Abstract

In 2006, cloud computing existed after Amazon’s deployment of the first of its category of cloud services. Cloud computing is now simply the topmost in every record of existing theme as a research topic, for computer science in view of the fact that of its across-the-board implications in various areas in computing and which has become present day’s most recent research area because of its capability to decrease the operational costs linked with computing. A rapid growth in cloud computing adaption has been observed but, still, the data security concerns have not been fully countered. Data security anxiety is still an obstacle to the expansion of cloud computing to some extent and needs to be determined. Earlier we have used techniques for cloud environment security in our research work like two-factor authentication (OTP), AES algorithm, RSA cryptography, elliptic curve cryptography (ECC), hyperelliptic curve cryptography (HECC), homomorphic encryption, steganography, usage control (UCON) collective with encryption and the digital watermarking technology. Apart from used techniques, blockchain has come into view as a key technology to ensure security particularly in aspects of authenticity confidentiality and integrity. Therefore, this time we have selected blockchain technology to avoid the security concerns of the cloud environment. This time we will review the various features of security in blockchain and further analyze the application of blockchain in cloud environment for computing security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call