{"title":"Blockchain To Secure Cloud computing services","authors":"Sushmita Goswami, Dipesh Uike, Sujeet Patil, Yashasvi Thakur, S. Akram, Kumud Pant","doi":"10.1109/AISC56616.2023.10085060","DOIUrl":null,"url":null,"abstract":"The fast progress of technology has led to a rise in recent decades in privacy and cyberattack issues. This effort focuses on job in keeping and anonymity-enhancing safe cloud computing services using a blockchain named. It is developed with two features—anonymous files and searches for illegally submitted content. On, cloud users may identify all users inside the application layer and access data using payment systems. Analysis is done on how well three different implementations pure ledger, composite block chain with a cache and a convention database—perform when it comes to obtaining data. The results show that the work with the caches beats the pure network and the conventional by 50% and 53.19 percent, respectfully.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AISC56616.2023.10085060","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The fast progress of technology has led to a rise in recent decades in privacy and cyberattack issues. This effort focuses on job in keeping and anonymity-enhancing safe cloud computing services using a blockchain named. It is developed with two features—anonymous files and searches for illegally submitted content. On, cloud users may identify all users inside the application layer and access data using payment systems. Analysis is done on how well three different implementations pure ledger, composite block chain with a cache and a convention database—perform when it comes to obtaining data. The results show that the work with the caches beats the pure network and the conventional by 50% and 53.19 percent, respectfully.