A survey of blockchain consensus protocols

J Xu, C Wang, X Jia - ACM Computing Surveys, 2023‏ - dl.acm.org
Blockchain consensus protocols have been a focus of attention since the advent of Bitcoin.
Although classic distributed consensus algorithms made significant contributions to the …

A comprehensive review of blockchain consensus mechanisms

B Lashkari, P Musilek - IEEE access, 2021‏ - ieeexplore.ieee.org
Since the advent of distributed ledger technologies, they have provided diverse
opportunities in a wide range of application domains. This article brings a comprehensive …

Blockchain for AI: Review and open research challenges

K Salah, MHU Rehman, N Nizamuddin… - IEEE …, 2019‏ - ieeexplore.ieee.org
Recently, artificial intelligence (AI) and blockchain have become two of the most trending
and disruptive technologies. Blockchain technology has the ability to automate payment in …

Blockchain for smart communities: Applications, challenges and opportunities

S Aggarwal, R Chaudhary, GS Aujla, N Kumar… - Journal of Network and …, 2019‏ - Elsevier
Since the success of Bitcoin, there have been increased focus of studying the application of
blockchain in a broad range of applications, such as in solutions facilitating identity privacy …

A survey of consensus algorithms in public blockchain systems for crypto-currencies

MS Ferdous, MJM Chowdhury, MA Hoque - Journal of Network and …, 2021‏ - Elsevier
In recent years, crypto-currencies (a form of decentralised digital currencies) have been
quite popular as an alternative form of payments. They are underpinned by a breakthrough …

Data security and privacy protection issues in cloud computing

D Chen, H Zhao - 2012 international conference on computer …, 2012‏ - ieeexplore.ieee.org
It is well-known that cloud computing has many potential advantages and many enterprise
applications and data are migrating to public or hybrid cloud. But regarding some business …

Enabling public auditability and data dynamics for storage security in cloud computing

Q Wang, C Wang, K Ren, W Lou… - IEEE transactions on …, 2010‏ - ieeexplore.ieee.org
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise.
It moves the application software and databases to the centralized large data centers, where …

ZeroTrace: Oblivious memory primitives from Intel SGX

S Sasy, S Gorbunov, CW Fletcher - Cryptology ePrint Archive, 2017‏ - eprint.iacr.org
We are witnessing a confluence between applied cryptography and secure hardware
systems in enabling secure cloud computing. On one hand, work in applied cryptography …

Privacy-preserving public auditing for secure cloud storage

C Wang, SSM Chow, Q Wang, K Ren… - IEEE transactions on …, 2011‏ - ieeexplore.ieee.org
Using cloud storage, users can remotely store their data and enjoy the on-demand high-
quality applications and services from a shared pool of configurable computing resources …

Proofs of space

S Dziembowski, S Faust, V Kolmogorov… - Annual Cryptology …, 2015‏ - Springer
Proofs of work (PoW) have been suggested by Dwork and Naor (Crypto'92) as protection to
a shared resource. The basic idea is to ask the service requestor to dedicate some non …