Comparative Requirements Analysis for the Feasibility of Blockchain for Secure Cloud

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 809)

Abstract

Cloud users are striving for minimum provider interference in accessing services from cloud’s shared pool of resources due to the dynamic and untrusted nature of cloud, and untrusted, vulnerable and greedy nature of Cloud Service Providers (CSPs). Service level agreements (SLA) are a critical aspect in maintaining security, trust and provisioning Quality of Service (QoS) in Cloud. The SLA consists of Service-level goals or the Functional and Non-Functional levels that are officially agreed by the customer and the providers. The SLA lifecycle is costly and time-consuming process. Using Blockchain technology’s use-cases with Cloud can solve the trust and security requirements of cloud users as well as make SLAs transparent and open to cloud users for quick service provisioning. In order to analyze the feasibility of using Blockchain technology with Cloud, this paper, comparatively analyze the Security and trust requirements and Non-Functional requirements of Cloud and Blockchain to solve the security and trust requirements of cloud users in cloud. We also propose a secure and self-adaptive Blockchain based framework for cloud. Blockchain being the backbone of this framework, this framework exploits the feasible use cases of the Blockchain to enhance the trust requirement of the third party (Cloud Service provider) in Cloud and maintain trust and security in the Cloud by making data secure and SLA transparent and open to all Cloud users, aiding users to analyze and make spontaneous decisions for using Cloud services.

Keywords

Non-functional requirements Security requirements Comparative analysis Cloud Security SLA Blockchain 

Notes

Acknowledgement

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2017R1D1A1B03034279).

References

  1. 1.
    Li, J., Jia, C., Li, J., Chen, X.: Outsourcing encryption of attribute-based encryption with MapReduce. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 191–201. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-34129-8_17 CrossRefGoogle Scholar
  2. 2.
    Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. (TPDS) 22(7), 1214–1221 (2011)CrossRefGoogle Scholar
  3. 3.
    Verizon 2015: 2015 Data Breach Investigations Report (2015). http://www.verizonenterprise.com/DBIR/2015/. Accessed 20 Sept 2017
  4. 4.
    Buyya, R., Yeo, C.S., Venugopal, S.: Market-oriented cloud computing: vision, hype, and reality for delivering it services as computing utilities. In: 10th IEEE International Conference on High Performance Computing and Communications, pp. 5–13. IEEE (2008)Google Scholar
  5. 5.
    Tang, J., Cui, Y., Li, Q., Ren, K., Liu, J., Buyya, R.: Ensuring security and privacy preservation for cloud data services. ACM Comput. Surv. (CSUR) 49(1), 1–39 (2016)CrossRefGoogle Scholar
  6. 6.
    Rong, C., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1), 47–54 (2013)CrossRefGoogle Scholar
  7. 7.
    Almorsy, M., Grundy, J., Ibrahim, A.S.: MDSE@R: model-driven security engineering at runtime. In: Xiang, Y., Lopez, J., Kuo, C.-C.J., Zhou, W. (eds.) CSS 2012. LNCS, vol. 7672, pp. 279–295. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-35362-8_22 CrossRefGoogle Scholar
  8. 8.
    Kertész, A., Kecskemeti, G., Brandic, I.: An interoperable and self-adaptive approach for SLA-based service virtualization in heterogeneous cloud environments. Future Gener. Comput. Syst. 32, 54–68 (2014)CrossRefGoogle Scholar
  9. 9.
    Aljoumah, E., Al-Mousawi, F., Ahmad, I., Al-Shammri, M., Al-Jady, Z.: SLA in cloud computing architectures: A comprehensive study. Int. J. Grid Distrib. Comput. 8(5), 7–32 (2015)CrossRefGoogle Scholar
  10. 10.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  11. 11.
    Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutorials 1(3), 2084–2123 (2016)CrossRefGoogle Scholar
  12. 12.
    Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc. (2015)Google Scholar
  13. 13.
    Omohundro, S.: Cryptocurrencies, smart contracts, and artificial intelligence. AI Matters 1(2), 19–21 (2014)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: a global naming and storage system secured by Blockchains. In: USENIX Annual Technical Conference, pp. 181–194 (2016)Google Scholar
  15. 15.
    Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., Pautasso, C., Rimba, P.: A taxonomy of Blockchain-based systems for architecture design. In: 2017 IEEE International Conference on Software Architecture (ICSA), pp. 243–252. IEEE (2017)Google Scholar
  16. 16.
    Pilkington, M.: Blockchain technology: principles and Applications. In: Olleros, F.X., Zhegu, M., Elgar, E. (eds.) Research Handbook on Digital Transformations (2016). SSRN: https://ssrn.com/abstract=2662660. Accessed 2015
  17. 17.
    Xu, X., Pautasso, C., Zhu, L., Gramoli, V., Ponomarev, A., Chen, S.: The blockchain as a software connector. In: 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), pp. 182–191. IEEE (2016)Google Scholar
  18. 18.
    Rimba, P., Tran, A.B., Weber, I., Staples, M., Ponomarev, A., Xu, X.: Comparing Blockchain and cloud services for business process execution. In: 2017 IEEE International Conference on Software Architecture (ICSA), pp. 257–280. IEEE (2017)Google Scholar
  19. 19.
    Ludwig, H., Keller, A., Dan, A., King, R.P., Franck, R: Web service level agreement (WSLA) language specification. IBM Corporation, pp. 815–824 (2003)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer EngineeringAjou UniversitySuwonKorea
  2. 2.Department of Software and Computer EngineeringAjou UniversitySuwonKorea

Personalised recommendations