An in-depth and systematic literature review on the blockchain-based approaches for cloud computing

J Gong, NJ Navimipour - Cluster Computing, 2022 - Springer
Cloud computing enables businesses to decrease the total costs by outsourcing their
required services. Therefore, it provides a new challenge of data protection regarding …

Blockchain-empowered data-driven networks: A survey and outlook

X Li, Z Wang, VCM Leung, H Ji, Y Liu… - ACM Computing Surveys …, 2021 - dl.acm.org
The paths leading to future networks are pointing towards a data-driven paradigm to better
cater to the explosive growth of mobile services as well as the increasing heterogeneity of …

Electronic regulation of data sharing and processing using smart ledger technologies for supply-chain security

G Epiphaniou, P Pillai, M Bottarelli… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Traditional centralized data storage and processing solutions manifest limitations with
regards to overall operational cost and the security and auditability of data. One of the …

A secure and efficient log storage and query framework based on blockchain

W Li, Y Feng, N Liu, Y Li, X Fu, YT Yu - Computer Networks, 2024 - Elsevier
Log data is crucial for security threat detection and audit analysis. However, traditional log
systems are susceptible to tampering, posing a significant security risk to information …

A map** review of literature on Blockchain usage by libraries: Challenges and opportunities

M Safdar, S Qutab, FS Ullah… - … of Librarianship and …, 2023 - journals.sagepub.com
The Library and Information Science (LIS) community has started discussing some possible
uses of Blockchain (BC) technologies in solving library-related problems and increasing the …

Edublock: Securing educational documents using blockchain technology

P Haveri, UB Rashmi, DG Narayan… - 2020 11th …, 2020 - ieeexplore.ieee.org
Bitcoin and Cryptocurrencies are the most popular and the earliest applications of
Blockchain. A Blockchain is a public ledger that is distributed and decentralized and it is …

Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms

M Bakro, SK Bisoy, AK Patel, MA Naal - Blockchain based Internet of …, 2022 - Springer
Due to the high growth of Internet of Things and cloud computing services it has brought
great changes within the human lifestyle in various fields such as (medical, agricultural …

Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle

CJ Chew, WB Lee, TH Chen, IC Lin… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The rise of cybercrime has led to an explosion of threats in recent years, resulting in the
increasingly important of digital forensics. To achieve successful investigation and …

Proml: A decentralised platform for provenance management of machine learning software systems

N Khoi Tran, B Sabir, MA Babar, N Cui… - … Conference on Software …, 2022 - Springer
Abstract Large-scale Machine Learning (ML) based Software Systems are increasingly
developed by distributed teams situated in different trust domains. Insider threats can launch …

Technique for improvement of backup and restore strategy based on blockchain

S Sokolov, S Vlaev, TB Iliev - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
In this paper a technique is presented for improving backup restoration strategy efficiency by
using efficient backup strategies and blockchain technologies. An overview is provided of …