Ghanmi et al., 2024 - Google Patents

Blockchain‐cloud integration: comprehensive survey and open research issues

Ghanmi et al., 2024

View PDF
Document ID
4380199060770721840
Author
Ghanmi H
Hajlaoui N
Touati H
Hadded M
Muhlethaler P
Boudjit S
Publication year
Publication venue
Concurrency and computation: practice and experience

External Links

Snippet

Cloud computing has attracted great interest in various scientific and technical fields recently as one of the widely adopted networking technologies. Despite their many benefits and applications, it still faces many security and trust challenges, including managing and …
Continue reading at www.researchsquare.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • G06F17/30592Multi-dimensional databases and data warehouses, e.g. MOLAP, ROLAP
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30522Query processing with adaptation to user needs
    • G06F17/30528Query processing with adaptation to user needs using context
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30575Replication, distribution or synchronisation of data between databases or within a distributed database; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30017Multimedia data retrieval; Retrieval of more than one type of audiovisual media
    • G06F17/30058Retrieval by browsing and visualisation of multimedia data
    • G06F17/30061Spatial browsing, e.g. 2D maps, 3D or virtual spaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers

Similar Documents

Publication Publication Date Title
Elisa et al. A framework of blockchain-based secure and privacy-preserving E-government system
Abid et al. NovidChain: Blockchain‐based privacy‐preserving platform for COVID‐19 test/vaccine certificates
Ahmed et al. Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey
Alghamdi et al. A survey of blockchain based systems: Scalability issues and solutions, applications and future challenges
Mohsin et al. Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions
Salman et al. Security services using blockchains: A state of the art survey
Shen et al. Blockchain for transparent data management toward 6G
Zissis et al. Addressing cloud computing security issues
Chaudhry et al. Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm
US20240137228A1 (en) Puf and blockchain based iot event recorder and method
Tawfik et al. Blockchain-based access control and privacy preservation in healthcare: a comprehensive survey
Rashid et al. RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations
Ghanmi et al. Blockchain‐cloud integration: comprehensive survey and open research issues
Ullah et al. Aicyber-chain: Combining ai and blockchain for improved cybersecurity
Kashif et al. Differential privacy preserving based framework using blockchain for internet-of-things
Dang et al. Sharing secured data on peer-to-peer applications using attribute-based encryption
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
Raj et al. A blockchain based lightweight and secure access control framework for IoT-enabled supply chain
Thilagavathy et al. RETRACTED ARTICLE: A novel framework paradigm for EMR management cloud system authentication using blockchain security network
Priyadarshini et al. A faster, integrated, and trusted certificate authentication and issuer validation system based on blockchain
Gupta et al. A comparative study on blockchain-based distributed public key infrastructure for IoT applications
Spathoulas et al. Can blockchain technology enhance security and privacy in the Internet of Things?
Ziegler et al. Designing a security incident response process for self-sovereign identities
Karunakaran et al. Blockchain technology in cloud security
Alghamdi et al. A comprehensive survey on security, privacy and authentication in blockchain