Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.4.16

The Blockchain-Based Decentralized Approaches for Cloud Computing to Offer Enhanced Quality of Service in terms of Privacy Preservation and Security: A Review.  

Arun Kumar, B.R. (Department of Computer Science and Engineering and Research Supervisor, VTU Research Centre, Department of MCA, BMS Institute of Technology and Management)
Komala, R (VTU Research Centre and Asst, Department of Computer Applications, REVA University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.4, 2021 , pp. 115-122 More about this Journal
Abstract
In the recent past enormous enterprise applications have migrated into the cloud computing (CC). The researchers have contributed to this ever growing technology and as a result several innovations strengthened to offer the quality of service (QoS) as per the demand of the customer. It was treated that management of resources as the major challenge to offer the QoS while focusing on the trade-offs among the performance, availability, reliability and the cost. Apart from these regular key focuses to meet the QoS other key issues in CC are data integrity, privacy, transparency, security and legal aspects (DIPTSL). This paper aims to carry out the literature survey by reflecting on the prior art of the work with regard to QoS in CC and possible implementation of block chain to implement decentralised CC solutions governing DIPTSL as an integral part of QoS.
Keywords
Block-chain technology; cloud computing; decentralized; privacy; security; transparency; trust model; quality of service;
Citations & Related Records
연도 인용수 순위
  • Reference
1 CNN, "Your car's data may soon be more valuable than the car itself," February 2017. [Online]. Available: https://money.cnn.com/2017/02/07/technology/car-data-value/index.html.
2 Zhang Q, Cheng L, Boutaba R: Cloud computing: state-of-theart and research challenges. J Internet Serv Appl 2010, 1(1):7-18. 10.1007/s13174-010-0007-6.   DOI
3 Ardagna, D., Casale, G., Ciavotta, M. et al. Quality-of-service in cloud computing: modeling techniques and their applications. J Internet Serv Appl 5, 11 (2014). https://doi.org/10.1186/s13174-014-0011-3.   DOI
4 Prerita Gupta , Dr. Harmunish Taneja and Dr. Gagandeep Singh Brar , Quality of Services in Cloud Computing: Issues, Challenges and Analysis, ISSN : 2319-6319, International Journal of New Innovations in Engineering and Technology, Volume 3 Issue 3 - July 2015, page no. 76-81.
5 Isaac Odun-Ayo, Member, IAENG, Olasupo Ajayi, and Adesola Falade, Cloud Computing and Quality of Service: Issues and Developments, Proceedings of the International MultiConference of Engineers and Computer Scientists 2018 Vol I, IMECS 2018, March 14-16, 2018, Hong Kong, ISBN: 978-988-14047-8-7, ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online).
6 Gmach D, Rolia J, Cherkasova L, Kemper A (2007) Workload analysis and demand prediction of enterprise data center applications. In: Proceedings of the 2007 IEEE 10th International Symposium on Workload Characterization, IISWC '07, 171-180, Boston, MA, USA.
7 Anish Jaipuriar , Ashutosh Nagar , Varun Kalway and Sayantika Ganguly, India: Blockchain And Data Privacy: An India Perspective, 24 August 2020, https://www.mondaq.com/india/fin-tech/978488/blockchainand-data-privacy-an-india-perspective.
8 F. Mattern and C. Floerkemeier, "From the Internet of Computers to the Internet of Things," Distributed Systems Group, Institute for Pervasive Computing, ETH Zurich, 2010.
9 Gartner, "Gartner Forecasts Worldwide Public Cloud Revenue to Grow 21.4 Percent in 2018," April 2018. [Online]. Available: https://www.gartner.com/en/newsroom/pressreleases/2018-04-12-gartner-forecasts-worldwide-publiccloud-revenue-to-grow-21-percent-in-2018.
10 IDC, "Worldwide Semiannual Internet of Things Spending Guide,"[Online]. Available: https://www.idc.com/getdoc.jsp?containerId=IDC_P29475.
11 Di S, Kondo D, Walfredo C (2012) Host load prediction In a google compute cloud with a Bayesian model. In: Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, SC12, 1-11, Salt Lake City, Utah, USA.
12 B. Schneier, "Should Companies Do Most of Their Computing in the Cloud?," June 2015. [Online]. Available: https://www.schneier.com/blog/archives/2015/06/should_companie.html.
13 Ardagna D, Panicucci B, Trubian M, Zhang L: Energy-aware autonomic resource allocation in multitier virtualized environments. IEEE Trans Serv Comput 2012, 5(1):2-19. 10.1109/TSC.2010.42.   DOI
14 Khan A, Yan X, Shu T, Anerousis N (2012) Workload characterization and prediction in the cloud: A multiple time series approach. In: Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012, 1287-1294, Maui, HI, USA.
15 Mattia Mrvosevic, Blockchain Based Decentralised Cloud Computing: Overview and Use Cases, https://medium.com/@eternacapital/blockchain-baseddecentralised-cloud-computing-277f307611e1.
16 Chapter Six - Protecting personal sensitive data security in the cloud with blockchain, https://www.sciencedirect.com/science/article/pii/S006524582030084X
17 A. S. De Pedro, D. Levi and L. I. Cuende, "Witnet: A Decentralized Oracle Network Protocol," November 2017. [Online]. Available: https://witnet.io/static/witnetwhitepaper.pdf.
18 Caixia Yang, Liang Tan, Na Shi, Bolei Xu, Yang Cao, Keping Yu, AuthPrivacyChain: A Blockchain-Based Access Control Framework with Privacy Protection in Cloud, https://waseda.pure.elsevier.com/en/publications/authprivacychain-a-blockchain-based-access-control-framework-with.
19 SPECIAL SECTION ON CLOUD - FOG - EDGE COMPUTING IN CYBER-PHYSICAL-SOCIAL SYSTEMS (CPSS) Received January 17, 2020, accepted January 27, 2020, date of publication January 30, 2020, date of current version February 10, 2020. Digital Object Identifier 10.1109/ACCESS.2020.2970576 Smart Contract Privacy Protection Using AI in Cyber-Physical Systems: Tools, Techniques and Challenges .
20 https://juliankoh.medium.com/introduction-to-privacypreserving-smart-contracts-e7bdc1a121b1. The different methods include Trusted Execution Environments (TEE).
21 Information Age, "Moving from central to the edge: Is cloud decentralisation inevitable?," June 2018. [Online]. Available: https://www.information-age.com/clouddecentralisation-inevitable-123472539/.
22 Cloud Academy, "Disadvantages of Cloud Computing," June 2018. [Online]. Available: https://cloudacademy.com/blog/disadvantagesof-cloud-computing/.
23 Gartner, "Cloud Computing Tops List of Emerging Risks," September 2018. [Online]. Available: https://www.gartner.com/smarterwithgartner/cloud-computing-tops-list-of-emerging-risks/.
24 Gartner, "Top 10 Technology Trends Impacting Infrastructure & Operations for 2018," December 2017. [Online]. Available: https://www.gartner.com/smarterwithgartner/top10-technology-trends-impacting-infrastructure-operationsfor-2018/.
25 S. Ellis, A. Juels and S. Nazarov, "ChainLink - A Decentralized Oracle Network," September 2017. [Online]. Available: https://link.smartcontract.com/whitepaper.
26 Bull G (2001) Data protection safe harbor: transferring personal data to the USA. Comput Law Secur Rev 17(4):239-243   DOI
27 Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M: A view of cloud computing. Commun ACM 2010, 53(4):50-58. 10.1145/1721654.1721672.   DOI
28 C. Song, S. Wu, S. Liu, R. Fang and Q.-L. Li, "ANKR - Build a Faster, Cheaper, Securer cloud using idle processing power in data centers and edge devices," [Online]. Available: https://www.ankr.network/.
29 US Privacy Protection Study Commission (1977) Personal Privacy in an Information Society-the Report of the Privacy Protection Study Commission, https://epic.org/privacy/ppsc1977report/
30 Directive EU (1995) 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J EC 23(6), https://eurlex.europa.eu/legalcontent/EN/TXT/?uri=celex%3A31995L0046.
31 De Hert P, Papakonstantinou VN, Kamara I (2014) The new cloud computing ISO/IEC 27018 standard through the lens of the EU legislation on data protection. It should be noted that privacy is worst in CC with many concerns and problems. The cloud service provider (CSP) is responsible for implementing privacy well within the framework of user requirements with legal standards.
32 Deepak K. Tosh ,Sachin Shetty ,Xueping Liang ,Charles A. Kamhoua ,Kevin A. Kwiat and Laurent Njilla, Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack,Year: 2017, Volume: 1, Pages: 458-467, DOI Bookmark:10.1109/CCGRID.2017.111   DOI
33 R. Brundo Uriarte and R. De Nicola, "Blockchain-Based Decentralised Cloud/Fog Solutions: Challenges, Opportunities and Standards," September 2018. [Online]. Available: https://www.researchgate.net/publication/326346449_BlockchainBased_Decentralised_CloudFog_Solutions_Challenges_Opportunities_and_Standards.
34 A. Yakovenko, "Solana: A new architecture for a high performance blockchain," [Online]. Available: https://solana.com/solana-whitepaper.pdf.
35 Gaetani, Edoardo, Aniello, Leonardo, Baldoni, Roberto, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro (2017) Blockchain-based database to ensure data integrity in cloud computing environments. Italian Conference on Cybersecurity, Italy. 17 - 20 Jan 2017. 10 pp ., http://ceurws.org/Vol-1816/paper-15.pdf, PP.146-155, https://eprints.soton.ac.uk/411996/
36 Mimik, "As networks choke, edge cloud is the saviour," July 2017. [Online]. Available: https://mimik.com/as-networkchokes/.
37 The Future of Cloud Computing: Blockchain Will Have Its Day By Harsh Arora and Archi Bhatia on May 1, 2019, https://www.dataversity.net/the-future-of-cloud-computingblockchain-will-have-its-day/
38 T. Hanke, M. Movahedi and D. Williams, "Dfinity - The Internet Computer," [Online]. Available: https://dfinity.org/faq/.
39 Gartner Says Worldwide IaaS Public Cloud Services Market Grew 37.3% in 2019, https://www.gartner.com/en/newsroom/press-releases/2020-08-10-gartner-says-worldwide-iaas-public-cloud-services-marketgrew-37-point-3-percent-in-2019.
40 Christy Pettey, Cloud Shift Impacts All IT arkets,https://www.gartner.com/smarterwithgartner/cloud-shiftimpacts-all-it-markets/,October 26, 2020
41 Ghorbel, A., Ghorbel, M. & Jmaiel, M. Privacy in cloud computing environments: a survey and research challenges. J Supercomput 73, 2763-2800 (2017). https://doi.org/10.1007/s11227-016-1953-y   DOI
42 O. Vermesan and P. Friess, "Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems," 2013. [Online]. Available: http://www.internetof-thingsresearch.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf.
43 Cisco, "Cisco Global Cloud Index: Forecast and Methodology, 2016-2021 White Paper," Cisco, 2018.
44 T. Hanke, M. Movahedi and D. Williams, "DFINITY Technology Overview Series - Consensus Mechanism," [Online]. Available: https://assets.ctfassets.net/ywqk17d3hsnp/2C8QU0x3q4AwuYYU4qiEmo/fb575987ca36672152a47b83ec96c0fc/dfinity-consensus.pdf.
45 Amir Teshome, Sean Peisert, Louis Rilling, and Christine Morin, "Blockchain as a Trusted Component in Cloud SLA Verification", UCC '19 Companion, December 2-5, 2019, Auckland, New Zealand © 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-7044-8/19/12. . . $15.00 https://doi.org/10.1145/3368235.3368872, https://escholarship.org/content/qt2r60s6b5/qt2r60s6b5.pdf?t=q87lqj.   DOI
46 Mehdi Sookhak, Abdullah Gani, Hamid Talebian, Adnan Akhunzada, Samee U. Khan, Rajkumar Buyya, and Albert Y. Zomaya. Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues. ACM Comput. Surv., 47(4):65:1-65:34, May 2015.
47 Losavio, Michael and Pavel Pastukhov, and Svetlana Polyakova. "Regulatory Aspects of Cloud Computing in Business Environments." In Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments. edited by S. Srinivasan, 156-169. Hershey, PA: IGI Global, 2014. http://doi:10.4018/978-1-4666-5788-5.ch009.   DOI
48 Igor Zikratov, Alexander Kuzmin, Vladislav Akimenko, Viktor Niculichev, Lucas Yalansky Ensuring Data Integrity Using Blockchain Technology, PROCEEDING OF THE 20TH CONFERENCE OF FRUCT ASSOCIATION, 534-539,