2019
DOI: 10.3390/s19204444
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Protocol for Cloud Databases Using Blockchain Mechanism

Abstract: Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user data by interacting with the authentication mechanism. The primary aim of this research paper is to provide a novel secure authentication mechanism by using Blockchain technology for cloud databases. Blockchain makes i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2
2

Relationship

4
6

Authors

Journals

citations
Cited by 56 publications
(34 citation statements)
references
References 46 publications
0
34
0
Order By: Relevance
“…The big data applications are supported by a wide variety of academic research to visualize, curate, analyze and capture the data [37][38][39]. The system is an integration of learning services, information services, and infrastructure services.…”
Section: Research Directionsmentioning
confidence: 99%
“…The big data applications are supported by a wide variety of academic research to visualize, curate, analyze and capture the data [37][38][39]. The system is an integration of learning services, information services, and infrastructure services.…”
Section: Research Directionsmentioning
confidence: 99%
“…The BC role was to guarantee that all signing parties will reveal their signature or they will lose their deposit as a penalty. Authors of [59] proposed a BC-based authentication mechanism to mainly forbid cloud insider attacks that may actively manipulate, or passively disclose, private clients' data. Using this system, data is saved regularly at the cloud, but can only be disclosed by authenticated users.…”
Section: F Other Fc-bc Applicationsmentioning
confidence: 99%
“…Moreover, cloud efficiency security, optimization including load balancing [55][56][57][58] and cloud location services have also have impact on cloud based health cares. In addition, cloud design, authentication mechanism such as using blockchain and wireless sensor network [59][60][61][62][63][64][65][66], security and privacy in remote health care also consider a high impact on this.…”
Section: Threats To Validity (Tv)mentioning
confidence: 99%