2023
DOI: 10.21203/rs.3.rs-2433256/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

An implementation of Secure Cloud Computing mechanism for transactions using Blockchain Technology

Abstract: Blockchain is a system recording data that makes it difficult or impossible to alter, hack, or defraud the system. A blockchain is a digital ledger of transactions replicated and distributed over computer servers. Blockchain technology is a significant new financial innovation radically reshaping corporate transactions. It is a decentralized network that supports and employs multiple encryption algorithms. These safe, robust, and adaptable transactions are incorporated into another significant computer paradig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…The aim of managing information security in cloud computing is to safeguard the infrastructure, data, and applications. 47 Cloud computing security is enforced through a variety of measures, including controls, policies, technologies, and approaches that adhere to security management regulations. The result is increased data privacy, integrity, and availability.…”
Section: Information Security Threat and Attack Landscapementioning
confidence: 99%
See 4 more Smart Citations
“…The aim of managing information security in cloud computing is to safeguard the infrastructure, data, and applications. 47 Cloud computing security is enforced through a variety of measures, including controls, policies, technologies, and approaches that adhere to security management regulations. The result is increased data privacy, integrity, and availability.…”
Section: Information Security Threat and Attack Landscapementioning
confidence: 99%
“…In cloud computing, these security measures are utilized for safeguarding data, promoting regulatory compliance, upholding customer privacy, and establishing authentication procedures for users and devices. 47 Furthermore, the implementation of cloud protection measures must be shared among both service providers and data owners. The incorporation of a fundamental secure layer in cloud computing is derived from the practices of most cloud service providers.…”
Section: Information Security Threat and Attack Landscapementioning
confidence: 99%
See 3 more Smart Citations