2022
DOI: 10.3390/app12052754
|View full text |Cite
|
Sign up to set email alerts
|

A Cloud Microservices Architecture for Data Integrity Verifiability Based on Blockchain

Abstract: The current digital age, mainly characterized by an economy based upon information technology, demands a data integrity service, even more so because organizations and companies are migrating their services over the cloud. This is not a simple task; it is cumbersome since traditional schemes in databases could be subject to modifications. However, it can be solved using blockchain technology. This paper provides a data integrity verifiability architecture for cloud systems based on blockchain. The architecture… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 50 publications
0
8
0
Order By: Relevance
“…We believe that our model could help in minimizing (or eliminating) the untrustworthy perception of the Mexican avocado supply chain market. Although we consider that our solution might have an important impact in the supply chain area, it is still a prototype solution with a very acceptable local opinion and several technical proofs, as demonstrated in [59]. Therefore, the technology transfer is still an exploration step and thus the business practice will be included for future research.…”
Section: User-oriented Trustmentioning
confidence: 98%
See 1 more Smart Citation
“…We believe that our model could help in minimizing (or eliminating) the untrustworthy perception of the Mexican avocado supply chain market. Although we consider that our solution might have an important impact in the supply chain area, it is still a prototype solution with a very acceptable local opinion and several technical proofs, as demonstrated in [59]. Therefore, the technology transfer is still an exploration step and thus the business practice will be included for future research.…”
Section: User-oriented Trustmentioning
confidence: 98%
“…The Audit Architecture will work in a similar way as proposed in [58,59]. This is an interface storing all data in the blockchain.…”
Section: Audit Architecturementioning
confidence: 99%
“…Network administrator control is exercised by authorized management users who oversee the data's storage and access architecture. For instance, the system must generate and issue a digital certificate for users, ensuring information security by signing the certificate to authenticate legitimate users [7,8]. Users with different roles possess varying permissions.…”
Section: Related Workmentioning
confidence: 99%
“…Data application authorization addresses the control issue associated with application access. In alignment with the private cloud environment's application characteristics, literature [7] proposed an encryption systembased access control scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Administrator control refers to the members of the network with the identity of management users who have the authority to manage the storage and access architecture of data and perform service verification based on the management architecture. For example, the framework needs to create and issue a digital certificate for the user and implement information protection by signing the digital certificate to register a proper user in the system [7,8]. Users of different roles have different permissions.…”
Section: Related Workmentioning
confidence: 99%