Skip to main content

Cloud Computing Security Using Blockchain Technology

  • Chapter
  • First Online:
Transforming Cybersecurity Solutions using Blockchain

Abstract

In 2006, cloud computing existed after Amazon’s deployment of the first of its category of cloud services. Cloud computing is now simply the topmost in every record of existing theme as a research topic, for computer science in view of the fact that of its across-the-board implications in various areas in computing and which has become present day’s most recent research area because of its capability to decrease the operational costs linked with computing. A rapid growth in cloud computing adaption has been observed but, still, the data security concerns have not been fully countered. Data security anxiety is still an obstacle to the expansion of cloud computing to some extent and needs to be determined. Earlier we have used techniques for cloud environment security in our research work like two-factor authentication (OTP), AES algorithm, RSA cryptography, elliptic curve cryptography (ECC), hyperelliptic curve cryptography (HECC), homomorphic encryption, steganography, usage control (UCON) collective with encryption and the digital watermarking technology. Apart from used techniques, blockchain has come into view as a key technology to ensure security particularly in aspects of authenticity confidentiality and integrity. Therefore, this time we have selected blockchain technology to avoid the security concerns of the cloud environment. This time we will review the various features of security in blockchain and further analyze the application of blockchain in cloud environment for computing security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Narayanan A, Bonneau J, Felten E, Miller A, Goldfeder S (2016) Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, Princeton

    MATH  Google Scholar 

  2. Beikverdi A, Song J (2015) Trend of centralization in Bitcoin’s distributed network. In: 2015 IEEE/ACIS 16th international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). IEEE, pp 1–6

    Google Scholar 

  3. Huang H, Chen X, Wu Q, Huang X, Shen J (2018) Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener Comput Syst 78:850–858

    Article  Google Scholar 

  4. Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303

    Article  Google Scholar 

  5. Zhang J, Xue N, Huang X (2016) A secure system for pervasive social network-based healthcare. IEEE Access 4:9239–9250

    Article  Google Scholar 

  6. Johnson B, Laszka A, Grossklags J, Vasek M, Moore T (2014) Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 72–86

    Google Scholar 

  7. Moreno-Sanchez P, Kate A, Maffei M, Pecina K (2015) Privacy preserving payments in credit networks. In: Network and distributed security symposium

    Google Scholar 

  8. Li J, Jia C, Li J, Chen X (2012) Outsourcing encryption of attribute-based encryption with mapreduce. In: International conference on information and communications security. Springer, Berlin, Heidelberg, pp 191–201

    Google Scholar 

  9. Hur J, Noh DK (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221

    Article  Google Scholar 

  10. Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115

    Article  Google Scholar 

  11. Bheemaiah K (2015) Block chain 2.0: the renaissance of money. Wired

    Google Scholar 

  12. Park JH, Park JH (2017) Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry 9(8):164

    Article  Google Scholar 

  13. Bonneau J, Miller A, Clark J, Narayanan A, Kroll JA, Felten EW (2015) Sok: research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE symposium on security and privacy. IEEE, pp 104–121

    Google Scholar 

  14. Aitzhan NZ, Svetinovic D (2016) Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans Dependable Secure Comput 15(5):840–852

    Article  Google Scholar 

  15. Tschorsch F, Scheuermann B (2016) Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun Surv Tutor 18(3):2084–2123

    Article  Google Scholar 

  16. Hari A, Lakshman TV (2016) The internet blockchain: a distributed, tamper-resistant transaction framework for the internet. In: Proceedings of the 15th ACM workshop on hot topics in networks, pp 204–210

    Google Scholar 

  17. Vasek M, Thornton M, Moore T (2014) Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 57–71

    Google Scholar 

  18. Möser M, Böhme R (2015) Trends, tips, tolls: a longitudinal study of Bitcoin transaction fees. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 19–33

    Google Scholar 

  19. Meiklejohn S, Orlandi C (2015) Privacy-enhancing overlays in bitcoin. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 127–141

    Google Scholar 

  20. Gkaniatsou A, Arapinis M, Kiayias A (2017) Low-level attacks in bitcoin wallets. In: International conference on information security. Springer, Cham, pp 233–253

    Google Scholar 

  21. Bamert T, Decker C, Wattenhofer R, Welten S (2014) Bluewallet: the secure bitcoin wallet. In: International workshop on security and trust management. Springer, Cham, pp 65–80

    Google Scholar 

  22. Haber S, Stornetta WS (1990) How to time-stamp a digital document. In: Conference on the theory and application of cryptography. Springer, Berlin, Heidelberg, pp 437–455

    Google Scholar 

  23. Sapirshtein A, Sompolinsky Y, Zohar A (2016) Optimal selfish mining strategies in bitcoin. In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, pp 515–532

    Google Scholar 

  24. Kogias EK, Jovanovic P, Gailly N, Khoffi I, Gasser L, Ford B (2016) Enhancing bitcoin security and performance with strong consistency via collective signing. In: 25th {usenix} security symposium ({usenix} security 16), pp 279–296

    Google Scholar 

  25. Karame GO, Androulaki E, Capkun S (2012) Double-spending fast payments in bitcoin. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 906–917

    Google Scholar 

  26. Stinson DR, Paterson M (2018) Cryptography: theory and practice. CRC press

    Google Scholar 

  27. Mann C, Loebenberger D (2017) Two-factor authentication for the Bitcoin protocol. Int J Inf Secur 16(2):213–226

    Article  Google Scholar 

  28. Bastiaan M (2015) Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin. http://referaat.cs.utwente.nl/conference/22/paper/7473/preventingthe-51-attack-a-stochasticanalysis-oftwo-phase-proof-of-work-in-bitcoin.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Santosh Kumar Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, S.K., Manjhi, P.K., Tiwari, R.K. (2021). Cloud Computing Security Using Blockchain Technology. In: Agrawal, R., Gupta, N. (eds) Transforming Cybersecurity Solutions using Blockchain. Blockchain Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-33-6858-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-6858-3_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-6857-6

  • Online ISBN: 978-981-33-6858-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics