Abstract
Being distributed in nature, Cloud is an in-use technology over the last decade where the data is stored on the Cloud service provider’s site where the data owner does not have direct access to the storage where her data is stored. This leads to severe security issues. Out of various such issues, data correctness or integrity is one of the major aspects of Cloud data storage security. Researchers have been exploring the options of using blockchain technology to address the data storage correctness concern in Cloud computing. Blockchain technology has provided a new dimension to address the traditional security issues in computing technologies, where every transaction is treated as an atomic operation, and once performed, it becomes immutable. The transactions are stored in a block, and such blocks are linked together to form a chain through a cryptographic hash code. Such chains are distributed in nature in the sense that there is no single central administrative authority to manage them, and any node in the network can verify the correctness of data or transaction. In this paper, we intend to make an exhaustive study on various alternatives to solve the data integrity issues in Cloud computing using blockchain technology. Being distributed, immutable, transparent, cost effective and efficient to use, blockchain is definitely a solution to many issues including Cloud data storage security problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Avoyan H (2019) 3 types of cloud computing services—monitis blog. Monitis blog. Available at: https://www.monitis.com/blog/3-types-of-Cloud-computing-services/. Accessed 30 Nov 2019
IaaS P (2019) SaaS (Explained and compared). Apprenda. Available at: https://apprenda.com/library/paas/iaas-paas-saas-explained-compared/. Accessed 30 Nov 2019
Lifewire (2019) Take 5 minutes to learn the basics of cloud computing. Available at: https://www.lifewire.com/what-is-Cloud-computing-817770. Accessed 30 Nov 2019
Anon (2019) Available at: https://www.networkworld.com/article/3007991/3-types-of-private-Clouds-which-one-s-right-for-you.htm. Accessed 30 Nov 2019
SAM Solutions (2019) 4 best cloud deployment models (An overview with examples). SAM Solutions. Available at: https://www.sam-solutions.com/blog/four-best-Cloud-deployment-models-you-need-to-know/. Accessed 30 Nov 2019
Techno-pulse.com (2019) Techno-Pulse. Available at: https://www.techno-pulse.com/. Accessed 30 Nov 2019
Search Cloud Computing () What is hybrid Cloud? - Definition from WhatIs.com. [online] Available at: https://searchCloudcomputing.techtarget.com/definition/hybrid-Cloud. Accessed 30 Nov 2019
Jabir RM, Khanji SI, Ahmad LA, Alfandi O, Said H (2016) Analysis of cloud computing attacks and countermeasures. pp 1–1. https://doi.org/10.1109/icact.2016.7423295
Bitcoin.org (2019). Available at: https://bitcoin.org/bitcoin.pdf. Accessed 30 Nov 2019
Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends. Available at: https://doi.org/10.1109/bigdatacongress.2017.85
Cheng S et al (2017) Research on application model of blockchain technology in distributed electricity market. IOP Conf Ser: Earth Environ Sci 93:012065. https://doi.org/10.1088/1755-1315/93/1/012065
Ethereum GitHub implementation. Available at: https://github.com/ethereum/goethereum. Accessed 13 Feb 2018
Hyperledger GitHub implementation. Available at: https://github.com/hyperledger/fabric-sdk-py. Accessed 13 Feb 2018
Bitcoin GitHub implementation. Available at: https://github.com/bitcoin/bitcoin. Accessed 13 Feb 2018
Al Omar A, Bhuiyan MZ, Basu A, Kiyomoto S, Rahman MS (2019) Privacy-friendly platform for healthcare data in Cloud based on blockchain environment. Futur Gener Comput Syst 95C:511–521. Available at: https://doi.org/10.1016/j.future.2018.12.044
Zyskind G, Nathan O et al. (2015) Decentralizing privacy: using blockchain to protect personal data. In: Security and privacy workshops (SPW), IEEE, pp 80–184
Holt JE. Logcrypt: forward security and public verification for secure audit logs. In: Proceedings of the 4th Australasian workshops on grid computing and e-research (ACSW‘06), Tasmania, Australia, pp 203–211
Sutton A, Samavi R (2017) Blockchain enabled privacy audit logs. In: d’Amato C et al (ed) The semantic web—ISWC 2017. ISWC 2017. Lecture notes in computer science, vol 10587. Springer, Cham
Kumar M, Singh AK, Kumar TVS (2018) Secure log storage using blockchain and cloud infrastructure. In: 9th ICCCNT, IISC, Bengaluru, India, IEEE
Li J, Wu J, Chen L (2018) Block-secure: blockchain based scheme for secure P2P Cloud storage. Inf Sci 465:219–231. https://doi.org/10.1016/j.ins.2018.06.071
Li J, Wu J, Chen L, Li J (2018) Deduplication with blockchain for secure cloud storage. In: 6th proceedings of CCF conference, big data, China. Available at: https://doi.org/10.1007/978-981-13-2922-7_36
Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: 2017 17th IEEE/ACM international symposium on cluster, cloud and grid computing (CCGRID), Madrid, pp 468–477. https://doi.org/10.1109/ccgrid.2017.8
Asghar MR, Ion M, Russello G, Crispo B (2012) Securing data provenance in the cloud. In: Camenisch J, Kesdogan D (eds) Open problems in network security. Lecture notes in computer science, vol 7039. Springer, Berlin, Heidelberg
Hasan R, Sion R, Winslett M (2009) Sprove 2.0: A highly configurable platform-independent library for secure provenance, ACM, CCS, Chicago, IL, USA
Xue J, Xu C, Zhang Y, Bai L (2018) Dstore: a distributed cloud storage system based on smart contracts and blockchain. In: 18th international conference, ICA3PP 2018, Guangzhou, China, Part III. https://doi.org/10.1007/978-3-030-05057-3_30
Andrew A (2019) Blockchain security: how far have we come in 2019? Forbes, Forbes Magazine, 27 Mar 2019. Available at: https://www.forbes.com/sites/andrewarnold/2019/03/27/blockchain-security-how-far-have-we-come-in-2019/#26feb29b2457
Chandhok A (2019) Top five blockchain security issues in 2019. LedgerOps, LedgerOps—Elite Cybersecurity, 28 Mar 2019. Available at: https://ledgerops.com/blog/2019/03/28/top-five-blockchain-security-issues-in-2019
Wilkinson S, Boshevski T, Brandoff J, Buterin V (2014) Storj a peer-to-peer cloud storage network
Park JH, Park JH (2017) Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry 9:164. https://doi.org/10.3390/sym9080164
Blockchain Technology Explained: Introduction, Meaning, and Applications. Hackernoon. Available at: https://www.hackernoon.com/blockchain-technology-explained-introduction-meaning-and-applications-edbd6759a2b2 Accessed 30 Nov 2019
Hyperledger (2019) About—Hyperledger. Available at: https://www.hyperledger.org/about Accessed 30 Nov 2019
SitePoint (2019) Remix: develop smart contracts for the ethereum blockchain—SitePoint. Available at: https://www.sitepoint.com/remix-smart-contracts-ethereum-blockchain/ Accessed 30 Nov 2019
Dzone.com (2019) 10 tools for blockchain development—dzone security. Available at: https://dzone.com/articles/10-tools-for-blockchain-development Accessed 30 Nov 2019
Codementor.io (2019) Developing for ethereum: getting started with ganache. Codementor. Available at: https://www.codementor.io/swader/developing-for-ethereum-getting-started-with-ganache-l6abwh62j Accessed 20 No 2019
Ltd, Attores Pte (2019) Step-by-step guide: getting started with ethereum mist wallet. Available at: https://www.medium.com/@attores/step-by-step-guide-getting-started-with-ethereum-mist-wallet-772a3cc99af4 Accessed 17 Nov 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patel, P., Patel, H. (2021). Review of Blockchain Technology to Address Various Security Issues in Cloud Computing. In: Kotecha, K., Piuri, V., Shah, H., Patel, R. (eds) Data Science and Intelligent Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 52. Springer, Singapore. https://doi.org/10.1007/978-981-15-4474-3_38
Download citation
DOI: https://doi.org/10.1007/978-981-15-4474-3_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4473-6
Online ISBN: 978-981-15-4474-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)