{"title":"使用区块链保护云原生应用程序","authors":"Pankaj Mendki","doi":"10.1109/ICICS52457.2021.9464583","DOIUrl":null,"url":null,"abstract":"Cloud computing technologies have dominated more that a decade. Wider adoption of cloud based processing has given rise to different architectural patterns. Cloud native applications have emerged out ensuring application agility and scalability. But they have their own challenges in terms of security. In the last few years, blockchain technology has found its applicability in non-cryptocurrency areas as well. This paper illustrates how blockchain can be used to address security challenges for the cloud native applications. This work focuses challenges and possible blockchain based solution in the areas of network security, identity management, authentication, container security and audit log for forensics.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Securing Cloud Native Applications Using Blockchain\",\"authors\":\"Pankaj Mendki\",\"doi\":\"10.1109/ICICS52457.2021.9464583\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing technologies have dominated more that a decade. Wider adoption of cloud based processing has given rise to different architectural patterns. Cloud native applications have emerged out ensuring application agility and scalability. But they have their own challenges in terms of security. In the last few years, blockchain technology has found its applicability in non-cryptocurrency areas as well. This paper illustrates how blockchain can be used to address security challenges for the cloud native applications. This work focuses challenges and possible blockchain based solution in the areas of network security, identity management, authentication, container security and audit log for forensics.\",\"PeriodicalId\":421803,\"journal\":{\"name\":\"2021 12th International Conference on Information and Communication Systems (ICICS)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 12th International Conference on Information and Communication Systems (ICICS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICS52457.2021.9464583\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 12th International Conference on Information and Communication Systems (ICICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICS52457.2021.9464583","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing Cloud Native Applications Using Blockchain
Cloud computing technologies have dominated more that a decade. Wider adoption of cloud based processing has given rise to different architectural patterns. Cloud native applications have emerged out ensuring application agility and scalability. But they have their own challenges in terms of security. In the last few years, blockchain technology has found its applicability in non-cryptocurrency areas as well. This paper illustrates how blockchain can be used to address security challenges for the cloud native applications. This work focuses challenges and possible blockchain based solution in the areas of network security, identity management, authentication, container security and audit log for forensics.