K. Meenakshi, S. Sivasubramanian, B. Bharathi, S. John, Justin Thangaraj
{"title":"Cloud Security Analysis using Blockchain Technology","authors":"K. Meenakshi, S. Sivasubramanian, B. Bharathi, S. John, Justin Thangaraj","doi":"10.1109/ICECAA58104.2023.10212415","DOIUrl":null,"url":null,"abstract":"Cloud computing is now widely employed across a variety of IT-related fields. It has become an essential technology to address infrastructure and data service requirements with minimal effort, low-cost, and with a high degree of scalability. Although the use of cloud computing has increased significantly, information security concerns have not yet been fully resolved. There are still certain information security concerns that must be resolved in order for cloud computing to advance. In terms of integrity, authenticity, and secrecy, in particular, Blockchain has developed into an essential security instrument. The application of Blockchain in cloud computing security is further examined in this article after a review of the different security concerns in blockchain and cloud computing. The main challenge in the cloud computing is cloud computing security. Because data in the cloud must be transported via the Internet, data security becomes a top priority. It is necessary to maintain the primary data protection methods, such as integrity, accountability, privacies, access controls, authentications, and authorizations. Blockchain is a technological advancement that enhances cloud computing. Blockchain resolves cloud computing security problems. This study seeks to analyze and contrast various cloud environment security challenges with blockchain security difficulties.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECAA58104.2023.10212415","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud computing is now widely employed across a variety of IT-related fields. It has become an essential technology to address infrastructure and data service requirements with minimal effort, low-cost, and with a high degree of scalability. Although the use of cloud computing has increased significantly, information security concerns have not yet been fully resolved. There are still certain information security concerns that must be resolved in order for cloud computing to advance. In terms of integrity, authenticity, and secrecy, in particular, Blockchain has developed into an essential security instrument. The application of Blockchain in cloud computing security is further examined in this article after a review of the different security concerns in blockchain and cloud computing. The main challenge in the cloud computing is cloud computing security. Because data in the cloud must be transported via the Internet, data security becomes a top priority. It is necessary to maintain the primary data protection methods, such as integrity, accountability, privacies, access controls, authentications, and authorizations. Blockchain is a technological advancement that enhances cloud computing. Blockchain resolves cloud computing security problems. This study seeks to analyze and contrast various cloud environment security challenges with blockchain security difficulties.