Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3327960.3332382acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering

Authors Info & Claims
Published:02 July 2019Publication History

ABSTRACT

Cloud datacenter reengineering has become an emerging technical term along with the rapid growth of cloud computing. There are a few reasons for implementing cloud reengineering. One of the key driven forces of adopting cloud reengineering is that securing data provenance is a major restriction for most contemporary applications. Many cloud-based applications require multiple cloud vendors' collaborations, such that data usage can be rarely controlled or governed during the data life cycle. This work focuses on the issue of data provenance in cloud computing and proposes an approach that uses blockchain techniques to achieve data tracing for a full data life cycle. The proposed method em- phasizes tracing data transfers between cloud datacenter. The data regeneration also is concerned by the proposed approach. Our experiment evaluation has assessed the efficiency performance of our approach.

References

  1. A. Almutairi, M. Sarfraz, and A. Ghafoor. Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters. IEEE Transactions on Cloud Computing, 6(1):168--181, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  2. G. Sun, D. Liao, D. Zhao, Z. Xu, and H. Yu. Live migration for multiple correlated virtual machines in cloud-based data centers. IEEE Transactions on Services Computing, 11(2):279--291, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  3. Z. Zhang, W. Cao, Z. Qin, L. Zhu, Z. Yu, and K. Ren. When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid. In 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), pages 1--9. IEEE, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  4. F. Marozzo, D. Talia, and P. Trunfio. A workflow management system for scalable data mining on clouds. IEEE Transactions on Services Computing, 11(3):480--492, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  5. Z. Zhang, Z. Qin, L. Zhu, J. Weng, and K. Ren. Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise. IEEE Transactions on Smart Grid, 8(2):619--626, 2017.Google ScholarGoogle Scholar
  6. K. Gai, K.K.R. Choo, M. Qiu, and L. Zhu. Privacy-preserving content-oriented wireless communication in internet-of-things. IEEE Internet of Things Journal, 5(4):3059--3067, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  7. K. Gai, Y. Wu, L. Zhu, M. Qiu, and M. Shen. Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Transactions on Industrial Informatics, PP(99):1, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  8. Y. Zhang, R. Deng, X. Liu, and D. Zheng. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Information Sciences, 462:262--277, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. N. Kshetri. Can blockchain strengthen the internet of things? IT professional, 19(4):68--72, 2017.Google ScholarGoogle Scholar
  10. K. Gai, K.K.R. Choo, and L. Zhu. Blockchain-enabled reengineering of cloud datacenters. IEEE Cloud Computing, 5(6):21--25, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  11. P. Sharma, M. Chen, and J. Park. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access, 6:115--124, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  12. K. Gai, Y. Wu, L. Zhu, L. Xu, and Y. Zhang. Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal, PP(99):1, 2019.Google ScholarGoogle Scholar
  13. X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, and L. Njilla. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing, pages 468--477. IEEE Press, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Zhu, Y. Wu, K. Gai,and K.K.R. Choo. Controllable and trustworthy blockchain-based cloud data management. Future Generation Computer Systems, 91:527--535, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Tosh, S. Shetty, X. Liang, C. Kamhoua, K. Kwiat, and L. Njilla. Security implications of blockchain cloud with analysis of block withholding attack. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pages 458--467, Madrid, Spain, 2017. IEEE Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Q. Xia, E. Sifah, K. Asamoah, J. Gao, X. Du, and M. Guizani. MeDShare: Trustless medical data sharing among cloud service providers via blockchain. IEEE Access, 5:14757--14767, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  17. C. Esposito, A. De Santis, G. Tortora, H. Chang, and K.K.R. Choo. Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Computing, 5(1):31--37, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  18. X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang. Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. Journal of medical systems, 40(10):218, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          BSCI '19: Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure
          July 2019
          134 pages
          ISBN:9781450367868
          DOI:10.1145/3327960

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 July 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          BSCI '19 Paper Acceptance Rate44of12submissions,367%Overall Acceptance Rate44of12submissions,367%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader