
Karim Sultan, Umar Ruhi, and Rubina Lakhani. 2018. Conceptualizing blockchains: Characteristics and applications. Retrieved from https://arxiv.org/abs/1806.03693v1.
[105]
Barenji, Ali Vatankhah, Hanyang Guo, Zonggui Tian, Zhi Li, W. M. Wang, and George Q. Huang. 2019. Blockchain-based cloud manufacturing: decentralization. Retrieved from https://arxiv.org/abs/1901.10403.
[106]
Emil Stefanov, Marten van Dijk, Ari Juels, and Alina Oprea. 2012. Iris: A scalable cloud file system with efficient integrity checks. In Proceedings of the 28th Annual Computer Security Applications Conference. 229--238. https://doi.org/10.1145/2420950.2420985
[107]
Jesus Emanuel Ferreira, Vanessa R. L. Chicarino, Célio VN de Albuquerque, and Antônio A. de A. Rocha. 2018. A survey of how to use blockchain to secure internet of things and the stalker attack. Secur. Commun. Networks 7 (2018), 1--27. https://doi.org/10.1155/2018/9675050
[108]
Nurzhan Aitzhan, Zhumabekuly, and Davor Svetinovic. 2018. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Depend. Secure Comput. 15, 5 (2018), 840--852. https://doi.org/10.1109/TDSC.2016.2616861
[109]
Lizhe Wang, Rajiv Ranjan, Jinjun Chen, and Boualem Benatallah. 2011. Cloud computing: Methodology, systems, and applications. CRC Press. https://doi.org/10.1201/b11149
[110]
Oracle. 2017. Oracle blockchain cloud service project. Retrieved from https://cloud.oracle.com/blockchain.
[111]
iEx.ec. 2018. Retrieved from https://iex.ec/.
[112]
Jacobovitz, Ori. 2016. Blockchain for identity management. The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva. Retrieved from https://www.cs.bgu.ac.il/∼frankel/TechnicalReports/2016/16-02.pdf.
[113]
Hassan Saad Alqahtani and Ghita Kouadri-Mostefaou. 2014. Multi-clouds mobile computing for the secure storage of data. In IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC’14). IEEE. https://doi.org/10.1109/UCC.2014.68
[114]
Jia Yu, Kui Ren, Cong Wang, and Vijay Varadharajan. 2015. Enabling cloud storage auditing with key-exposure resistance. IEEE Trans. Info. Forensics Secur. 10, 6 (2015), 1167--1179. https://doi.org/10.1109/TIFS.2015.2400425
[115]
Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, and Wenjing Lou. 2013. Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 2 (2013), 362--375. https://doi.org/10.1109/TC.2011.245
[116]
Yannan Li, Yong Yu, Willy Susilo, Jianbing Ni, and Kim-Wang Raymand Choo. 2017. Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Depend. Secure Comput. 16, 1 (2017), 72--83. https://doi.org/10.1109/TDSC.2017.2662216
[117]
Yi-Sheng Su. 2017. Constructions of fractional repetition codes with flexible per-node storage and repetition degree. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’17). 1--6. https://doi.org/10.1109/GLOCOM.2017.8255008
[118]
Pradip Kumar Sharma, Mu-Yen Chen, and Jong Hyuk Park. 2018. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access. 6, 115--124. https://doi.org/10.1109/ACCESS.2017.2757955
[119]
Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou, and Duncan S. Wong. 2018. Lightweight and privacy-preserving delegable proofs of storage with data dynamics in cloud storage. IEEE Trans. Cloud Comput.
[120]
Liehuang Zhu, Yulu Wu, Keke Gai, and Kim-Kwang Raymond Choo. 2018. Controllable and trustworthy blockchain-based cloud data management. Future Gen. Comput. Syst. 91 (2018), 527--535. https://doi.org/10.1016/j.future.2018.09.019
[121]
Jingyi Li, Jigang Wu, Long Chen, and Jiaxing Li. 2018. Deduplication with blockchain for secure cloud storage. In Proceedings of the CCF Conference on Big Data. Springer. https://doi.org/10.1007/978-981-13-2922-7_36
[122]
Ripon Patgiri, Irani Acharjamayum, and Dhruwajita Devi. 2018. Blockchain: A tale of peer-to-peer security. In Proceedings of the IEEE Symposium Series on Computational Intelligence. IEEE SSCI, 18--21. https://doi.org/10.1109/SSCI.2018.8628826
[123]
Jesse Yli-Huumo, Deokyoon Ko, Sujin Choi, Sooyong Park, and Kari Smolander. 2016. Where is current research on blockchain technology?—A systematic review. PloS One 11, 10. https://doi.org/10.1371/journal.pone.0163477
[124]
Roy, Shanto, Md Ashaduzzaman, Mehedi Hassan, and Arnab Rahman Chowdhury. 2018. Blockchain for IoT security and management: Current prospects, challenges and future directions. In Proceedings of the 5th IEEE International Conference on Networking, Systems and Security (NSysS). 1--9. https://doi.org/10.1109/NSysS.2018.8631365
[125]
William J. Luther. 2016. Bitcoin and the future of digital payments. The Independent Review 20, 3 (2016), 397--404. https://www.jstor.org/stable/24562161.
[126]
Trent J. MacDonald, Darcy W. E. Allen, and Jason Potts. 2016. Blockchains and the boundaries of self-organized economies: Predictions for the future of banking. In Banking Beyond Banks and Money. Springer, 279--296. https://doi.org/10.1007/978-3-319-42448-4_14
[127]
Liang, Xueping, Sachin Shetty, Deepak Tosh, Charles Kamhoua, Kevin Kwiat, and Laurent Njilla. 2017. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. 468--477. https://doi.org/10.1109/CCGRID.2017.8
[128]
Walid Al-Saqaf and Nicolas Seidler. 2017. Blockchain technology for social impact: Opportunities and challenges ahead. J. Cyber Policy. 2, 3 (2017), 338--354. https://doi.org/10.1080/23738871.2017.1400084
[129]
Bayu Adhi Tama, Bruno Joachim Kweka, Youngho Park, and Kyung-Hyune Rhee. 2017. A critical review of blockchain and its current applications. In Proceedings of the International Conference on Electrical Engineering and Computer Science (ICECOS’17). 109--113. https://doi.org/10.1109/ICECOS.2017.8167115
[130]
Charalampos Alexopoulos et al. 2018. BlockChain technologies in government 3.0: A review. EGOV-CeDEM-ePart. In Proceedings of the International Conference EGOV-CeDEM-ePart, Danube University Krems, Austria. Retrieved from http://depts.washington.edu/egcdep18/documents/Virkar_et_al_2018.pdf.
[131]
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Yujing Han, and Shimin Chen. 2011. Collaborative integrity verification in hybrid clouds. In Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications, and Worksharing (CollaborateCom’11). IEEE, 191-200.
[132]
Aaron Wright and Primavera De Filippi. 2015. Decentralized blockchain technology and the rise of lex cryptographia. SSRN Electronic Journal. Retrieved from https://ssrn.com/abstract=2580664. https://dx.doi.org/10.2139/ssrn.2580664.
[133]
Lin, Iuon-Chang, and Tzu-Chun Liao. 2017. A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19, 5 (2017), 653--659. https://doi.org/10.6633/IJNS.201709.19(5).01
[134]
Yong Yuan and Fei-Yue Wang. 2016. Towards blockchain-based intelligent transportation systems, in intelligent transportation systems (ITSC). In Proceedings of the 19th International Conference on IEEE, 2663--2668. https://doi.org/10.1109/ITSC.2016.7795984
[135]
Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo. 2017. A survey on the security of blockchain systems, Future Gen. Comput. Syst. 107 (2017), 841--853. https://doi.org/10.1016/j.future.2017.08.020

Cited By

View all
  • (2025)A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryptionComputer Standards & Interfaces10.1016/j.csi.2024.10388791:COnline publication date: 1-Jan-2025
  • (2024)A Block-chain Based Mechanism for Securely Storing Data on Cloud and IOTEngineering World10.37394/232025.2024.6.156(144-153)Online publication date: 30-Oct-2024
  • (2024)A Security-Oriented Data-Sharing Scheme Based on BlockchainApplied Sciences10.3390/app1416694014:16(6940)Online publication date: 8-Aug-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 53, Issue 4
July 2021
831 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3410467
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 August 2020
Accepted: 01 May 2020
Revised: 01 February 2020
Received: 01 October 2019
Published in CSUR Volume 53, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Blockchain technology
  2. cloud computing
  3. cloud security
  4. cloud storage
  5. decentralization

Qualifiers

  • Tutorial
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)366
  • Downloads (Last 6 weeks)36
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryptionComputer Standards & Interfaces10.1016/j.csi.2024.10388791:COnline publication date: 1-Jan-2025
  • (2024)A Block-chain Based Mechanism for Securely Storing Data on Cloud and IOTEngineering World10.37394/232025.2024.6.156(144-153)Online publication date: 30-Oct-2024
  • (2024)A Security-Oriented Data-Sharing Scheme Based on BlockchainApplied Sciences10.3390/app1416694014:16(6940)Online publication date: 8-Aug-2024
  • (2024)Anti-attack algorithm of cloud storage attribute base based on dynamic authorized accessJournal of Intelligent & Fuzzy Systems10.3233/JIFS-237409(1-10)Online publication date: 16-Mar-2024
  • (2024)A systematic review on blockchain-based access control systems in cloud environmentJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00697-713:1Online publication date: 30-Sep-2024
  • (2024)A Review on Blockchain Technology, Current Challenges, and AI-Driven SolutionsACM Computing Surveys10.1145/370064157:3(1-39)Online publication date: 22-Nov-2024
  • (2024)Research on Cloud Storage Database Integrity Detection based on Intelligent VerificationProceedings of the 5th International Conference on Computer Information and Big Data Applications10.1145/3671151.3671368(1242-1246)Online publication date: 26-Apr-2024
  • (2024)Blockchain Data Storage Optimisations: A Comprehensive SurveyACM Computing Surveys10.1145/364510456:7(1-27)Online publication date: 9-Apr-2024
  • (2024)Audit Data Traceability and Verification System Based on Blockchain Technology and Deep Learning2024 International Conference on Telecommunications and Power Electronics (TELEPE)10.1109/TELEPE64216.2024.00020(77-82)Online publication date: 29-May-2024
  • (2024)Revolutionizing Education through Holistic Application of Technology: A Blockchain-Powered Framework for Smart Learning2023 International Conference on Smart Devices (ICSD)10.1109/ICSD60021.2024.10751355(1-5)Online publication date: 2-May-2024
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media