Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …
169
22. Bhushan K, Gupta BB (2017) Security challenges in cloud computing: state-of-art. Int J Big
Data Intell 4(2):81. https://doi.org/10.1504/ijbdi.2017.083116
23. Toosi AN, Calheiros RN, Buyya R (2014) Interconnected cloud computing environments:
challenges, taxonomy, and survey. ACM Comput Surv 47(1). https://doi.org/10.1145/2593512
24. Qevani E, Panagopoulou M, Stampoltas C, Tsitsipas A, Kyriazis D, Themistocleous M (2014)
What can OpenStack adopt from a Ganeti-based open-source IaaS?. In IEEE international
conference on cloud computing, CLOUD, pp 833–840. https://doi.org/10.1109/CLOUD.201
4.115
25. Hashizume K, Rosado DG, Fernández-Medina E, Fernandez EB (2013) An analysis of security
issues for cloud computing. J Internet Serv Appl 4(1):1–13. https://doi.org/10.1186/1869-023
8-4-5
26. Ju J, Ya W, Fu J, Wu J, Lin Z (2010) Research on key technology in SaaS. In Proceedings-2010
international conference on intelligent computing and cognitive informatics, ICICCI 2010, pp
384–387. https://doi.org/10.1109/ICICCI.2010.120
27. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud
computing. J Netw Comput Appl 34(1):1–11. https://doi.org/10.1016/j.jnca.2010.07.006
28. Darwish MA, YafiE, Almasri AH, Zuhairi MF (2018) Privacy and security of cloud computing:
a comprehensive review of privacy and security of cloud computing: a comprehensive review
of techniques and challenges. Int J Eng Technol 7(4.29):239–246. https://www.researchg
ate.net/profile/Marwan_Darwish4/publication/328927461_Privacy_and_Security_of_Cloud_
Computing_A_Comprehensive_Review_of_Techniques_and_Challenges/links/5c4dcff9a6fd
ccd6b5cdbdbb/Privacy-and-Security-of-Cloud-Computing-A-Comprehensive-R
29. Dahbur K, Mohammad B, Tarakji AB (2011) A survey of risks, threats and vulnerabilities in
cloud computing. https://doi.org/10.1145/1980822.1980834
30. Dawoud W, Takouna I, Meinel C (2010) Infrastructure as a service security: challenges and
solutions
31. Kaaniche N (2014) La sécurité des données stockées dans un environnement Cloud , basée sur
des mécanismes cryptographiques, p 201
32. Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H (2016) Security algorithms for cloud
computing. Procedia Comput Sci 85:535–542. https://doi.org/10.1016/j.procs.2016.05.215
33. Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y (2018) Comprehensive
study of symmetric key and asymmetric key encryption algorithms. In Proceedings of 2017
international conference on engineering and technology, ICET 2017, vol 2018, pp 1–7. https://
doi.org/10.1109/ICEngTechnol.2017.8308215
34. Kulshrestha V, Verma S, Challa CRK (2017) A comprehensive evaluation of cryptographic
algorithms in cloud computing. In Proceedings of the international conference on inventive
computation technologies, ICICT 2016, vol 1. https://doi.org/10.1109/INVENTIVE.2016.782
3268
35. Mahto D, Yadav DK (2017) RSA and ECC: a comparative analysis. Int J Appl Eng Res
12(19):9053–9061
36. Gilbert H, Handschuh H (2004) Security analysis of SHA-256 and sisters. In Lecture Notes
Computer Science (subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), vol 3006, pp 175–193. https://doi.org/10.1007/978-3-540-24654-1_13
37. Ben Ayed A (2017) A conceptual secure blockchain based electronic voting system. Int J Netw
Secur Its Appl 9(3):01–09. https://doi.org/10.5121/ijnsa.2017.9301
38. Wang S, Wang X, Zhang Y (2019) A secure cloud storage framework with access control
based on blockchain. IEEE Access 7:112713–112725. https://doi.org/10.1109/ACCESS.2019.
2929205
39. Park JH, Park JH (2017) Blockchain security in cloud computing: use cases, challenges, and
solutions. Symmetry (Basel) 9(8). https://doi.org/10.3390/sym9080164
40. Kumar M, Singh AK, Suresh Kumar TV (2018) Secure log storage using blockchain and cloud
infrastructure. https://doi.org/10.1109/ICCCNT.2018.8494085
41. Banerjee M, Lee J, Choo KKR (2018) A blockchain future for internet of things security: a
position paper. Digit Commun Netw 4(3):149–160. https://doi.org/10.1016/j.dcan.2017.10.006