2020 IEEE 10th Symposium on Computer Applications &Amp; Industrial Electronics (ISCAIE) 2020
DOI: 10.1109/iscaie47305.2020.9108796
|View full text |Cite
|
Sign up to set email alerts
|

Securing and Trustworthy Blockchain-based Multi-Tenant Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The author Reantongcome et al [14] has proposed in their paper about multi-tenancy co-resident attack which is caused due to leakage in data by a malicious tenant. The authors implicated a truffle framework to implement blockchain with Ethereum.…”
Section: Related Workmentioning
confidence: 99%
“…The author Reantongcome et al [14] has proposed in their paper about multi-tenancy co-resident attack which is caused due to leakage in data by a malicious tenant. The authors implicated a truffle framework to implement blockchain with Ethereum.…”
Section: Related Workmentioning
confidence: 99%
“…This study explores the complex interplay between these two transformative technologies with the goal of devising a novel solution that balances both security and scalability [3]. We analyze existing research on blockchain and cloud computing integration to understand the methodologies and insights needed to create this hybrid paradigm [3,[5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. We thoroughly examine pertinent literature, drawing from numerous scholarly contributions on this Disclaimer/Publisher's Note: The statements, opinions, and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s).…”
Section: Introductionmentioning
confidence: 99%
“…This study aims to explore the integration of blockchain and cloud computing in healthcare data management, with a focus on addressing security, scalability, and interoperability challenges. By synthesizing existing research and identifying key gaps, this study contributes to enhancing our understanding of the potential benefits and limitations of this integration [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. We thoroughly examine the pertinent literature, drawing from numerous scholarly contributions on this topic.…”
Section: Introductionmentioning
confidence: 99%