2020
DOI: 10.1007/978-981-15-4474-3_38
|View full text |Cite
|
Sign up to set email alerts
|

Review of Blockchain Technology to Address Various Security Issues in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…The approach involves addressing risks in cloud environments and then concentrating on how blockchain solutions can bolster the security of cloud data. The study by Prianga et al [11] delves into a Proof of Work (PoW)-based blockchain approach. The goal is to resolve privacy concerns within cloud computing environments.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The approach involves addressing risks in cloud environments and then concentrating on how blockchain solutions can bolster the security of cloud data. The study by Prianga et al [11] delves into a Proof of Work (PoW)-based blockchain approach. The goal is to resolve privacy concerns within cloud computing environments.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[9] Data security Blockchain [10] Data privacy and data integrity VMI, IPFS [11] Data security Consensus algorithm(PoW) [12] Privacy preservation Identity Based Encryption [13] Comparison of various Data integrity schemes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A thorough examination of the table reveals that the reviewed papers emphasize particular aspects of information security. For instance, Sharma et al, 28 Patel and Patel 30 emphasize incident management and countermeasure policies, emphasizing the fortification of data against unauthorized access and establishing effective incident response procedures. In contrast, Alkadi et al 29 focuses on confidentiality and cryptography to prevent the unauthorized disclosure of sensitive information.…”
Section: Literature Reviewmentioning
confidence: 99%