Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Cloud Computing Security Using Blockchain Technology - 2021

Cloud Computing Security Using Blockchain Technology

Research paper on Cloud Computing Security Using Blockchain Technology

Research Area:  Cloud Security

Abstract:

In 2006, cloud computing existed after Amazon’s deployment of the first of its category of cloud services. Cloud computing is now simply the topmost in every record of existing theme as a research topic, for computer science in view of the fact that of its across-the-board implications in various areas in computing and which has become present day’s most recent research area because of its capability to decrease the operational costs linked with computing. A rapid growth in cloud computing adaption has been observed but, still, the data security concerns have not been fully countered. Data security anxiety is still an obstacle to the expansion of cloud computing to some extent and needs to be determined. Earlier we have used techniques for cloud environment security in our research work like two-factor authentication (OTP), AES algorithm, RSA cryptography, elliptic curve cryptography (ECC), hyperelliptic curve cryptography (HECC), homomorphic encryption, steganography, usage control (UCON) collective with encryption and the digital watermarking technology. Apart from used techniques, blockchain has come into view as a key technology to ensure security particularly in aspects of authenticity confidentiality and integrity. Therefore, this time we have selected blockchain technology to avoid the security concerns of the cloud environment. This time we will review the various features of security in blockchain and further analyze the application of blockchain in cloud environment for computing security.

Keywords:  
Cloud computing
Blockchain
E-wallet
Security
Cloud services
Cryptography
Authentication

Author(s) Name:  Santosh Kumar Singh, P. K. Manjhi & R. K. Tiwari

Journal name:  Transforming Cybersecurity Solutions using Blockchain

Conferrence name:  

Publisher name:  Springer

DOI:  10.1007/978-981-33-6858-3_2

Volume Information: