ABSTRACT
Cloud datacenter reengineering has become an emerging technical term along with the rapid growth of cloud computing. There are a few reasons for implementing cloud reengineering. One of the key driven forces of adopting cloud reengineering is that securing data provenance is a major restriction for most contemporary applications. Many cloud-based applications require multiple cloud vendors' collaborations, such that data usage can be rarely controlled or governed during the data life cycle. This work focuses on the issue of data provenance in cloud computing and proposes an approach that uses blockchain techniques to achieve data tracing for a full data life cycle. The proposed method em- phasizes tracing data transfers between cloud datacenter. The data regeneration also is concerned by the proposed approach. Our experiment evaluation has assessed the efficiency performance of our approach.
- A. Almutairi, M. Sarfraz, and A. Ghafoor. Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters. IEEE Transactions on Cloud Computing, 6(1):168--181, 2018.Google ScholarCross Ref
- G. Sun, D. Liao, D. Zhao, Z. Xu, and H. Yu. Live migration for multiple correlated virtual machines in cloud-based data centers. IEEE Transactions on Services Computing, 11(2):279--291, 2018.Google ScholarCross Ref
- Z. Zhang, W. Cao, Z. Qin, L. Zhu, Z. Yu, and K. Ren. When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid. In 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), pages 1--9. IEEE, 2017.Google ScholarCross Ref
- F. Marozzo, D. Talia, and P. Trunfio. A workflow management system for scalable data mining on clouds. IEEE Transactions on Services Computing, 11(3):480--492, 2018.Google ScholarCross Ref
- Z. Zhang, Z. Qin, L. Zhu, J. Weng, and K. Ren. Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise. IEEE Transactions on Smart Grid, 8(2):619--626, 2017.Google Scholar
- K. Gai, K.K.R. Choo, M. Qiu, and L. Zhu. Privacy-preserving content-oriented wireless communication in internet-of-things. IEEE Internet of Things Journal, 5(4):3059--3067, 2018.Google ScholarCross Ref
- K. Gai, Y. Wu, L. Zhu, M. Qiu, and M. Shen. Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Transactions on Industrial Informatics, PP(99):1, 2019.Google ScholarCross Ref
- Y. Zhang, R. Deng, X. Liu, and D. Zheng. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Information Sciences, 462:262--277, 2018.Google ScholarDigital Library
- N. Kshetri. Can blockchain strengthen the internet of things? IT professional, 19(4):68--72, 2017.Google Scholar
- K. Gai, K.K.R. Choo, and L. Zhu. Blockchain-enabled reengineering of cloud datacenters. IEEE Cloud Computing, 5(6):21--25, 2018.Google ScholarCross Ref
- P. Sharma, M. Chen, and J. Park. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access, 6:115--124, 2018.Google ScholarCross Ref
- K. Gai, Y. Wu, L. Zhu, L. Xu, and Y. Zhang. Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal, PP(99):1, 2019.Google Scholar
- X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, and L. Njilla. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing, pages 468--477. IEEE Press, 2017. Google ScholarDigital Library
- L. Zhu, Y. Wu, K. Gai,and K.K.R. Choo. Controllable and trustworthy blockchain-based cloud data management. Future Generation Computer Systems, 91:527--535, 2019.Google ScholarDigital Library
- D. Tosh, S. Shetty, X. Liang, C. Kamhoua, K. Kwiat, and L. Njilla. Security implications of blockchain cloud with analysis of block withholding attack. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pages 458--467, Madrid, Spain, 2017. IEEE Press. Google ScholarDigital Library
- Q. Xia, E. Sifah, K. Asamoah, J. Gao, X. Du, and M. Guizani. MeDShare: Trustless medical data sharing among cloud service providers via blockchain. IEEE Access, 5:14757--14767, 2017.Google ScholarCross Ref
- C. Esposito, A. De Santis, G. Tortora, H. Chang, and K.K.R. Choo. Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Computing, 5(1):31--37, 2018.Google ScholarCross Ref
- X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang. Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. Journal of medical systems, 40(10):218, 2016. Google ScholarDigital Library
Index Terms
- Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering
Recommendations
Cloud Data Provenance using IPFS and Blockchain Technology
SCC '19: Proceedings of the Seventh International Workshop on Security in Cloud ComputingCloud is widely used for data storage. A user who has uploaded his/her private or commercial data to the cloud is always keen to know whether the data that he/she has stored is secure or not. Access logs of stored data can be used to trace the integrity ...
Transparent Cloud Privacy: Data Provenance Expression in Blockchain
CLOSER 2019: Proceedings of the 9th International Conference on Cloud Computing and Services ScienceThe development of Cloud processing and Big Data have raised many concerns over the use to which data is being put. These concerns have created new demands for methodologies, and capabilities which can provide transparency and trust in data provenance ...
Blockchain-based solutions for cloud computing: A survey
AbstractBlockchain is a disruptive technology applied by academia and industry in a broad spectrum of applications ranging from cryptocurrency, financial services, IoT, 5G, risk management to public and social services. On the other hand, ...
Comments