Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …

169

22. Bhushan K, Gupta BB (2017) Security challenges in cloud computing: state-of-art. Int J Big

Data Intell 4(2):81. https://doi.org/10.1504/ijbdi.2017.083116

23. Toosi AN, Calheiros RN, Buyya R (2014) Interconnected cloud computing environments:

challenges, taxonomy, and survey. ACM Comput Surv 47(1). https://doi.org/10.1145/2593512

24. Qevani E, Panagopoulou M, Stampoltas C, Tsitsipas A, Kyriazis D, Themistocleous M (2014)

What can OpenStack adopt from a Ganeti-based open-source IaaS?. In IEEE international

conference on cloud computing, CLOUD, pp 833–840. https://doi.org/10.1109/CLOUD.201

4.115

25. Hashizume K, Rosado DG, Fernández-Medina E, Fernandez EB (2013) An analysis of security

issues for cloud computing. J Internet Serv Appl 4(1):1–13. https://doi.org/10.1186/1869-023

8-4-5

26. Ju J, Ya W, Fu J, Wu J, Lin Z (2010) Research on key technology in SaaS. In Proceedings-2010

international conference on intelligent computing and cognitive informatics, ICICCI 2010, pp

384–387. https://doi.org/10.1109/ICICCI.2010.120

27. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud

computing. J Netw Comput Appl 34(1):1–11. https://doi.org/10.1016/j.jnca.2010.07.006

28. Darwish MA, YafiE, Almasri AH, Zuhairi MF (2018) Privacy and security of cloud computing:

a comprehensive review of privacy and security of cloud computing: a comprehensive review

of techniques and challenges. Int J Eng Technol 7(4.29):239–246. https://www.researchg

ate.net/profile/Marwan_Darwish4/publication/328927461_Privacy_and_Security_of_Cloud_

Computing_A_Comprehensive_Review_of_Techniques_and_Challenges/links/5c4dcff9a6fd

ccd6b5cdbdbb/Privacy-and-Security-of-Cloud-Computing-A-Comprehensive-R

29. Dahbur K, Mohammad B, Tarakji AB (2011) A survey of risks, threats and vulnerabilities in

cloud computing. https://doi.org/10.1145/1980822.1980834

30. Dawoud W, Takouna I, Meinel C (2010) Infrastructure as a service security: challenges and

solutions

31. Kaaniche N (2014) La sécurité des données stockées dans un environnement Cloud , basée sur

des mécanismes cryptographiques, p 201

32. Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H (2016) Security algorithms for cloud

computing. Procedia Comput Sci 85:535–542. https://doi.org/10.1016/j.procs.2016.05.215

33. Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y (2018) Comprehensive

study of symmetric key and asymmetric key encryption algorithms. In Proceedings of 2017

international conference on engineering and technology, ICET 2017, vol 2018, pp 1–7. https://

doi.org/10.1109/ICEngTechnol.2017.8308215

34. Kulshrestha V, Verma S, Challa CRK (2017) A comprehensive evaluation of cryptographic

algorithms in cloud computing. In Proceedings of the international conference on inventive

computation technologies, ICICT 2016, vol 1. https://doi.org/10.1109/INVENTIVE.2016.782

3268

35. Mahto D, Yadav DK (2017) RSA and ECC: a comparative analysis. Int J Appl Eng Res

12(19):9053–9061

36. Gilbert H, Handschuh H (2004) Security analysis of SHA-256 and sisters. In Lecture Notes

Computer Science (subseries Lecture Notes in Artificial Intelligence and Lecture Notes in

Bioinformatics), vol 3006, pp 175–193. https://doi.org/10.1007/978-3-540-24654-1_13

37. Ben Ayed A (2017) A conceptual secure blockchain based electronic voting system. Int J Netw

Secur Its Appl 9(3):01–09. https://doi.org/10.5121/ijnsa.2017.9301

38. Wang S, Wang X, Zhang Y (2019) A secure cloud storage framework with access control

based on blockchain. IEEE Access 7:112713–112725. https://doi.org/10.1109/ACCESS.2019.

2929205

39. Park JH, Park JH (2017) Blockchain security in cloud computing: use cases, challenges, and

solutions. Symmetry (Basel) 9(8). https://doi.org/10.3390/sym9080164

40. Kumar M, Singh AK, Suresh Kumar TV (2018) Secure log storage using blockchain and cloud

infrastructure. https://doi.org/10.1109/ICCCNT.2018.8494085

41. Banerjee M, Lee J, Choo KKR (2018) A blockchain future for internet of things security: a

position paper. Digit Commun Netw 4(3):149–160. https://doi.org/10.1016/j.dcan.2017.10.006