Author:
Sai Dasarath Kakumanu,Sai Pranith Kotti Durga,Leela Balaji Kotra,Sena Reddy B.V.A Bheema,Bindu Garikapati
Abstract
Data plays a crucial role in today's world, guiding business decisions across various computer- assisted activities. Maintaining the integrity of data is vital, as any tampering could have serious consequences for important business decisions. This concern is particularly significant in cloud computing settings, where data owners have limited control over key aspects like physical storage and access control. Blockchain technology has emerged as an intriguing solution to address data integrity concerns. With its inherent properties, blockchain offers promising avenues for ensuring data integrity. However, some challenges need to be overcome, such as low throughput, high latency, and stability issues, which currently limit the practical implementation of blockchain-based solutions. we focus on a case study from the European SUNFISH project, which aims to develop a secure cloud federation platform for the public sector. We examine the specific data integrity requirements in cloud computing environments and identify the research questions that need to be addressed to implement blockchain-based databases effectively. We start by outlining the open research questions and the inherent difficulties associated with addressing them. Then, we propose a preliminary design for a blockchain-based database tailored to cloud computing environments. This design aims to leverage the strengths of blockchain technology while addressing the challenges unique to cloud computing. By addressing these research questions and proposing practical solutions, we aim to pave the way for the adoption of blockchain-based databases in cloud computing environments. This has the potential to enhance data integrity and security, ultimately benefiting organizations operating in the cloud.
Publisher
International Journal of Innovative Science and Research Technology
Reference31 articles.
1. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and Communications security, pages 598–609. ACM, 2007.
2. Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A Kroll, and Edward W Felten. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy, pages 104–121. IEEE, 2015.
3. George Danezis and Sarah Meiklejohn. Centrally Banked Cryptocurrencies. In 23rd Annual Network and Distributed System Security Symposium, NDSS, 2016.
4. ENISA. Security Framework for Governmental Clouds, 2015. Available at https://www.enisa.europa.eu/activities/Resi lience-and-CIIP/cloud-computing/ governmental-cloud-security/securityframework-for-govenmental-clouds.
5. Ittay Eyal, Adem Efe Gencer, Emin G¨un Sirer, and Robbert Van Renesse. Bitcoin-NG: A scalable blockchain protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pages 45–59, 2016.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Smart Irrigation with Intrusion Detection;International Journal of Innovative Science and Research Technology (IJISRT);2024-05-23