Abstract
In 2006, cloud computing existed after Amazon’s deployment of the first of its category of cloud services. Cloud computing is now simply the topmost in every record of existing theme as a research topic, for computer science in view of the fact that of its across-the-board implications in various areas in computing and which has become present day’s most recent research area because of its capability to decrease the operational costs linked with computing. A rapid growth in cloud computing adaption has been observed but, still, the data security concerns have not been fully countered. Data security anxiety is still an obstacle to the expansion of cloud computing to some extent and needs to be determined. Earlier we have used techniques for cloud environment security in our research work like two-factor authentication (OTP), AES algorithm, RSA cryptography, elliptic curve cryptography (ECC), hyperelliptic curve cryptography (HECC), homomorphic encryption, steganography, usage control (UCON) collective with encryption and the digital watermarking technology. Apart from used techniques, blockchain has come into view as a key technology to ensure security particularly in aspects of authenticity confidentiality and integrity. Therefore, this time we have selected blockchain technology to avoid the security concerns of the cloud environment. This time we will review the various features of security in blockchain and further analyze the application of blockchain in cloud environment for computing security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Narayanan A, Bonneau J, Felten E, Miller A, Goldfeder S (2016) Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, Princeton
Beikverdi A, Song J (2015) Trend of centralization in Bitcoin’s distributed network. In: 2015 IEEE/ACIS 16th international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). IEEE, pp 1–6
Huang H, Chen X, Wu Q, Huang X, Shen J (2018) Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener Comput Syst 78:850–858
Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303
Zhang J, Xue N, Huang X (2016) A secure system for pervasive social network-based healthcare. IEEE Access 4:9239–9250
Johnson B, Laszka A, Grossklags J, Vasek M, Moore T (2014) Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 72–86
Moreno-Sanchez P, Kate A, Maffei M, Pecina K (2015) Privacy preserving payments in credit networks. In: Network and distributed security symposium
Li J, Jia C, Li J, Chen X (2012) Outsourcing encryption of attribute-based encryption with mapreduce. In: International conference on information and communications security. Springer, Berlin, Heidelberg, pp 191–201
Hur J, Noh DK (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221
Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115
Bheemaiah K (2015) Block chain 2.0: the renaissance of money. Wired
Park JH, Park JH (2017) Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry 9(8):164
Bonneau J, Miller A, Clark J, Narayanan A, Kroll JA, Felten EW (2015) Sok: research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE symposium on security and privacy. IEEE, pp 104–121
Aitzhan NZ, Svetinovic D (2016) Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans Dependable Secure Comput 15(5):840–852
Tschorsch F, Scheuermann B (2016) Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun Surv Tutor 18(3):2084–2123
Hari A, Lakshman TV (2016) The internet blockchain: a distributed, tamper-resistant transaction framework for the internet. In: Proceedings of the 15th ACM workshop on hot topics in networks, pp 204–210
Vasek M, Thornton M, Moore T (2014) Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 57–71
Möser M, Böhme R (2015) Trends, tips, tolls: a longitudinal study of Bitcoin transaction fees. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 19–33
Meiklejohn S, Orlandi C (2015) Privacy-enhancing overlays in bitcoin. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 127–141
Gkaniatsou A, Arapinis M, Kiayias A (2017) Low-level attacks in bitcoin wallets. In: International conference on information security. Springer, Cham, pp 233–253
Bamert T, Decker C, Wattenhofer R, Welten S (2014) Bluewallet: the secure bitcoin wallet. In: International workshop on security and trust management. Springer, Cham, pp 65–80
Haber S, Stornetta WS (1990) How to time-stamp a digital document. In: Conference on the theory and application of cryptography. Springer, Berlin, Heidelberg, pp 437–455
Sapirshtein A, Sompolinsky Y, Zohar A (2016) Optimal selfish mining strategies in bitcoin. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 515–532
Kogias EK, Jovanovic P, Gailly N, Khoffi I, Gasser L, Ford B (2016) Enhancing bitcoin security and performance with strong consistency via collective signing. In: 25th {usenix} security symposium ({usenix} security 16), pp 279–296
Karame GO, Androulaki E, Capkun S (2012) Double-spending fast payments in bitcoin. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 906–917
Stinson DR, Paterson M (2018) Cryptography: theory and practice. CRC press
Mann C, Loebenberger D (2017) Two-factor authentication for the Bitcoin protocol. Int J Inf Secur 16(2):213–226
Bastiaan M (2015) Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin. http://referaat.cs.utwente.nl/conference/22/paper/7473/preventingthe-51-attack-a-stochasticanalysis-oftwo-phase-proof-of-work-in-bitcoin.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Singh, S.K., Manjhi, P.K., Tiwari, R.K. (2021). Cloud Computing Security Using Blockchain Technology. In: Agrawal, R., Gupta, N. (eds) Transforming Cybersecurity Solutions using Blockchain. Blockchain Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-33-6858-3_2
Download citation
DOI: https://doi.org/10.1007/978-981-33-6858-3_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6857-6
Online ISBN: 978-981-33-6858-3
eBook Packages: EngineeringEngineering (R0)