2020
DOI: 10.2139/ssrn.3766900
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain in the Cloud: A Primer on Data Security for Blockchain as a Service (BaaS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…In a cloud context, this technological stratagem becomes pivotal not merely for safeguarding data at rest, in transit, or during processing but also as a fundamental instrument in assuring regulatory compliance, fortifying user trust, and subsequently enhancing the overarching security posture of cloud service models (IaaS, PaaS, SaaS) [4]. It's worthy of note that encryption also plays a vital role in facilitating secure multi-tenancy within cloud environments, ensuring that the data of different users (tenants) remains isolated and inaccessible to one another despite residing on shared infrastructure [5]. Thus, in synthesizing the panoramic view of encrypted data management 2 in cloud computing, one navigates through an intricate web of technological, legal, and ethical dimensions, each demanding scrupulous exploration and perpetual advancements to adeptly secure digital assets in an ever-evolving cyber landscape [6].…”
Section: Introductionmentioning
confidence: 99%
“…In a cloud context, this technological stratagem becomes pivotal not merely for safeguarding data at rest, in transit, or during processing but also as a fundamental instrument in assuring regulatory compliance, fortifying user trust, and subsequently enhancing the overarching security posture of cloud service models (IaaS, PaaS, SaaS) [4]. It's worthy of note that encryption also plays a vital role in facilitating secure multi-tenancy within cloud environments, ensuring that the data of different users (tenants) remains isolated and inaccessible to one another despite residing on shared infrastructure [5]. Thus, in synthesizing the panoramic view of encrypted data management 2 in cloud computing, one navigates through an intricate web of technological, legal, and ethical dimensions, each demanding scrupulous exploration and perpetual advancements to adeptly secure digital assets in an ever-evolving cyber landscape [6].…”
Section: Introductionmentioning
confidence: 99%