0% found this document useful (0 votes)
42 views12 pages

Reserach Paper

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views12 pages

Reserach Paper

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

SECURITY OF DATA IN CLOUD COMPUTING USING

QUANTUM SAFE BLOCKCHAIN


S.Vijayalakshmi1 ,G.Divya2,Dr. Deivendran3
Department of Information Technology, Velammal Institute of Technology, Panchetti, Chennai, India .
1,2,3

[email protected] ,[email protected] ,[email protected]

Abstract—In order to strengthen data security in the digital the face of upcoming quantum computing developments. By
age, our research investigates the cutting-edge convergence taking this cutting-edge route, we hope to add to the continuing
of quantum-safe block chain technology and cloud discussion about data security in the digital era by providing a
computing. The importance of protecting sensitive solid foundation to protect sensitive data in the cloud while
information has never been higher as cloud computing staying at the cutting-edge of quantum-safe procedures.
becomes more and more essential to our data-driven world.
Quantum-safe alternatives are required since it's possible II. LITERATURE SURVEY
that traditional encryption techniques will soon become
vulnerable to quantum computers. This research examines The cloud environment now has a strong layer of security
the use of quantum-resistant algorithms in combination with thanks to blockchain. Due to its decentralized design, there is
block chain, which is renowned for its immutability and less chance of illegal access and data breaches because data is
cryptographic robustness, to establish a secure environment not kept in a single, exposed repository. It is extremely
for cloud-stored data. We hope to address new risks and difficult for hostile actors to change or undermine the integrity
guarantee data privacy, availability, and integrity through of the data since each transaction or data segment is
this synergy, all the while remaining abreast of developments cryptographically encrypted and recorded in a way that is
in quantum computing. resistant to tampering. This inherent security feature is
Keywords-Block chain, Data Security, Cloud Computing. especially beneficial in the context of cloud computing, where
sensitive data is frequently kept remotely.
I.INTRODUCTION
According to S. G. Sharma et al. [1] states that Access
Protecting sensitive information has become more and control and data management is made possible by blockchain
more crucial in the constantly changing digital world. The technology through the use of smart contracts. Regarding data
requirement for strong data security has never been more access, authentication, and encryption, these self-executing
pressing as our world depends more and more on cloud contracts automatically enact predetermined rules and
computing for data storage, processing, and accessibility. Even procedures. Smart contracts provide for the secure
if they are efficient, conventional encryption techniques are on management of user permissions and actions, guaranteeing that
the verge of a quantum computing revolution. Exploring only authorized individuals have access to particular cloud data
quantum-safe alternatives is necessary because the threat posed parts. This granular access control improves data security
by quantum computers, which renders current encryption while also streamlining data administration in a cloud setting.
methods susceptible, is real.
According toD. K. Tosh et al. [2] the cloud data security
The dynamic combination of two cutting-edge technologies framework is made transparent and auditable via blockchain. A
—a block chain that is quantum-safe and cloud computing—is transparent and immutable audit trail is produced by the
the focus of this study. We seek to enhance the security of data blockchain, which records each transaction and access request.
kept within cloud infrastructures by utilizing the cryptographic Organizations are able to track and confirm who accessed the
robustness of quantum-resistant algorithms and the inherent data, when, and for what reason thanks to this audit trail. It
immutability of block chain. In order to protect the privacy, improves accountability and supports regulatory compliance,
accessibility, and integrity of data stored in the cloud, our main two key components of data security, especially in highly
goal is to establish a safe environment. regulated businesses. Cloud computing combined with
The creation of an original algorithm that seamlessly blockchain protects sensitive data from potential dangers,
blends various technologies is the basis of our research. The such as quantum computing flaws, thanks to its decentralized
rising security dangers and difficulties in the world of cloud structure, smart contracts, and transparency features, which
computing are carefully addressed by this algorithm. To also help to create a secure and reliable cloud data
guarantee comprehensive data security, it places an emphasis environment.
on data segmentation, quantum-safe encryption, blockchain- Block chain technology creates an auditable and verifiable
based access management, and quantum-resistant record of all transactions and data access events, recording
authentication techniques. changes to data or access privileges immutably on the block
As we foray into this cutting-edge technological space, chain. Furthermore, the block chain’s ability to withstand
our study aims to not only offer workable solutions for cloud tampering protects data security and hinders unauthorized
data security today but also to stay flexible and adaptable in changes, making it a strong option for a variety of businesses.
a. Data Security Challenges in Cloud defending against these many risks, is highlighted by these
dangers.
According toV. P. Lalithaet al. [4] a variety of security
risks and weaknesses in the context of cloud computing need b. Block chain-Based Solutions for Cloud Data Security
for sophisticated protections. Data breaches, caused by lax
A powerful synergy exists when blockchain and cloud
access controls and setup errors, continue to be a serious threat,
computing are combined in the effort to improve data security.
and data loss is still a real possibility. Unauthorized access
According to S. M. Sasubilliet al.[9] Blockchain introduces a
could result from poor Identity and Access Management
multifaceted approach to security with its decentralized ledger,
(IAM) procedures. In addition, Distributed Denial of Service
cryptographic protections, and smart contracts. Decentralized
(DDoS) assaults and vendor lock-in pose risks. Cloud security
data storage lowers the possibility of single points of failure,
is further complicated by malware, phishing scams, and data
while smart contracts and fine-grained access control improve
privacy issues. Another level of complication is added by
data protection and control. Immutable audit trails offer
regulatory compliance. Blockchain technology that is
accountability and transparency while preventing unauthorized
quantum-safe appears as a powerful solution, strengthening
access. Data protection is strengthened through data
data security, access management, and compliance while
encryption, tamper-resistance, and resilience to quantum
reducing new risks like quantum computing, and so playing a
attacks. Additionally, smart contracts automate security
crucial role in protecting cloud-based data.
regulations, lowering the possibility of human error and
According to D. Zhe et al. [5] The goal of strengthening guaranteeing best practices. In the constantly changing field of
data security with quantum-safe block chain technology raises cyber security, this integration not only tackles present security
concerns introduced by centrally managed data storage in the issues but also positions cloud infrastructures to counter
cloud. When all the data is kept in one place or with one evolving threats.
provider, there is a serious risk of a single point of failure. Due
Blockchain technology enables decentralized data storage and
to the possibility of catastrophic data loss and the exposure of
access control, which redefines data management and security.
sensitive data, this centralization makes it a seductive target for
With this idea, data is dispersed across a network of linked
potential attackers. Additionally, the opaque nature of
nodes rather than being stored in a single central repository.
centralized storage breeds doubts about data management and
According to R. Kumar et al.[10] Each user has a
security.
cryptographic key for a particular data section, and smart
According to Z. Mahmood et al. [6]By dispersing data contracts enforce access restrictions. By putting data control in
storage among several nodes, minimizing the impact of a the hands of its owners, this method reduces single points of
single point of failure, and producing an immutable and failure and unauthorized breaches. Transparency and
auditable record of data access and modifications, quantum- immutability of blockchains produce an audit trail that
safe block chain presents a compelling remedy to these increases accountability and confidence in data transfers.
vulnerabilities. This connection strengthens data protection in Decentralized data storage and access management improve
cloud environments by introducing a vital layer of security and security, enabling people and organizations to operate in the
transparency. digital environment with trust in the confidentiality and
integrity of their data.
According to A. Markandey et al. [7]The deficiencies of
traditional security measures in cloud environments pose major According to G. Mathew et al. [11] By using blockchain
issues that demand for innovative solutions in order to increase technology, these self-executing agreements automate and
data security through quantum-safe block chaintechnology. fine-tune security protocols. They consistently define and carry
Traditional security usually emphasizes perimeter defenses and out data handling policies, authentication processes, and access
centralized control, which struggle to adapt to cloud data's rules. A smart contract might, for instance, stipulate that only
dispersed nature. Scalability becomes a challenge since users who have been authorized and have the appropriate
conventional technologies might not be able to keep up with credentials can access private information or that multi-
the adaptable and scalable cloud environment. Security blind signature authentication be used for delicate procedures. By
spots can result from inadequate visibility, and the cloud's automating enforcement, human mistake is less likely to occur,
instability makes resource provisioning more challenging. resulting in consistent adherence to security
Since transporting data to and from cloud systems may provide regulations.Additionally, the openness and immutability of
security risks, such as data exposure or loss during transit, smart contracts ensure the accountability because every action
increased security procedures are necessary. Beyond those and transaction is clearly recorded on the block chain, building
already mentioned, there are still a number of security dangers confidence and enabling effective data security monitoring.
and hazards in the cloud computing environment. Significant [12]The end result is a more secure and more resilient data
obstacles include insecure APIs, data location and sovereignty environment where access restrictions and security rules are
issues, cloud service provider vulnerabilities, insider risks, data not only set but also applied precisely and effectively,
interception, and automation flaws. [8] The necessity for novel eliminating risks and preserving the integrity of the data with
solutions, such as quantum-safe block chain technology, which more security
improves data security, access control, and audit ability while
III. Data Security in Cloud Using Quantum-Safe Fig.1. Flowchart for Enhanced Data Security in Cloud Using
Block Chain Quantum-Safe Block Chain
A thorough algorithm flow chart from fig.1, which IV. Algorithm for Enhanced Data Security in Cloud Using
offers a visual depiction of the complex procedures and Quantum-Safe Block Chain
approaches examined in our investigation, enhances the
Step 1: Initialization and Setup
methodical perspective of our research. This algorithm flow
chart functions as a useful manual, showing how our method 1.1. Specify the cloud service provider, data storage setups,
of employing quantum-safe block chains to secure data in and access points when defining the cloud
cloud computing is carried out step-by-step. This visual aid infrastructure
covers the initialization phase, data segmentation, block chain 1.2. By choosing an appropriate block chain platform (like
integration, access control, user authentication, data retrieval, Hyper ledger Fabric) and setting it up for quantum
decryption, transaction logging, and key management to resistance, one can create a consortium block chain
provide a deeper understanding of how quantum-resistant network with quantum-safe features.
block chain technology is intricately woven into cloud data 1.3. Create a safe method for managing keys that will be
security. used to store and change encryption keys.
Step 2: Data Segmentation and Encryption
2.1. Utilize sophisticated data segmentation strategies
based on the sensitivity of the data, including shading
and fragmentation techniques.
2.2. Encrypt data segments using post-quantum encryption
algorithms like NTRUEncrypt or McEliece. Make sure
that the key creation, distribution, and security
procedures are correct.
Step 3: Block chain Integration
3.1. Create smart contracts with complex access policies
and conditions to implement fine-grained access
control.
3.2. Verify user identities and demands for smart contract
interactions by using quantum-resistant digital
signatures.
3.3. Utilize MFA techniques like biometrics and OTPs to
strengthen access control in the block chain network
by enhancing user authentication within smart
contracts.
Step 4: Access Control
4.1. Created sophisticated access control policies for smart
contracts that include time-based limits, role-based
access and multi-level authentication.
4.2. Implement a block chain-based decentralized identity
management system that verifies user credentials
Step 5: Authentication and Authorization
5.1. Use multi-factor authentication or biometric
authentication to integrate user verification.
5.2. Utilize zero-knowledge proofs that can withstand
quantum technology to protect user privacy during the
authorization process.
Step6: Data Retrieval
6.1. Put in place dynamic data retrieval systems that let platform is carefully designed to include quantum-resistant
users ask for particular data segments based on their features, ensuring the network's long-term security. Nodes
access rights. are set up to build a distributed ledger that will record vital
6.2. Use consensus techniques based on block chain information like ownership, access rights, and data chunks.
technology to validate and approve data retrieval The safe foundation for data management will be provided
requests. by this block chain network
Step 7: Decryption
C. Data Segmentation and Encryption
7.1. Only oneuser who have the necessary keys and are To improve security and manageability, sensitive data is
permitted to do so can enable safe, quantum-resistant divided into more manageable chunks. Each data segment is
decryption of data segments. encrypted with quantum-safe encryption algorithm methods.
7.2. Use homomorphism encryption techniques to operate This encryption process makes sure that data integrity and
on encrypted data while maintaining privacy. confidentiality are maintained even in the face of threats
Step 8: Transaction Logging and Auditing from quantum computing.

8.1. Record all data access transactions, such as requests The quantum key distribution (QKD) Security margin (SM)
for access, approvals, and data retrievals, on the block is calculated using the formula below:
chain.
8.2. Employ tamper-proof transaction recording and SM= [(Esecure–Epotentialattack)/Esecure] x 100
auditing by using quantum-resistant hash algorithms. Where,
 SM indicates the security margin of QKD.
Step 9: Key Management and Rotation  Esecureis the time it will take for QKD to protect the
9.1. Implement a strong key management system with key data
revocation processes, safe key storage, and regular key  Epotentialattackis the expected duration of a quantum
rotation. attack on QKD
9.2. Use key distribution and sharing mechanisms that are
The secure quantum key distribution (QKD) formula
quantum-resistant.
determines the time difference between the secure QKD
Step 10: Continuous Monitoring and Update procedure and the possible time required for a quantum attack
on the QKD-secured key. The formula measures the security
10.1 Install an AI-driven anomaly detection system to keep
margin by expressing this variation as a proportion of the time
an eye out for security dangers in the block chain and
required by QKD to secure data. A bigger security margin
cloud environments.
highlights a stronger security posture by demonstrating that
10.2 Update access control procedures and encryption
hypothetical quantum attackers would need a lot more time to
methods frequently to stay ahead of any quantum
compromise the QKD-secured data than it did for QKD to
computing risks.
create protection.

V. WORKING AND OPERATIONS The following formula is used to determine the likelihood of
data compromise (Pcompromised)
A. Initiation and Setup
The initial phases of a project are setup and initiation. It Pcompromised=1/2n
entails developing a safe cloud architecture that includes Where,
important choices like picking a dependable Cloud Service  The likelihood of data compromise is represented
Provider (CSP). The decision about the CSP is crucial since byPcompromised.
it establishes the basic structure for data processing,  The letter ‘n’ stands for the encryption key’s bit
accessibility, and storage. In addition, configurations for data count.
storage are made during this phase, taking into account
details such data centre locations, storage types (such as We provide a comparative examination of different
databases and object storage), and storage tiers (such as hot, encryption techniques as part of our investigation into
cold, and archive). APIs, web interfaces, and strong encryption approaches in the ever-changing context of cloud
authentication and authorization procedures are just a few of computing and blockchain integration. An overview of various
the access points to the cloud infrastructure that are identified techniques is given in the table below, which takes into
account important elements including performance, quantum
B. Block chain Network Establishment resistance, and suggested use cases. Interestingly, the table
includes both newly developed post-quantum cryptographic
The creation of a consortium block chain network with
techniques like NTRUEncrypt and McEliece, as well as
defenses against quantum attacks is at the centre of the
commonly used encryption standards like AES-256 and Post-
project. Due to its scalability and adaptability, Hyper ledger
Quantum RSA. In light of our findings, this comparative
Fabric is chosen as a viable block chain platform. This
analysis seeks to highlight how encryption methods are Three important performance criteria are graphically compared
constantly changing and emphasises the critical need for in our examination of the "Cloud with Block chain"
quantum-resistant cryptographic solutions. integration: scalability, security, and efficiency. The
performance of the integration approach in each important
The distinct advantages and factors to be taken into account for
parameter is highlighted in this chart, which offers a targeted
each encryption technique are discussed, providing insightful
evaluation of its advantages. The figure is noteworthy because
information about how each fits into the intricate web of
it highlights the subtle characteristics of "Cloud with Block
blockchain security and cloud computing.
chain" and provides information about its potential for
scalability, security resilience, and efficiency. This simplified
Encryption Quantum Performanc Use Cases visual aid makes it easier to assess the integration's overall
Method Resistance e effectiveness and salient features quickly and precisely.
Aes-256 No High General
purpose
E. User Authentication and Authorization
encryption The project uses strong user authentication techniques,
such as digital signatures that can withstand quantum
Post-Quantum Partial Moderate Legacy fluctuations. Users must authenticate themselves in order to
Rsa systems,
digital
access the data. The block chain-encoded smart contract rules
signatures are rigorously compared against their credentials and
permissions.
Lattice-Based Yes Variable Quantum-safe
(Ntruencrypt) applications, The table below summarizes the essential strategies used
PQC
in our investigation of user permission and authentication
standards
inside the suggested cloud integration with block chain. A
Code-Based Yes Moderate Quantum-safe number of critical performance indicators, such as speed, false
(Mceliece) application, positive/negative rates, and overall security level, are used to
key assess the three techniques that are being presented: biometric
encapsulation scanning, PIN verification, and two-factor authentication and
digital signature. In order to contribute to a thorough
Fig.2. Different Types of Encryption Techniques knowledge of authentication dynamics in the integrated cloud
and block chain environment, this focused comparison
D. Block chain Integration attempts to highlight the advantages and factors to be taken
The use of the block chain in data management and into account for each technique.
access control is crucial. The block chain has detailed records
of the metadata for each data segment, including information Authentication Speed False False Security
on ownership and access permissions. To administer access Method (Ms) Positive Negative Level
control regulations, smart contracts—programmable pieces of Rate Rate (%)
code that carry out established rules—are used. Only (%)
authorized users are allowed access thanks to the transparent Biometric 50 0.5 1.2 Very
enforcement of access rights by these smart contracts. Scan High

100 Pin 40 1.0 0.8 High


80 Verification
60
Two-Factor 60 0.8 1.5 Moderate
40
Authenticatio
20 Efficiency n
0 security
Digital 45 0.6 1.0 High
ge ud tio
n scalability
usa clo a Signature
ct th gr
re wi te
Di In
ain br
id Fig.4. Table for Authentication Methods
kch y
oc H
Bl
F. Data Retrieval and Decryption
Fig.3. Performance of Different Variety of Block Chain Through the block chain, authorized individuals can make
Integration specific data segment requests, starting a safe and open
procedure. The block chain diligently checks these requests by
comparing them to user credentials and access control rules.
Only authorized parties are able to access the encrypted data authorized parties. This reliable process demonstrates how
after it has been authenticated by the block chain, which limits security and usability are seamlessly integrated into our
access to it. Users who have the required decryption keys may system, increasing confidence in data saved in the cloud.
then easily decode the data and gain access to it, ensuring both
the confidentiality of the data and easy accessibility for

FIG.5. DIAGRAMATIC VIEW OF ENHANCED DATA SECURITY IN CLOUD COMPUTING USING QUANTUM-SAFE BLOCKCHAIN

G. Transaction logging and key management performance in three different scenarios: block chain, cloud
All data access transactions are securely recorded on the computing combined with block chain, and cloud computing
block chain in order to ensure transparency and traceability. alone. Understanding the added value and efficacy of our
The project also emphasizes key management heavily, quantum-safe block chain technology within the cloud
encompassing techniques like key generation, secure key computing environment depends on this performance
storage, and routine key rotation. This strengthens security by comparison. In routine audits and updates, it provides
ensuring that encryption information about the effectiveness and responsiveness of the
system.
H. Regular Audits and Updates
For the purpose of identifying and reducing potential risks, 600
Response Time in ms

the project periodically undertakes security audits and 500


vulnerability assessments. It is constantly on guard, keeping
abreast of quantum-safe cryptography developments in order 400
to adjust and modernize encryption techniques as necessary. Cloud comput-
300 ing
This proactive strategy guarantees the data security system's
continued security and resilience. Blockchain
200
Blockchain plus
VI. PERFORMANCE COMPARISON cloud
100
As part of our effort to thoroughly assess the
effectiveness and efficiency of our quantum-safe block chain 0
system across several computer settings, we provide a 1 2 3 4
graphical depiction of the system's responsiveness. The graph No. of User Request
presents the quantity of user requests in relation to the time
spent in milliseconds, providing insight into how our system Fig.6. No. of User Request vs. Response time in ms
manages different workloads. Specifically, we examine the
Every computing environment in the graph offers a [9] P. Singh and S. K. Saroj, "A Secure Data Dynamics and Public
Auditing Scheme for Cloud Storage," 2020 6th International Conference
different viewpoint on system performance. To evaluate the on Advanced Computing and Communication Systems (ICACCS),
effect of this integration on system responsiveness, a block Coimbatore, India, 2020.
chain which is renowned for its strong security is compared to
[10] S. M. Sasubilli, A. K. Dubey and A. Kumar, "A computational and
another block chain that has been merged with cloud analytical approach for cloud computing security with user data
computing. The graph also displays the performance of cloud management," 2020 International Conference on Advances in
computing on its own, providing a baseline against which to Computing and Communication Engineering (ICACCE), Las Vegas,
compare. To further improve the systematic view of our NV, USA, 2020.
research, we also intend to visualize the advantages and [11] R. Kumar and M. P. S. Bhatia, "A Systematic Review of the Security in
efficiencies provided by our quantum-safe block chain Cloud Computing: Data Integrity, Confidentiality and Availability,"
2020 IEEE International Conference on Computing, Power and
technology in cloud computing by analyzing the quantity of
Communication Technologies (GUCON), Greater Noida, India, 2020
user requests handled compared to the time spent in
milliseconds. [12] G. Mathew, "Elements of application security in the cloud computing
environment," 2012 IEEE Conference on Open Systems, Kuala
VII.CONCLUSION Lumpur, Malaysia, 2012.
[13] A. Sun, G. Gao, T. Ji and X. Tu, "One Quantifiable Security Evaluation
In conclusion, this study demonstrates how quantum- Model for Cloud Computing Platform," 2018 Sixth International
safe block chain technology might improve cloud computing Conference on Advanced Cloud and Big Data (CBD), Lanzhou, China,
data security. Our strategy provides a robust foundation for 2018.
protecting cloud-stored data by integrating fine-grained access [14] G S, R., &Dakshayini, M. (2020). Block-chain Implementation of Letter
control, quantum-resistant digital signatures, and multi-factor of Credit based Trading system in Supply Chain Domain. 2020
authentication. Our technology serves as a critical barrier International Conference on Mainstreaming Block Chain Implementation
against potential weaknesses in conventional encryption (ICOMBI).
techniques as quantum computing develops. By addressing [15] V., S., Sarkar, A., Paul, A., & Mishra, S. (2019). Block Chain Based
existing security issues and preparing for the quantum era, this Cloud Computing Model on EVM Transactions for Secure Voting. 2019
research ensures data confidentiality and integrity in a 3rd International Conference on Computing Methodologies and
changing digital environment. Communication (ICCMC).

[16] Yao, Y., Chu, L., Shan, L., & Lei, Q. (2020). Supply Chain Financial
Model Innovation Based on Block-chain Drive and Construction of
VIII.REFERENCES Cloud Computing Credit System. 2020 IEEE International Conference
on Smart Internet of Things (SmartIoT).
[1] S. G. Sharma, L. Ahuja and D. P. Goyal, "Building Secure
Infrastructure for Cloud Computing Using Block chain," 2018 Second [17] Lei, K., Du, M., Huang, J., &Jin, T. (2020). Groupchain: Towards a
Scalable Public Blockchain in Fog Computing of IoT Services
[2] International Conference on Intelligent Computing and Control Systems
Computing. IEEE Transactions on Services Computing, 13(2), 252–262.
(ICICCS), Madurai, India, 2018.
[3] D. K. Tosh, S. Shetty, X. Liang, C. A. Kamhoua, K. A. Kwiat and L. [18] Xu, J., & Shi, Y. (2020). Reseach on an Innovative Digital Intelligent
Njilla, "Security Implications of Block chain Cloud with Analysis of Ecological Model Based on the BlockChain Cloud in China. 2020
Block Withholding Attack," 2017 17th IEEE/ACM International International Conference on Big Data and Informatization Education
Symposium on Cluster, Cloud and Grid Computing (CCGRID), Madrid, (ICBDIE).
Spain, 2017.
[19] Ravishankar, B., Kulkarni, P., & M V, V. (2020). Blockchain-based
[4] V. Naidu, K. Mudliar, A. Naik and P. Bhavathankar, "A Fully Database to Ensure Data Integrity in Cloud Computing Environments.
Observable Supply Chain Management System Using Block Chain and 2020 International Conference on Mainstreaming Block Chain
IOT," 2018 3rd International Conference for Convergence in Implementation (ICOMBI)
Technology (I2CT), Pune, India, 2018.
[20] Tosh, D. K., Shetty, S., Liang, X., Kamhoua, C. A., Kwiat, K. A.,
[5] V. P. Lalitha, M. Y. Sagar, S. Sharanappa, S. Hanji and R. Swarup,
&Njilla, L. (2017). Security Implications of Blockchain Cloud with
"Data security in cloud," 2017 International Conference on Energy,
Analysis of Block Withholding Attack. 2017 17th IEEE/ACM
Communication, Data Analytics and Soft Computing (ICECDS),
International Symposium on Cluster, Cloud and Grid Computing
Chennai, India, 2017
(CCGRID).
[6] D. Zhe, W. Qinghong, S. Naizheng and Z. Yuhan, "Study on Data
Security Policy Based on Cloud Storage," 2017 ieee 3rd international [21] Sanghi, N., Bhatnagar, R., Kaur, G., & Jain, V. (2018). BlockCloud:
conference on big data security on cloud (bigdatasecurity), ieee Blockchain with Cloud Computing. 2018 International Conference on
international conference on high performance and smart computing Advances in Computing, Communication Control and Networking
(hpsc), and ieee international conference on intelligent data and security (ICACCCN).
(ids), Beijing, China, 2017.
[22] Xu, Y., & Huang, Y. (2018). MWPoW - Multi-Winner Proof of Work
[7] Z. Mahmood, "Data Location and Security Issues in Cloud Computing," Consensus Protocol: An Immediate Block-Confirm Solution and an
2011 International Conference on Emerging Intelligent Data and Web Incentive for Common Devices to Join Blockchain. 2018 IEEE Intl Conf
Technologies, Tirana, Albania, 2011. on Parallel & Distributed Processing with Applications, Ubiquitous
[8] A. Markandey, P. Dhamdhere and Y. Gajmal, "Data Access Security in Computing & Communications, Big Data & Cloud Computing, Social
Cloud Computing: A Review," 2018 International Conference on Computing & Networking, Sustainable Computing & Communications.
Computing, Power and Communication Technologies (GUCON),
Greater Noida, India, 2018. [23] Wang, L., Yin, B., &Gu, K. (2018). Resource Transaction Framework
Based on Block Chain in Social Community. 2018 IEEE SmartWorld,
Ubiquitous Intelligence & Computing, Advanced & Trusted Computing,
Scalable Computing & Communications, Cloud & Big Data Computing,
Internet of People and Smart City Innovation.
.

You might also like