Blockchain and Cloud Computing-A Review

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), 26-27 May 2022.

Blockchain and Cloud Computing- A Review


2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON) | 978-1-6654-9602-5/22/$31.00 ©2022 IEEE | DOI: 10.1109/COM-IT-CON54601.2022.9850499

Simran Bhari1, Suhail Javed Quraishi2


1,2
AIT - Computer Science & Engineering, Chandigarh University, Mohali, India
1
simranbhari20@gmail.com
2
suhail.e11364@cumail.in

Abstract- Blockchain is a technical breakthrough being investigated computing" refers to a network of servers that is accessible
by academics and business across a variety of applications, over the internet. It stores, manages, and processes
encompassing cryptocurrencies, financial businesses, Internet of information. The phrase "cloud computing technology" refers
things, 5G, risk evaluation, and financial and commercial services. to a broad range of services.[13] In cloud computing, the
Cloud technology, on the other hand, is ushering in the Digital Realm
and quickly becoming the most fashionable topic in IT. Cloud
fundamental purpose is to calculate the essential portals:
computing, on the other hand, is plagued by a lack of attention, Processor, random access storage, memory, and internet
respect, and responsibility. Blockchain, with its innovative connectivity. Typically, cloud computing offers three sorts of
characteristics such as autonomy and immutability, adds services: Software as a Service (SaaS) refers to applications
dependability and authenticity to cloud technology.This research that are built for users and are provided through the internet.
examines the literature on Blockchain-based enterprise solutions Platform as a Service (PaaS) refers to a collection of
published between 2008 and 2021. The following manuscript focuses equipment and resources that enable the rapid and effective
on the technological integration of Blockchain technology and cloud design and deployment of such apps. Infrastructure as a
infrastructure, as well as the current achievements in the field of Service refers to the gear and technology that power
Cryptocurrency cloud technology. To Be precise, we split the
information into three categories: Blockchain employing IaaS,
everything - processors, memory, internet, and software
Blockchain employing PaaS, and Blockchain employing SaaS. We'll platforms. Privacy considerations particularly when sensitive
start with a look at a few Blockchain characteristics and how they information is being managed. Of course, everything with
relate to cloud services. Then we provide our study methods, as well internet connection is not completely secure, and even servers
as a detailed analysis of important background information. with impenetrable security are vulnerable to assaults. We work
Following that, we describe cutting-edge studies in Ledger storage- on the Cloud Computing SaaS architecture here. Because of
as-a-service, strategy creation, computation-as-a-service, data security concerns, many users are migrating to the public
aggregation-as-a-service, microservice-as-a-service, and Acquired by cloud. A cloud-based record can be hacked since it is
extraction.The report concludes with the current issues in Blockchain vulnerable to attacks.[15] Many servers now function as
based cloud technology, their expected obstacles, and potential
studies and opportunities. We believe that research shall give a
nodes. The article proposes a resolution in the form of
complete knowledge of the legitimacy of Blockchain based cloud Blockchain, a decentralized technology. The Blockchain
technology and will contribute in the creation of the future cloud concept is now used in crypto-currency - Bitcoin, a digital
computing environment. money. In the following section of the paper, we explain
blockchain, and then in section 4 we look at the strategy and
KeyWords - Blockchain Technology, Cryptocurrencies, computation- method to building a safe cloud network using blockchain.
as-a-service, data aggregation-as-a-service, microservice-as-a- Blockchain technology is an integral part of industries that are
service, Cloud Computing. striving for advancements in security and privacy. Blockchain
is a type that maintains important information in the matter of
I. INTRODUCTION a network with really no central authority. Nodes are the
Cloud computing is a leading technology that participants or gadgets in the blockchain system. Blockchain
originated from virtualization. Cloud services aim to limit the establishes a distributed system in which all nodes in the
application burden upon customers.[1] There are plenty of network actively engage in data testing. Cryptography will be
benefits, including decreased equipment and repair costs, used to encrypt the data that is saved on the blockchain. Each
reason for utilization, adjustability among automatic systems, block has an encoded cipher, a timestamp, and the block
and simple scaling. IBM, Google and Amazon are among the header contained in the connection by which the block will
big organizations that have embraced cloud computing. connect. As a result, information just on digital ledgers is
However some apps are adaptations, such as Google App immutable. Ledger encrypts files, and clients will be approved
Engine, Google Cloud Platform, Aws Cloud, Elastic in the channel, lowering confidentiality worries.[16] To
Computing Platform, and so forth. It features a pay per use encourage the growth of cloud computing, we may address
philosophy and a customizable Technology framework that is confidentiality issues by incorporating distributed ledger. This
available online via mobile devices. Demonstrated by the fact enhances security of information and availability of service, as
that this platform provides a plethora of helpful services, well as the management of cloud data.
corporations are often hesitant to utilize it owing to security
issues.[20] The primary disadvantages of confining the cloud
include security issues and cloud restrictions. "Cloud

978-1-6654-9602-5/22/$31.00 ©2022 IEEE 766


Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SURATHKAL. Downloaded on November 08,2023 at 17:15:51 UTC from IEEE Xplore. Restrictions apply.
A. Cloud Computing Nakamoto."[7] He just released a paper titled "Bitcoin: Peer -
There are several websites that are maintained via the web To - Peer Electronic Cash System," which allows us to
in the present digital era. The hosted site is anticipated to be conduct straight contactless transactions between one client to
handled by a stack of servers, which is highly expensive. The another without the use of a third party.[5] The e-cash system
processors' visitation rate must be consistent, and they must be considerably tackles the problem of double-spending money,
checked and maintained to ensure.[12] Furthermore, given to the electronic currency's capacity to be readily
additional personnel are required to arrange and maintain reproduced or expended more than once. The challenge is
these servers. This data will be stored in cloud services. As a handled by tamper-resistantly associating each activity with a
result, our continued efforts to handle the server problem as unique entity. The public blockchain is being used to
well as the person may divert our attention away from seamlessly connect transactions. When we compare
achieving business objectives. To lessen this rigorous upkeep, Blockchain to Bitcoin, we see blockchain is a system that
users are employing “Cloud based applications”. Cloud other cryptocurrencies, such as bitcoin, use for safe and
computing is a means of constructing a web infrastructure of unknown transactions. This is a decentralized, accessible
numerous computers to analyze and interpret records from blockchain used to swiftly or persistently record agreements.
anywhere in the globe. This is utilized to replace a virtual "Blockchain is an unbreakable record for maintaining track of
machine or a system. Cloud based utilities, similar as file financial operations that can be configured to hold anybody
storage and software delivery, supplied to establishment who has a value, not only financial transactions."[17]
devices over the internet. Cloud computing provides several Whenever we employ Distributed ledger, so no need for
benefits by connecting computer networks, resources, and government involvement, and consensus confirmation
devices over the internet. The utilities are based on payment eliminates any fraud. By eliminating the requirement for a
per usage regulations. Such utilities are rendered anywhere third party, quick payments may be done without paying
worldwide also with considerably lower price transactions, transaction costs. These traits gain greater productivity.
boosting teamwork. The cloud's program will be constantly Regardless of having various benefits, distributed ledger has
updated, allowing the cloud to be readily operated. The major negatives, like it being very volatile. Because
ordinary client will also retain ownership of the documents unidentified actions are detectable by the individual and
stored in the cloud. It even has certain limitations.[6] Although perhaps nodes far from the network, there is risk of an
data in the cloud is so flexible, there are various encryption increase in communal crime.
and confidentiality challenges that must be tackled, along with
II. SECURITY WITHIN CLOUD
breaches. Many activities are offered through the cloud, and
are categorized. Firstly, is Software as a Service, which is Cloud computing is often reviewed owing to its CIA triad,
really a product that is hosted and delivered to clients through particularly the customer’s identity should be kept reserved to
the internet. The Cloud platform offers entire programmes and prevent the information from monetary destruction. We can
initiatives as a unified interface of programs working in the secure the privacy of users’ data by integrating the blockchain
cloud, delivering a scope of solutions to a big number of system with cloud technology. As discussed, when distributed
clients. The cloud infrastructure is not accessible to cloud ledger is used, a digital wallet is implemented, and when users'
services. SaaS examples include Amazon internet services, data is no longer necessary, the data must be erased. The
SalesForce.com, and Google Mail. The second choice is PaaS. blockchain is used to wipe the user's data via cloud
We may deploy our software and scripting language suites computing. On aspects of purity, complexity, and secrecy, the
within the platform thanks to the cloud service provider. The approach varies from existing studies. Integrity guarantees that
distinction in Software as a Service and Platform as a Service the user-supplied data used in transactions is not modified or
is that Software as a Service performs the full program on the manipulated without the user's permission.[10] The lack of
cloud, whereas Platform as a Service offers a program visibility ensures that the affiliates' transfer of money are not
framework. Google search engine is an instance of Platform as identified. The user's information is preserved and hidden to
a Service. The next utility is Infrastructure as a Service, which the greatest extent possible by solitariness. Following
enables clients to authenticate memory, processor, and several authentication, we send a verification between both the digital
virtual servers. Virtualization is used in Infrastructure as a wallet and the network. Following encryption using a shared
Service to disperse equipment in order to fulfill the resource secret key, the ledger data, including timestamps between
demands of cloud clients.[8] The ideal virtualization strategy them, is sent.[23] Whenever the customer verification has
is to build distinct VMs that are isolated from either the actual been provided, we effectively cleanse the e-wallet, ensuring
machine or other Vm. They supply servers with multiple IP the confidentiality of the customer's details, with the
addresses to guarantee security. The most prominent example remaining information being destroyed when the service is
of IaaS is Amazon EC2, Go Grid. ended. As soon as the last communication is directed, the e-
wallet securely decouples the customer's data. By permitting
B. Blockchain the usage of electronic wallets, users' records can be
The creation of Blockchain technology coincided completely deleted, and assurance of information leak
with the introduction of Bitcoin. Bitcoin is a virtual currency avoidance is abolished. Blockchain technology might be used
invented in 2008 by a fake identity known as "Satoshi to remove a person's cloud computing data. If we are wiping

767
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SURATHKAL. Downloaded on November 08,2023 at 17:15:51 UTC from IEEE Xplore. Restrictions apply.
the data, we must also include a level of adhesive recovery, because the larger
rger the number of blockchain nodes, the more
which includes verifying the dual identification
ation and preserving difficult it is to manipulate the data. This blockchain solution
the recovered customer's existing data. A 51 percent assault is to the security and legal issues in the cloud forensic quandary
a group of miners who control more than half of the comes at a cost. The widespread distribution of blockchain
calculating capacity. Until more than a majority of nodes ledgers adds performance ce costs. i.e. increased latency
assisting with payments are corrupt, users will be succeeding problems. Key management and cryptography are not strong
in contaminating the network as well as changing the in cloud computing, as the cloud virtual environment may be
transaction in the blockchain. The 51 percent attack has the hacked and its instances can be managed with escalated
potential to compromise the data or transactions of the user's rights.[2] This challenge may be overcome by consensus
consen and
integrity by altering 50 % share of the ledger. It also does not cryptography techniques given by blockchain to enable secure
ensure security
ty for the user's leftover information since it does identity management, authentication, validation of user
not check correct electronic wallet disposal.[22] In electronic authentication, as well as authorization to access and use cloud
wallets, the security protection and erasure of leftover user services and billing for cloud usage using smart contracts. The
information are properly eliminated. benefits
nefits of this technology on its own, as well as when paired
with certain other technologies, provide a multitude of
advantages.
III. RELATIONSHIPS B/W BLOCKCHAIN AND CLOUD
LOUD COMPUTING
The fundamental difficulty of cloud computing, that is
confidentiality, is ministered to when cloud computing is
integrated with h blockchain technology.[18] So according to
Forbes, in 2021, 64 percent of those surveyed estimate that the
largest cloud security concern is data loss/leakage.[14]
Encryption of information accounts for the confidentiality and
secure databases that blockchain
chain delivers. Also according to
the Statistics research, 44 percent of those surveyed regard
accessibility as a severe concern to cloud security as well.
Blockchain involves establishing a decentralized network trust
paradigm that gives more visibility. Public blockchain allows
every action to be visible and removes the restriction of info.
Data once saved on the blockchain cannot be just modified by
anybody. Whitewashing data from anyone’s computer on a
blockchain network does not affect the data kept on other
devices in the network, hence assuring no data loss and
authenticity.

It gives the user control of data which would be the demand of


the hour. All information stored on the blockchain is always
there. This enables simple tracking of information, about ab
where, why, and how it has been employed or by whom. The
record of information for any payments or updates conducted
functions as an inspection and verification benefit.[21]
FIGURE1 : BLOCKCHAIN IN CLOUD INFRASTRUCTURE
Cloud computing offers third-party
party services, and a financial
The security issues in the cloud computing environment meltdown of the third
hird vendors might lead to a considerable
we discussed before are supposed to be solved by blockchain loss of data for organizations. Blockchain on either side are
technology. Blockchain technology can solve the recognized governed by rules and do not feature third-party
third constraints,
cloud forensic problem blem inherent in the hypervisor and thus can be a safer choice to move forward with.
vulnerabilities, where the attacker can remove all evidence of Blockchain is transforming industries for the better, including
an attack from the cloud environment. Because of the message critical domains such as health, farming, banking, commerce,
exchange of blockchain, particularly the public peer
peer-to-peer and more.[19]
blockchain, all transaction data are recorded
corded and difficult to
remove when using Blockchain technology.[1] Therefore, all
IV. BENEFITS AND CHALLENGES
ES FROM EACH EMERGING
EMERGIN
acts conducted in the cloud environment are recorded; hence,
TECHNOLOGY
cloud providers may spend less time detecting the assaults and
comply with GDPR by being able to inform the supe supervisory A. Cloud computing
authority within 72 hours.[4] This blockchain strategy Innovative Characteristics
comprises spreading the blockchain ledgers over numerous ● The shared environment of scalable virtual IT
locations and cloud instances. As a result, it becomes more resources
ources enabled by the hypervisor
difficult for the attacker to mess with the transaction data, ● Centralized architecture

768
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SURATHKAL. Downloaded on November 08,2023 at 17:15:51 UTC from IEEE Xplore. Restrictions apply.
● Geographically distributed ● Lack of standards.
● Utilized on-demand ● Implementation issues.
● Paid per use ● Unproven technology.
● Automatically provisioned ● Scalability issues.
● Various service models ● Program design flaws.
● Deployed as public or private or mixed. ● Key generation faults.
Benefits ● Energy usage through consensus procedures.
● Reduced IT capital expenditures ● Legal: compliance difficulties connected to the
● Outsourcing IT skills immutability in contrast with the right to be forgotten
● More focus on core business activities. under GDPR
● Organizational: connected to investment
Challenges uncertainties.
● Technical: security weaknesses in the hypervisor ● Expensive skilled personnel Business: lack of
(single point of failure) and cloud forensic problem. established coalitions.
● Legal: GDPR compliance issues associated with the
location of data and traceability of attacks. -
CONCLUSION
Economic: hidden costs associated with addressing
compliance and interoperability challenges, poor Cloud computing has been a good innovation since it has
service selection, bandwidth charges.[11] evolved for several years. However, people are working hard
● Organizational: related to the size and type of to solve several challenges with cloud computing including
organization, change from in-house expertise to confidentiality and protection, management of information,
service integration (misconfiguration can happen), compatibility, etc. Distributed ledgers is an emerging platform
and service level negotiation.[9] well known because of its confidentiality, and validity, and
have been the primary traits that are helping the world migrate
B. Blockchain to that direction. On mixing Distributed ledger and cloud
Innovative challenges technology, there exist different improvements regarding
● Decentralized P2P design - A peer-to-peer (P2P) utility, credibility, protection, scalability, data storage, and
service is a decentralized platform in which two several benefits. With this study, we covered cloud and
people connect directly with each other without the blockchain technology. We explored the scope of combining
use of a third-party intermediary. Rather, the the distributed ledgers platform with a flexible virtualized
contracting parties transact with each other directly environment to increase the level of confidence, service
through the P2P service. delivery, confidentiality and information retrieval.
● Distributed ledger -Relies on cryptographic
techniques
● Immutability of transaction data records
● Transparency REFERENCES
● Decentralized/centralized consensus mechanism to [1] Y. Zhang, D. He, and K.-K. R. Cho, “Bads: Blockchain-based
architecture for data sharing with abs and cp-abe in IoT,” Wireless
validate blocks of transactions Communications and Mobile Computing, vol. 2018.
● Deployed as public permissionless or private [2] D. C. Nguyen, P. N. Pathirana, M. Ding and A. Seneviratne, "Integration
permissioned (controlled by a central authority) of Blockchain and Cloud of Things: Architecture, Applications and
(managed by a central authority) Challenges," in IEEE Communications Surveys & Tutorials, vol. 22, no.
4, pp. 2521-2549, Fourth Quarter 2020
● Automated logic of transaction contract and [3] Jie SONG, Pengyi ZHANG, Mohammed ALKUBATI, Yubin BAO, Ge
validation methods. YU, Research advances on blockchain-as-a-service: architectures,
Benefits applications and challenges, Digital Communications and Networks,
● Reduced transaction costs -Reduced corruption 2021
[4] Li, W., Wu, J., Cao, J. et al. Blockchain-based trust management in
● Ensured data privacy and integrity cloud computing systems: a taxonomy, review and future directions. J
● Ensured traceability of transactions Cloud Comp 10, 35 (2021).
Challenges [5] H. Halaburda, G. Haeringer, “Bitcoin and blockchain: What we know
● Technical: Security difficulties (decentralized and what questions are still open,” NYU Stern School Business, New
York, NY, USA, Tech. Rep., 2019.
consensus system is prone to DDoS assault and [6] M.R. Prasad, R.L. Naik, and V. Bapuji, “Cloud computing: Research
centralized consensus mechanism is prone to 51 issues and implications,” Int. J. Cloud Computing Services Sci., vol. 2,
percent attack) (decentralized consensus mechanism no. 2, p. 134, Jan. 2013.
is prone to DDoS attack and centralized consensus [7] L. Popovski, G. Soussou, and P.B. Webb, “A brief history of
blockchain,’’Patterson Belknap Webb & Tyler, New York, NY, USA,
mechanism is prone to 51 percent attack) Tech. Rep., 2014.
(decentralized consensus mechanism is prone to [8] C. Surianarayanan, and P. R. Chelliah, “Essentials of Cloud Computing:
DDoS attack and centralized consensus mechanism is A Holistic Perspective”, New York, NY, USA: Springer, 2019.
prone to 51 percent attack).[3] [9] S. Mukherji, and S. Srivastava, “Pros and cons of cloud computing
technology,” Int. J. Sci. Res., vol. 5, no. 7, pp. 848–851, Jul. 2016

769
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SURATHKAL. Downloaded on November 08,2023 at 17:15:51 UTC from IEEE Xplore. Restrictions apply.
[10] M. R. Prasad, R. L. Naik, and V. Bapuji, “Cloud computing: Research
issues and implications,” Int. J. Cloud Comput. Services Sci., vol. 2, no.
2, p. 134, Jan. 2013.
[11] M. Nazir, “Cloud computing: Overview & current research challenges,”
IOSR J. Comput. Eng., vol. 8, no. 1, pp. 14–22, 2012.
[12] W. Venters and E. A. Whitley, “A critical review of cloud computing:
Researching desires and realities,” J. Inf. Technol., vol. 27, no. 3,pp.
179–197, Sep. 2012.
[13] H. AL Zahrani, “A brief survey of cloud computing,” Global J. Comput.
Sci.Technol., vol. 16, no. 3, pp. 11–16, 2016.
[14] N. Tapas, G. Merlino, F. Longo, and A. Puliafito, “Blockchain-based
publicly verifiable cloud storage,” in Proc. IEEE Int. Conf. Smart
Comput. (SMARTCOMP), Jun. 2019, pp. 381–386.
[15] M. Westerlund and N. Kratzke, “Towards distributed clouds: A review
about the evolution of centralized cloud computing, distributed ledger
technologies, and a foresight on unifying opportunities and security
impli-cations,” in Proc. Int. Conf. High Perform. Comput. Simulation
(HPCS), Jul. 2018, pp. 655–663.
[16] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Bitcoin,
Saint Kitts, Saint Kitts and Nevis, Tech. Rep., 2008.
[17] S. Nanayakkara, S. Perera, and S. Senaratne, “Stakeholders’ perspective
on blockchain and smart contracts solutions for construction supply
chains,'' in Proc. CIB World Building Congress., 2019, pp. 1–11.
[18] S. Kumar and R. H. Goudar, “Cloud computing-research issues,
challenges, architecture, platforms, and applications: A survey,” Int. J.
Future Comput. Commun., vol. 1, no. 4, p. 356, 2012.
[19] J. Y. Astier, I. Y. Zhukov, and O. N. Murashov, “Smart building
management systems and the Internet of Things,” Inf. Technol. Secur.,
vol. 3, pp. 17–28, 2017.
[20] D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital
signature algorithm (ECDSA),” Int. J. Inf. Secur., vol. 1, no. 1, pp. 36–
63, 2001.
[21] A. Gervais, G.O. Karame, K. Wüst, V. Glykantzis, H. Ritzdorf, and S.
Capkun, “On the security and performance of proof of work
blockchains,” in Proc. ACM SIGSAC Conf. Comput. Commun. Secur.
Oct. 2016, pp. 3–16.
[22] P. S. Maharjan, “Performance analysis of blockchain platforms,”
Howard R. Hughes College Eng., Univ. Nevada, Las Vegas, Las Vegas,
NV, USA, Tech. Rep., 2018
[23] L. Popovski, G. Soussou, and P. B. Webb, “A brief history of
blockchain,” Patterson Belknap Webb & Tyler, New York, NY, USA,
Tech. Rep., 2014

770
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SURATHKAL. Downloaded on November 08,2023 at 17:15:51 UTC from IEEE Xplore. Restrictions apply.

You might also like