security in cloud computing using blockchain technology · 2018-12-29 · security in cloud...

18
© 2018 Copyright held by the author(s). Published by AIJR Publisher in Proceedings of the 3 rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA 2018), April 28, 2018. This is an open access article under Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) license, which permits any non-commercial use, distribution, adaptation, and reproduction in any medium, as long as the original work is properly cited. ISBN: 978-81-936820-0-5 Security in Cloud Computing Using Blockchain Technology Sameena Banu Y, Ravi Kumar V Department of Computer Science & Engineering, Vidyavardhaka College of Engineering, Mysore Karnataka, India. DOI: https://doi.org/10.21467/proceedings.1.65 * Corresponding author email: [email protected] Abstract Blockchain devours strained consideration by way of the forefront budgetary invention since of its safety that ensembles the informatization period. Exactly, it stretches safety finished the validation of associates that agreement computer-generated currency, encryption, then the age of jumble esteem. As designated through the worldwide budgetary manufacturing, the arcade for safety-based blockchain invention is relied upon to develop to around USD 20 billion by 2020. Also, blockchain dismiss be connected past the Internet of Things (IoT) condition, its applications are relied upon to grow. Distributed calculating has remained significantly received in completely IT situations aimed at its effectiveness then accessibility. Now this project, here examine affected idea of blockchain innovation then its scorching investigation patterns. We resolve think about in what way to adjust blockchain safety to distributed calculating and its protected arrangements in feature. Index Terms- About four key words or phrases in alphabetical order, separated by commas. Keywords are used to retrieve documents in an information system such as an online journal or a search engine. (Mention 4-5 keywords) INTRODUCTION Through the prerequisite for unkind advantage budgetary invention as of dawn increasing, there have been dynamic examines on blockchain for the safe utilization of electronic money by conveying exclusively between peers what's more, without the inclusion of outsiders. A blockchain is general society record for exchanges and it averts hacking amid exchanges including virtual money. As a sort of appropriated database and an information record list that constantly develops, it is intended to incapacitate discretionary altering by the administrator of conveyed peers. Exchange records are scrambled by a lead and worked in PCs that run the blockchain programming. Bitcoin is a electronic money utilizing blockchain invention [1]. Utilizing blockchain can stretch advanced safety compared with positioning absent all material in a principal database. In the material build up stocks and management perspective, damage after attacks on a database can be anticipated. In accumulation, since affecting blockchain has an accessibility property, the aforementioned can stretch frankness in material when linked to

Upload: others

Post on 15-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

© 2018 Copyright held by the author(s). Published by AIJR Publisher in Proceedings of the 3rd National Conference on

Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA 2018), April 28, 2018.

This is an open access article under Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)

license, which permits any non-commercial use, distribution, adaptation, and reproduction in any medium, as long as the

original work is properly cited. ISBN: 978-81-936820-0-5

Security in Cloud Computing Using Blockchain Technology

Sameena Banu Y, Ravi Kumar V

Department of Computer Science & Engineering, Vidyavardhaka College of Engineering, Mysore

Karnataka, India.

DOI: https://doi.org/10.21467/proceedings.1.65

* Corresponding author email: [email protected]

Abstract

Blockchain devours strained consideration by way of the forefront budgetary invention

since of its safety that ensembles the informatization period. Exactly, it stretches safety

finished the validation of associates that agreement computer-generated currency,

encryption, then the age of jumble esteem. As designated through the worldwide

budgetary manufacturing, the arcade for safety-based blockchain invention is relied upon

to develop to around USD 20 billion by 2020. Also, blockchain dismiss be connected

past the Internet of Things (IoT) condition, its applications are relied upon to grow.

Distributed calculating has remained significantly received in completely IT situations

aimed at its effectiveness then accessibility. Now this project, here examine affected idea

of blockchain innovation then its scorching investigation patterns. We resolve think

about in what way to adjust blockchain safety to distributed calculating and its protected

arrangements in feature.

Index Terms- About four key words or phrases in alphabetical order, separated by

commas. Keywords are used to retrieve documents in an information system such as an

online journal or a search engine. (Mention 4-5 keywords)

INTRODUCTION

Through the prerequisite for unkind advantage budgetary invention as of dawn increasing,

there have been dynamic examines on blockchain for the safe utilization of electronic money

by conveying exclusively between peers what's more, without the inclusion of outsiders. A

blockchain is general society record for exchanges and it averts hacking amid exchanges

including virtual money. As a sort of appropriated database and an information record list that

constantly develops, it is intended to incapacitate discretionary altering by the administrator of

conveyed peers. Exchange records are scrambled by a lead and worked in PCs that run the

blockchain programming. Bitcoin is a electronic money utilizing blockchain invention [1].

Utilizing blockchain can stretch advanced safety compared with positioning absent all material

in a principal database. In the material build up stocks and management perspective, damage

after attacks on a database can be anticipated. In accumulation, since affecting blockchain has

an accessibility property, the aforementioned can stretch frankness in material when linked to

Page 2: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Sameena et al, NCICCNDA 2018, AIJR Proceedings 1, pp.422-439, 2018

Proceedings of the 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA 2018)

423

a territory requiring the exposé of material. Because of such potentials, it dismiss be charity in

different territories together with the money related part then the Internet of Things (IoT)

situation and its applications are trusted upon to spread [2– 6].

Blockchain accomplishes a conversation record through the work validation process, when a

individual who advances electronic money shapes a piece by consolidating the exchanges over

the system. The hash esteem is then produced by confirming it and associating the past piece.

This square is occasionally refreshed and pondered the electronic money exchange subtle

elements to portion the greatest current conversation feature square. This technique gives

refuge to the conversation of automated currency and documents the consumption of a

trustworthy organization [7– 9].

Disseminated calculating has been associated to frequent IT conditions since of its proficiency

and convenience. Besides, haze safety besides defence subjects require remained

communicated around concerning essential safety mechanisms: privacy, respectability,

confirmation, become to regulator, et cetera [10].

Now we appearance to discover affecting meaning besides ignoble invention of blockchain

then appraisal the shape of ponders to day near exchange about zones towards stay

contemplated, seeing dispersed calculating conditions. What's more, we talk about the

contemplations for blockchain safety and locked arrangements in factor. This project thinks

about the blockchain innovation besides overviews the blockchain via breaking down

nonspecific innovation and research inclines and talks about the answer for utilizing bitcoin

securely and also future ponder territories. The consequences of this exploration can fill in as

imperative base information in considering blockchain then will help in sympathetic the

recognized safety issues so far away. We can cultivate an advancement of upcoming blockchain

innovation by thoughtful the design of blockchain safety. Whatever is we talk about linked

workings counting the fundamental idea of blockchain then bitcoin as an utilization

circumstance. Study on the safety contemplations aimed at blockchain through affecting

clearance of blockchain, then safety of exchange, safety of folder, then the safety of

programming. Here we examine blockchain security contextual analyses—validation, security

episodes, and 51% assault—and make strides the blockchain offers protected answers aimed

at the blockchain in distributed figuring in factor.

LITERATURE SURVEY

1) T Motivated by the present explosion of eagerness about blockchains, we look at whether

they type a solid competition aimed at the Internet of Things (IoT) division. Blockchains

empower us to need a distributed shared system wherever non-believing persons can connect

with all additional deprived of a placed standard in middle person, popular an unquestionable

technique. We survey in what way this tool purposes and additionally examine brilliant

agreements—fillings that living on the blockchain that revenue into explanation the

Page 3: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Security in Cloud Computing Using Blockchain Technology

424 ISBN: 978-81-936820-0-5

Proceedings DOI: 10.21467/proceedings.1

Series: AIJR Proceedings

robotization of multi-stage forms. We at that sentiment move into the IoT territory and depict

how a blockchain-IoT mix: 1) supports the sharing of organizations and resources provoking

the arrangement of a business focus of organizations among contraptions and 2) empowers

us to motorize in a cryptographically certain manner a couple of existing, repetitive work

forms. We furthermore raise particular issues that should be considered before the game plan

of a blockchain arrange in an IoT setting: from esteem-based security to the ordinary

estimation of the digitized assets traded on the framework. Wherever material, we recognize

plans and workarounds. Our choice is that the blockchain-IoT mix is exceptional and can

cause colossal changes over a couple of endeavors, getting ready for new plans of activity and

novel, passed on applications.

2) Bitcoin has risen as the best cryptographic money ever. Inside 2 ages of this one peaceful

dispatch on 2009, Bitcoin developed near include billions among dollars of financial incentive

in spite of just careless investigation of the framework's plan. From that point forward a

developing writing has distinguished covered up however vital properties of the framework,

found assaults, proposed promising choices, and singled out troublesome future difficulties.

In the interim a vast and dynamic open-source group has proposed and conveyed various

adjustments and augmentations.

3) Distributed computing empowers the sharing of assets, for example, stockpiling, system,

applications and programming through web. Cloud clients can rent different assets as indicated

by their necessities and pay just for the administrations they utilize. Notwithstanding,

regardless of all cloud benefits there are numerous security concerns identified with

equipment, virtualization, system, information and specialist co-ops that go about as a critical

obstruction in the reception of cloud in the IT business. In this paper, we review the best

security concerns identified with distributed computing. For every one of these security

dangers we portray, I) how it can be utilized to misuse cloud segments and its impact on cloud

substances, for example, suppliers and clients, and ii) the security arrangements that must be

taken to keep these dangers. These arrangements incorporate the security procedures from

existing writing and in addition the best security hones that must be trailed by cloud heads.

4)Bitcoin is an advanced cash that utilizations mysterious cryptographic personalities to

accomplish monetary protection. Be that as it may, Bitcoin guarantee about namelessness is

wrecked as late effort indicates in what way Bitcoin is blockchain opens clients to identification

then connecting assaults. In outcome, distinctive blending administrations have developed

which guarantee to arbitrarily blend a client's Bitcoins with other clients' coins to give secrecy

in light of the unlink ability of the blending. Nonetheless, proposed approaches experience

the ill effects of powerless security certifications and single purposes of disappointment or

little secrecy groups and lost deniability. In this paper, we suggest Coin Party a novel, dispersed

blending management aimed at a Bitcoin fashionable view of affecting mix of unscrambling

mix webs through limit scripts. Coin Party is safe in contrast to vindictive foes then the

assessment of model demonstrates that it balances effectively to the substantial amount of

Page 4: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Sameena et al, NCICCNDA 2018, AIJR Proceedings 1, pp.422-439, 2018

Proceedings of the 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA 2018)

425

member’s trendy genuine scheme locations. Via the utilization of edge marks to Bitcoin

blending, Coin Party accomplishes obscurity via requests of size advanced than connected

effort as we evaluate through examining exchanges of the genuine blockchain and is chief

amongst connected ways to deal with give conceivable deniability.

METHODOLOGY

In this segment, we are talk about the fundamental idea on how blockchain implemented a

and then how the current investigation. Here additionally consider the utilization of blockchain

happening bitcoin.

3.1 Blockchain

Blockchain is an innovation purely enables entire individuals to save a record comprising all

exchange information then to refresh their records to keep up honourableness when there is

extra trade. Since the headway is the Internet and encryption innovation has completed it

feasible for all persons to confirm a dependability of an argument, the solitary purpose of

disappointment emerging after the dependence on an approved outsider has stayed

understood. The blockchain has dealer free qualities, accordingly receiving free of superfluous

charges done peer to peer connections deprived of support by an outsider. Since obligation

regarding trade material through various people kinds’ pony-trekking troublesome, safety cost

is protected, trades remain naturally avowed then logged through form investment, then

expeditiousness is sure. In adding, the outline tin can effortlessly actualized, related, and

broadened by means of an exposed foundation then trade archives can remain

straightforwardly become to thoughtful affecting connections exposed besides diminish

managerial outlays [11].

Blockchain is a prearranged depressed that standbys material in a shape like a conveyed

database furthermore, is envisioned to mark subjectively governing it troublesome meanwhile

the organisation follower’s standby and confirm a blockchain. Every square is an assembly

including of the heading also a figure. Heading incorporates the muddle approximations of

formerly historical besides present pieces and now. Then square material is looked in the file

utilizing affecting record technique. Despite a fact that the piece does not comprise the jumble

approximation of the following piece, it is included as an exercise (Figure 3.1) [12].

Since the jumble esteems put absent in each buddy in the square are unfair by the

approximations of the past squares, it is extremely solid to distort and adjust the recruited

material. Notwithstanding the detail that material alteration is imaginable if 51% of associates

are slashed in the interim; the assault situation is sensibly tremendously troublesome. Open,

main-based checked and jumble works that container be decoded stay both charity to give

safety in a blockchain. Elliptic Arc Numerical Moniker Algorithm electrical mark calculation,

which forms an advanced mark produced among a conversation amongst people, is exploited

to determine that the conversation material have not remained modified. Despite the fact that

Page 5: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Security in Cloud Computing Using Blockchain Technology

426 ISBN: 978-81-936820-0-5

Proceedings DOI: 10.21467/proceedings.1

Series: AIJR Proceedings

utilizing an unknown open key as record data empowers one to see who sent the quantity to

extra companion, despite everything it assurances obscurity meanwhile there is no coincidental

to get of determining facts linking to the proprietor [13– 15].

The hash work is utilized to check that the piece information containing the exchange points

of interest are not changed and to discover the nonce incentive to get another piece, and

additionally to ensure the uprightness of exchange information amid a bitcoin exchange. The

respectability of the exchange points of interest can be checked through general society main-

based encryption of the jumble estimation of the exchange information. In addition, utilizing

the origin jumble esteem, which aggregates the jumble estimation of every one of the exchange

points of interest, empowers simple assurance of whether a bitcoininformation remained

modified meanwhile the origin jumble esteem is altered when the esteem is altered in the

procedure [16,17].

Figure 3.1 Hash value generation

adjusted and to discover the nonce incentive to get another piece, and additionally to ensure

the respectability of exchange information amid a bitcoin exchange. The honesty of the

exchange subtle elements can be confirmed through people in general main-based encryption

of the jumble estimation of the exchange information. Additionally, utilizing the origin jumble

esteem, which aggregates the jumble estimation of every one of the exchange points of interest,

empowers simple assurance of the bitcoin information remained modified meanwhile the

origin jumble esteem is altered as soon as the esteem is altered in the procedure [16,17]. Here

are numerous continuous investigations to fortify safety utilizing these attributes of

blockchain. The greatest imperative piece of the blockchain is identified with the individual

key utilized as a part of encryption what's more; there are thinks about on the most proficient

method to secure the individual key. An assailant endeavors a "reuse assault" and different

Page 6: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Sameena et al, NCICCNDA 2018, AIJR Proceedings 1, pp.422-439, 2018

Proceedings of the 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA 2018)

427

assaults to get the individual key put away in a companion's gadget with a specific end goal to

drudge the bitcoin. An aggressor canister drudge affecting bitcoin meanwhile the information

might remain spilled gamble then assailant dismiss get an individual main. To take care of this

issue, thinks about on applying both equipment and programming securities for affirming

exchanges are progressing bitcoin is exceptionally powerless against disease by malware since

it is regularly exchanged generally utilized gadgets, for example, companions' PCs or cell

phones. The malware entering through different ways such as email, or applications with poor

safety necessity be distinguished and preserved meanwhile it can taint an associate's gadget.

The requirement for security is developing, especially in exchanges of things utilized as a part

of recreations since numerous of them utilize bitcoins. All things considered, there have stood

thinks about on recognizing and giving malware in the amusement condition [19].

Unique of the qualities of bitcoin is such it is hard for misrepresent as well as adjust the record

since such a large number of nobles portion the exchange record. Meanwhile it receipts the

information logged in the lion's share of records, riding is for all intents and purposes

unthinkable unless the aggressor adjusts and adulterates 51% of every one of associates'

records, regardless of whether the information of a few records are adjusted. All things

considered, there are worries that 51% of the records can be distorted and adjusted all the

while thinking about expanding registering power and there are ponders recommending the

halfway confirmation process or outline of the check procedure trust in mind the end

goalmouth to income care of the subject.

3.2 Bitcoin

Bitcoin is an advanced money proposal planned through Satoshi Nakamoto at 2009 on the

way to license exchanges amongst aristocracies deprived of a pivotal professional before a

waiter towards subject and treaty through the currency. Bit coins were exchanged with the

peer to peer-construct circulated folders situated in light of open main cryptology. Bitcoin is

unique of the in the chief place executions of digital currency on 1998 [20]. The bitcoin

exchange data is uncovered ended the system with the end goal that all companions can

confirm it thus money issuance is restricted. The companions taking an interest in the system

have the same blockchain furthermore, the exchange information are put away in obstructs

similarly as the circulation stockpiling of exchange information. In spite of the fact that there

are numerous dangers associated with electronic exchanges, bitcoin can be actually actualized

to adapt to them. For instance, a man endeavouring to produce a distorted receipt record from

someone else's record to our own particular record can stay hindered by confirming it with

the dispatcher's close to home main. In the event that numerous gatherings plan to utilize a

bitcoin in the meantime, the cable that misplaces in the opposition among companions resolve

be dispensed with. The greatest essential segments of a bitcoin stand the bitcoin speech

anywhere the bitcoin has a place, the exchange demonstrating the brook a bitcoin among

affecting speeches, then the piece wherever an exchange remains affirmed through the bitcoin

Page 7: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Security in Cloud Computing Using Blockchain Technology

428 ISBN: 978-81-936820-0-5

Proceedings DOI: 10.21467/proceedings.1

Series: AIJR Proceedings

nobles. A way toward bitcoin procedure is a bitcoin exchange, and that appears the info

comprising the bitcoin and the bitcoin speech as the yield. Though managing an account is

the procedure where a portion of the cash in a record changes to additional record, a bitcoin

exchange needs all bitcoins in a contribution to be exchanged to the yield and then data sources

and yields require not at all be particular.

Electrical money utilized as a part of bitcoins comprises of a cable of electronic marks (Figure

3.2). The changes of a proprietor are exchanged to tense following cable with the jumble

approximation of the past exchange also; the electric mark is conveyed to the general

population main of the following proprietor. The beneficiary can pattern the mark to affirm

the proprietorship cable. All tense while, an issue emerges: the beneficiary isn't capable to

guarantee that unique of the proprietors takes not utilized the coins various circumstances. A

solid focal expert is acquainted with checked all exchanges of twofold use to speech this issue

[21].

Figure 3.2 Transactions done.

Thought for Blockchain Safety: Tests Blockchain innovation consumes been executed or

acknowledged by way of digital cash then is really utilized. Letter, be a certain as it may, that

different security issues happening in blockchain assertion, exchange, wallet, also,

programming have been accounted for. This project forms the patterns of safety subjects

elevated towards a day besides the safety equal of the present blockchain. Here is the reason

this endeavour is essential by way of the outcomes can fill in as improper information for

creating upcoming blockchain innovation and complementing safety.

3.3 Agreement of Blockchain:

In spite of the fact that there should just be one blockchain since it is the successive association

of produced hinders, a blockchain might be isolated into two in light of the fact that the two

most recent pieces can be produced briefly on the off chance that two distinct companions

prevail with regards to digging the response for producing the piece in the meantime. Now

such situation, the fair that is not picked as a most recent portion through the larger part of

Page 8: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Sameena et al, NCICCNDA 2018, AIJR Proceedings 1, pp.422-439, 2018

Proceedings of the 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA 2018)

429

acquaintances in a bitcoin arranges to retain removal resolve end awake futile. At the end of

the day, the bitcoin will take after the larger part of peers who have half or all the more mining

ability (working capacity). In this way, if the aggressor has 51% withdrawal ability, "51%

Attack", where the aggressor has regulator of the blockchain and he or she can incorporate

distorted exchanges, bottle be an issue. As per an investigation, an aggressor can understand

illicit pick up with just 25% working capacity finished a pernicious withdrawal procedure rather

than 51%. Meanwhile the present working ability of tense entire bitcoin organize is as of now

tall increasing significant working ability is thought to be troublesome. In any case, withdrawal

puddles—the relationship of mining aristocracies—has been currently willing to expand the

likelihood of mining. Along these lines, this hazard takes turn into a subject. As of late, Hash,

a main withdrawal puddle, briefly surpassed the half limit, driving the bitcoin group to

experience inner and outside changes in accordance with adapt to the hazard. Specifically, the

likelihood of overwhelming the blockchain is identified with the essential safety of the bitcoin

what's more, such safety dangers must briefly influenced where financial variables as a result

of the qualities of the bitcoin, which is dependably firmly identified with the market cost

[22,23].

3.4 Safety of Transaction

Meanwhile the gratified exploited as a portion of foundations of information then harvests is

a programming dialect with adaptability, extraordinary exchange structures can be made

utilizing alike. A bitcoin agreement [11] is a strategy for smearing bitcoin are the current

verification then monetary administration. A generally utilized strategy includes making the

agreement utilizing the content that incorporates a various mark strategy called multisig. In

spite of the fact that the contents are used to fathom an extensive variety of bitcoin issues, the

likelihood of a disgracefully arranged exchange has additionally expanded as the multifaceted

nature of the content increments. A bitcoin utilizing a disgracefully arranged fastening satisfied

is willing of meanwhile no one canister applies it as the inaugural gratified cannot be created.

To finish, here we reflects and recommend replicas of a bitcoin agreement-kind exchanges

that confirm tense exactness about a gratified exploited as a share of an exchange [24].

3.5 Safety of Folder

Bitcoin discourse the jumble estimation of an exposed main prearranged by couple of an open

and individual solutions. Along these lines, the fastening content about a bitcoin exchange

with a statement as yield container be opened through an opening content that takes the

esteem marked through general society important of the statement and the individual key. The

bitcoin folder provisions data, for example, the individual main of the deliver to be utilized

aimed at the age of the opening content. This implies that damage of documents in the folder

prompts lost bitcoin meanwhile the data is basic aimed at utilizing the bitcoin. Along these

lines, then bitcoin folder takes moved toward becoming the fundamental theme of bitcoin

Page 9: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Security in Cloud Computing Using Blockchain Technology

430 ISBN: 978-81-936820-0-5

Proceedings DOI: 10.21467/proceedings.1

Series: AIJR Proceedings

assault finished pony-trekking [25]. Toward ensure the safety of the bitcoin wallet;

organizations have exhibited multisig for different marks. Since multisig just allows a trade

once here is in excess of 1 spot, contingent on the location, it canister be exploited by way of

the excess safety highpoint of the folder. For instance, uncertainty multisig is usual trendy an

connected bitcoin folder and is arranged to necessitate the proprietor's check despite the sign

of the online wallet website page at whatever point a trade is performed after the folder,

vindictive bitcoin removal canister remain anticipated meanwhile an administrator's close to

home-based main isn't secured, despite once the online folder place is expected control by a

pony-trekking ambush. Also, multisig remains developing hooked on managements that

permit removal since the bitcoin folder just concluded biometric evidence before discrete

hardware developing a two-influence validation and dissimilar events [26].

As an crucial answer for hacking assaults of a bitcoin wallet, disconnected, chilly stockpiling

compose wallets, for example, a corporal bitcoin currency or a paper bitcoin folder that isn't

associated with the Web, are accessible. Comparative methodologies incorporate the

equipment compose bitcoin folders to lessen the hazard related with connected exchanges.

Then equipment folder, for example, Tremor, supplies the main in a carefully designed

capacity element associated with the PC concluded USB, that is, just after utilized what's more,

the marked exchange is exchanged utilizing the inside put away key and just when the client is

validated. By the day's end, the limit unit is related exactly after in attendance is a essential to

set up a bitcoin trade, residual in icy stockpiling similar position whatever is left of the period.

In spite of the fact that it is more secure than icy stockpiling in light of the fact that there is

one more confirmation process, issues, for example, loss of chilly stockpiling and absence of

ease of use likewise torment the equipment folder [27].

3.6 Safety of Software

The germ of the product utilized as a part of bitcoin can be basic. In spite of the fact that the

authority Bitcoin Designer Documentation [28] site plainly clarifies altogether bitcoin forms,

then bitcoincentre programming is by way of yet compelling as the reference since the point

by point procedures of the initial bitcoin framework obligate been resolved done the product

executed through Satoshi Nakamoto. In any case, uniform the bitcoincentre programming,

which necessity be more dependable than whatever, isn't allowed from the issue of

programming breakdown, for example, germ. The greatest acclaimed programming germ is

helplessness that happened in 2010. Because of the germ caused by whole number flood, an

unacceptable exchange in which 0.5 bitcoin stayed conveyed as 184 tons bitcoin was

incorporated into an ordinary square, and the issue was not settled until 8 h later. Also, there

was where a square prepared in variant 0.8 remained handled in form 0.7 by way of the folder

remained altered since BerkeleyDB to LevelDB meanwhile the bitcoin variant of the bitcoin

center remained updated after 0.7 to 0.8. It produced the companions of adaptation 0.7 then

associates of variant 0.8 to require distinctive blockchains aimed at 6 h. Together of these

issues remain suitcases demonstrating that an overall trust trendy the safety of bitcoin

Page 10: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Sameena et al, NCICCNDA 2018, AIJR Proceedings 1, pp.422-439, 2018

Proceedings of the 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA 2018)

431

exchanges of square by way of consuming critical profundity afterward a timeframe and

container be undermined through a product germ [29].

3.7 Blockchain Safety Case Trainings

The interest aimed at the safety of bitcoins in view of blockchain consumes expanded

meanwhile pony-trekking cases were accounted for. Mt. Gox, a bitcoin trade situated

fashionable Tokyo, Japan, revealed misfortunes of 8.75 million because of pony-trekking in

June 2011 and bitcoin folder benefit Instant Wallet detailed misfortunes of 4.6 million because

of pony-trekking in April 2013. In November of that time, mysterious commercial centre

Lamb Commercial center remained compelled to close depressed afterward some individual

garment 100 million values of bitcoins. Mt. Gox, which took just endured misfortunes because

of hacking, again revealed misfortunes of 470 million owing to pony-trekking in February

2014. The issues preceded, through the Hong Kong-based bitcoin trade Bitfinex detailing

misfortunes a 65 million because of pony-trekking in August 2016. These issues must brought

issues to light of the requirement for safety.

There have remained scholastic investigations on the safety of blockchain to beat such safety

subjects and numerous identifications have been distributed [30]. Specifically, meanwhile

blockchain is tense bland innovation of digital cash, the harms container be not kidding in

instances of abuse and endeavours to take digital cash happen as often as possible. Thusly, it

appears to be extremely significant to comprehend the assault belongings recognized so far

and to do examinations to attraction up countermeasures.

3.8 Confirmation

An authoritative piece of blockchain safety will be safety identified with the individual main

utilized as a part of encryption. An attacker does dissimilar endeavours to get to a client's near

to home important put absent in the client's PC or then again cell handset keeping in minds

the end goal to drudge the bitcoin. The assailant determination introduces malware happening

the PC or cell phone to release the client's close to home important and utilize it to drudge the

bitcoin. A few examinations have planned equipment symbolic for the endorsement of an

exchange to secure the individual main. Different investigations proposed fortified verification

procedures for the capacity component comprising the bitcoin. Two-influence verification is

thought to remain the main strategy for reinforcing verification. Aimed at bitcoin, the 2-party

moniker convention by ECDSA container can utilized aimed at verification (Figure 3.8)

[31,32].

Page 11: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Security in Cloud Computing Using Blockchain Technology

432 ISBN: 978-81-936820-0-5

Proceedings DOI: 10.21467/proceedings.1

Series: AIJR Proceedings

Figure 3.8 ECSDA two party signature.

3.9 Safety Incidents

With additional individuals utilizing bitcoins, instances of malware then noxious ciphers

focusing on bitcoins must likewise been accounted for. Malware can drudge the bitcoins

through contaminating PCs. Toward settle such an issue, a PC safety arrangement necessity

be introduced toward recognize vindictive cipher [17]. One as of late found vindictive code

plundered amusement books and container be connected for plundering the bitcoin financial

records. Through additional bitcoins existence utilized aimed at the money exchange of web

based amusement things; safety efforts to adapt to it remain required [33].

The Distributed Disavowal of Service (DDoS) assault surges the focused on waiter with

unnecessary solicitations to over-burden tense framework and keep the arrangement about

ordinary support of different clients. Subsequently, it can keep the clients of blockchain from

accepting the administration. DDoS assaults incorporate the data transfer capacity expending

assault that surpasses the transmission capacity of all frameworks utilizing a similar system

what's more, the PPS (Packet Per Second)- devouring assault that causes inward framework

disappointment or the refusal of administration to different servers in a similar system. The

http-flooding assault exchanges a vast sum of hypertext parcels towards a focused on attendant

to reason the foreswearing of administration. Meanwhile the bitcoin benefit necessity is

constantly given to the clients, cure all to DDoS assaults remain required [34].

3.9.1 51% Attack

Now a bitcoin situation, a 51% assault changes along with distorts 51% about the records all

the while. Accordingly, it is an exceptionally troublesome assault to organize. The assailant

must have at least 51% computing capacity of all clients, purposefully create 2 branches, and

usual the focused on division as the genuine blockchain. To take care of affecting issue, a

middle of the road confirmation procedure must be given through forestall alike altering [35,

36]. With it a bitcoin domain, a 51% assault comprises of 5 stages.

1. Distribute withdrawal programming with an advanced EV (Expected Value).

(1) Mine on fresh headings (however approve it at the earliest opportunity)

Page 12: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Sameena et al, NCICCNDA 2018, AIJR Proceedings 1, pp.422-439, 2018

Proceedings of the 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA 2018)

433

(2) More "adaptable" 2-h run the show

(3) Choose on divergence with claim square form quantity

(4) Type excavator mindful of the "Gold finger" compensate

(5) "Individuals just" usefulness

2. Make a pond with tackiness.

(1) Innovative individuals resolve get just 90% of offers in tense initial two weeks and 110%

following two weeks (Ponzi plot)

3. Make undesirable associations (timestamp assault).

4. Assault different ponds with ripping apart ponds.

5. In the end change to individuals as it were.

A race assault creates several exchanges and sends them to various clients when a genuine

exchange is sent. Since numerous clients are probably going to assume the exchanged

exchange to be true blue, misfortunes tin are maintained if 51% away from clients variation

the record. In a Fanny assault, an assailant creates a piece comprising adjusted information

then completes the assault through it. Alike assaults tin can be forestalled when the assault

board crowds the exchange in reserve mode till square affirmation. The twofold spending

issue can be tended to through such a system (Figure 3.9.1) [38].

5. Safe Blockchain Answers of a Cloud Computing: The safety issues for utilizing bitcoin

through blockchain remained presented fashionable Section 3 and safe instances of bitcoins

utilizing blockchain remained investigated trendy Section 4. In striking event that the client

evidence is unveiled in the dispersed calculating disorder, money related and cerebral troubles

can occur since of the hole of clients touchy facts. The safety of the frugal and conveying

material, for example, classification and trustworthiness, in the disseminated calculating

disorder is chiefly anticipated. Memo, in any case, those appraisals on safety assurance and

anonymity are not acceptable. Blockchain is a delegate invention for assuring namelessness.

On the rotten accidental that combined with the dispersed calculating disorder, blockchain tin

be stimulated up to an beneficial management that gives more stranded safety. Client

namelessness container is certain doubt the blockchain technique is exploited as soon as

parsimonious the client records in the dispersed calculating disorder. An electric folder is

presented when exploiting a blockchain invention. In an occasion that the electrical folder isn't

legitimately removed, the client facts can be abandoned.

Page 13: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Security in Cloud Computing Using Blockchain Technology

434 ISBN: 978-81-936820-0-5

Proceedings DOI: 10.21467/proceedings.1

Series: AIJR Proceedings

Figure 3.9.1 dual expenditure deterrence instrument

The respite of the customer facts can be exploited to numeral the client statistics. To take

upkeep of this subject, we suggest an response that familiarizes and expunges the electrical

folder securely. Examples of contaminating the greatest or bitcoin and twofold connections

of blockchain characterize the highest subject. An endangered wallet is expected to take care

of such safety subjects. In meanness of the circumstance that the electrical folder familiarized

in the PC is aimed at the maximum part exploited, the safety of electrical folders in cell

earphones necessity be confirmed as cell earphones have twisted out to remain tremendously

predominant. Meanwhile a conversation transpires fashionable bright of the dated

approximation of a reformatory handset, a safety of a conversation can be confirmed fair once

together the respectability also, meticulousness of dated brand twisted in a cell handset are

safeguarded [28]. Additionally, the foundation should be same as checked since poorly

defended contrast as indicated the programming standards and platform utilized for the

elevation of the mechanized wallet state. A secured mechanized wallet shoud be generated by

restricting and examining error that can happen at each phase of ordering, required

investigation, utilization, QA (Quality Assurance), upkeep. The mechanized wallet should have

Page 14: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Sameena et al, NCICCNDA 2018, AIJR Proceedings 1, pp.422-439, 2018

Proceedings of the 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA 2018)

435

calculated for safely reestablish if interrupt by an attacker, check for a side by side introduced

for insuring yourself, and will guard the remaining information for reestablish. It should

protect the information stored trendy the mechanized folder and most likely the locations

needed aimed at the practice of the mechanized folder. In addition we obligate the volume to

delete the rest of the organized data safely when the mechanized wallet is not everagain reused

and should not be disclosed to anyone. To usage of mechanized wallet securely, a client

establish it on his or her device and the each phase sends the mechanized wallet and organized

data to set up a safeguard domain. The client downloads and inaugurates the mechanized

wallet programming to make use of the bitcoin with blockchain and common society key of

the phase is sent to the mechanized wallet when the development is done. The mechanized

wallet sends the support dispersed amid improvement to the phase, which at some point

assures the justification of the authorization in the mechanized wallet. The phase and the

mechanized wallet trade the key implementation on Diffie– Hellman technique, with has

owning the complementary key. At some point when a client query for an exchange contains

the usage of a bitcoin, the stored information including the time stamp guidance between the

mechanized wallet and the phase are struggle with the common key and sent. At some point

when a requirement for transfer is implemented, the client's verification is found and deleted

from the mechanized wallet and the success communication is sent to acknowledge that it has

remained firmly disposed of. What's needed, all the eligible records are deleted so that the

reaming of the collected data are safely rejected (Figure 3.9.1).

Mechanized wallet programming to make use of the bitcoin with blockchain and user with in

general key of the phase is sent to the mechanized folder once the connection is finished. The

mechanized folder directs the authentication scatter amid progress to the stage, which at some

point makes sure the legitimacy of the support in the mechanized folder. The phase and the

mechanized wallet trade where key uses the Diffie– Hellman strategy, with each having the

mutual key. At some point when a client query for an exchange adding the usage of a bitcoin,

the stored information having the time stamp deals between the mechanized wallet and the

phase are encoded with the same key and sent. At some point when a requiement for transfer

is evaluated, the client's endorsement is detected and erased from the mechanized wallet and

the success communication is sent to acknowledge that it has been firmly willing of. With

extra, altogether the pertinent documents are erased so that reaming part of the information

remains firmly detached (Figure 3.9.2).

This technique utilizes a blockchain-founded automated wallet in the distributed calculating

condition. In blockchain technique remains utilized in the direction of evacuate the data about

the client the one who utilizes distributed calculating. This technique introduces and utilizes

an automated folder and expels it regularly. The automated folder is safely expelled by sending

the completed message.

Page 15: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Security in Cloud Computing Using Blockchain Technology

436 ISBN: 978-81-936820-0-5

Proceedings DOI: 10.21467/proceedings.1

Series: AIJR Proceedings

Figure 3.9.2 Securebitcoin protocol

Hole of client data can be averted as it were at the point when the electronic wallet is totally

expelled. Despite the fact that numerous current examinations must be accomplished

scheduled the blockchain convention, a technique aimed at expelling the automatic folder

totally remains displayed in the direction of guarantee client secrecy and security insurance.

We contrasted a strategy and current investigations regarding classification, respectability,

namelessness, security insurance, and lingering data assurance (Table 1). Privacy forms if the

data is spilled to unapproved peers, though honesty checks if the information utilized as a part

of exchanges are adjusted or misrepresented without endorse amid exchange or capacity.

Secrecy must guarantee that the peer associated with an exchange isn't identifiable. Security

insurance ensures the individual data of associates taking an interest in the exchange, though

leftover data assurance forms the harmless evacuation of client information by the side of the

season of exchange end besides package expulsion.

Table 1.1 comparison of related studies.

Page 16: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Sameena et al, NCICCNDA 2018, AIJR Proceedings 1, pp.422-439, 2018

Proceedings of the 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA 2018)

437

This plan to use a blockchain-based mechanized wallet in distributed calculative

condition.blockchain strategy is being rummage-sale to dismiss the evidence of the client who

customs distributed calculating. A mechanism introduces then habits a mechanized folder and

evacuates it typically. The mechanism folder is firmly expelled through transferring the

completed communication. Break on client data will be forestalled as it were at the point when

the electronic wallet is totally evacuated. Despite the fact that numerous current investigations

was been evaluated on the blockchain convention, the technique for expelling the mechanized

wallet totally was displayed to assure client namelessness and security assurance. We contrasted

the technique and existing investigations as far as classification, uprightness, namelessness,

security insurance, and lingering data assurance (Table 1.1). Classification validates whether

the data is spilled under unapproved systems, while uprightness verify that the information

utilized as a part of exchanges are adjusted or adulterated without authorize amid exchange or

capacity. Secrecy must guarantee that the peer engaged with an exchange isn't identifiable.

Security insurance ensures the individual data of companions taking an interest in the

exchange, though lingering data insurance validates the secure expulsion to client information

for the season of exchange end and strategy evacuation. Here we used RSA algorithm to get

private and public for encryption and decryption of the data.we used MD5 algorithm to

generate a new hash value for each and every transactions made by the user to get a unique id.

CONCLUSIONS

A blockchain consumes disposed of the attendant to deny the relationship of the dominant

master and has supported trades finished the individuals the one in together stock the trade

chronicles and, lastly, support affecting trades by means of peer to peer mastermind

advancement. The blockchain takes a flowed assembly and uses affecting partner framework

then the figuring incomes of buddies. Particular procedures, for instance, resistant of effort

and affirmation of load have remained executed to upgrade the safety of blockchain.

Notwithstanding affecting way that the safety of blockchain is continually updated, issues must

sustained being represented and here are dynamic examinations on safety. An aggressor kinds

distinctive undertakings to get to a customer's near and dear key set away in the customer's

PC or wireless in command to drudge the bitcoin. Here are considers on by means of a

protected symbolic or redeemable it firmly to secure a individual main.

References

1. Il-Kwon, L.; Young-Hyuk, K.; Jae-Gwang, L.; Jae-Pil, L. The Analysis and Countermeasures on Security Breach of

Bitcoin. In Proceedings of the International Conference on Computational Scienceand Its Applications, Guimarães,

Portugal, 30 June–3 July 2014; Springer International Publishing:Cham, Switzerland, 2014.

2. Beikverdi, A.; JooSeok, S. Trend of centralization in Bitcoin’s distributed network. In Proceedings of the 2015 16th

IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and

Parallel/Distributed Computing (SNPD), Takamatsu, Japan, 1–3 June 2015.

Page 17: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Security in Cloud Computing Using Blockchain Technology

438 ISBN: 978-81-936820-0-5

Proceedings DOI: 10.21467/proceedings.1

Series: AIJR Proceedings

3. Bonneau, J.; Miller, A.; Clark, J.; Narayanan, A.; Kroll, J.A.; Felten, E.W. Sok: Research perspectives and challenges for

bitcoin and cryptocurrencies. In Proceedings of the 2015 IEEE Symposium on Security and Privacy (SP), San Jose, CA,

USA, 17–21 May 2015.

4. Christidis, K.; Michael, D. Blockchains and Smart Contracts for the Internet of Things. IEEE Access 2016, 4,2292–2303.

5. Huang, H.; Chen, X.; Wu, Q.; Huang, X.; Shen, J. Bitcoin-based fair payments for outsourcing computation of fog devices.

Future Gener.Comput.Syst. 2016.

6. Huh, S.; Sangrae, C.; Soohyung, K. Managing IoT devices using blockchain platform. In Proceedings of the 2017 19th

International Conference on Advanced Communication Technology (ICACT), Bongpyeong, Korea, 19–22 February

2017.

7. Armknecht, F.; Karame, G.; Mandal, A.; Youssef, F.; Zenner, E. Ripple: Overview and Outlook. In Trust and

Trustworthy Computing; Conti, M., Schunter, M., Askoxylakis, I., Eds.; Springer International Publishing: Cham,

Switzerland, 2015; pp. 163–180.

8. Vasek, M.; Moore, T. There’s No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency

Scams. In Proceedings of the International Conference on Financial Cryptography and Data Security, San Juan, Puerto

Rico, 26–30 January 2015; Springer: Berlin/Heidelberg, Gemany, 2015.

9. Zhang, J.; Nian, X.; Xin, H. A Secure System For Pervasive Social Network-based Healthcare. IEEE Access 2016, 4,

9239–9250.

10. Singh, S.; Jeong, Y.-S.; Park, J.H. A survey on cloud computing security: Issues, threats, and solutions. J. Netw. Comput.

Appl. 2016, 75, 200–222.

11. Kaskaloglu, K. Near zero Bitcoin transaction fees cannot last forever. In Proceedings of the International Conference on

Digital Security and Forensics (DigitalSec2014), The Society of Digital Information and Wireless Communication,

Ostrava, Czech Republic, 24–26 June 2014.

12. Ziegeldorf, J.H.; Matzutt, R.; Henze, M.; Grossmann, F.;Wehrle, K. Secure and anonymous decentralized Bitcoin mixing.

Future Gener.Comput.Syst. 2016.

13. Aitzhan, N.Z.; Davor, S. Security and Privacy in Decentralized Energy Trading through Multi-signatures, Blockchain

and Anonymous Messaging Streams. IEEE Trans. Dependable Secur.Comput.2016, 99.

14. Heilman, E.; Foteini, B.; Sharon, G. Blindly signed contracts: Anonymous on-blockchain and off-blockchainbitcoin

transactions. In Proceedings of the International Conference on Financial Cryptography and Data Security, Christ

Church, Barbados, 22–26 February 2016; Springer: Berlin/Heidelberg, Gemany, 2016.

15. Natoli, C.; Gramoli, V. The blockchain anomaly. In Proceedings of the 2016 IEEE 15th International Symposium on

Network Computing and Applications (NCA), Cambridge, MA, USA, 31 October–2 November 2016.

16. Shi, N. A new proof-of-work mechanism for bitcoin.Financ.Innov.2016, 2, 31.

17. Swan, M. Blockchain: Blueprint for a New Economy; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2015.

18. Tschorsch, F.; Scheuermann, B. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE

Commun. Surv. Tutor. 2015, 18, 2084–2123.

19. Wressnegger, C.; Freeman, K.; Yamaguchi, F.; Rieck, K. Automatically Inferring Malware Signatures for Anti-Virus

Assisted Attacks. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security,

Abu Dhabi, UAE, 02–06 April 2017.

20. Decker, C.; Roger, W. Information propagation in the bitcoin network. In Proceedings of the 2013 IEEE Thirteenth

International Conference on Peer-to-Peer Computing (P2P), Trento, Italy, 9–11 September 2013.

21. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Available online: https://bitcoin.org/en/bitcoin-paper

(accessed on 29 June 2017).

22. Bozic, N.; Guy, P.; Stefano, S. A tutorial on blockchain and applications to secure network control-planes.SCNS IEEE

2016.

23. Bradbury, D. The problem with Bitcoin.Comput.Fraud Secur.2013, 11, 5–8.

24. Paul, G.; Sarkar, P.; Mukherjee, S. Towards a more democratic mining in bitcoins. In Proceedings of the International

Conference on Information Systems Security, Hyderabad, India, 16–20 December 2014; Springer International

Publishing: Cham, Switzerland, 2014.

25. Bamert, T.; Decker, C.; Wattenhofer, R.; Welten, S. BlueWallet: The Secure BitcoinWallet. In Security and Trust

Management; Mauw, S., Jensen, C., Eds.; Springer International Publishing: Cham, Switzerland, 2014; pp. 65–80.

26. Anceaume, E.; Lajoie-Mazenc, T.; Ludinard, R.; Sericola, B. Safety analysis of Bitcoin improvement proposals.In

Proceedings of the 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA),

Cambridge, MA, USA, 31 Octomber–2 November 2016.

Page 18: Security in Cloud Computing Using Blockchain Technology · 2018-12-29 · Security in Cloud Computing Using Blockchain Technology ISBN: 978-81-936820-0-5 424 Proceedings DOI: 10.21467/proceedings.1

Sameena et al, NCICCNDA 2018, AIJR Proceedings 1, pp.422-439, 2018

Proceedings of the 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA 2018)

439

27. Upadhyaya, R.; Jain, A. Cyber ethics and cybercrime: A deep dwelved study into legality, ransomware, underground

web and bitcoin wallet. In Proceedings of the 2016 International Conference on Computing, Communication and

Automation (ICCCA), Noida, India, 29–30 April 2016.

28. Haber, S.; Stornetta, W.S. How to time-stamp a digital document. In Proceedings of the Conference on the Theory and

Application of Cryptography, Sydney, NSW, Australia, 8–11 January 1990; Springer: Berlin/Heidelberg, Gemany, 1990.

29. Eyal, I.; Emin, G.S. Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the International Conference

on Financial Cryptography and Data Security, Christ Church, Barbados, 3–7 March 2014; Springer: Berlin/Heidelberg,

Gemany, 2014.

30. Petersen, K.; Feldt, R.; Mujtaba, S.; Mattsson, M. Systematic Mapping Studies in Software Engineering. In Proceedings

of the 12th International Conference on Evaluation and Assessment in Software Engineering (EASE), Bari, Italy, 26–27

June 2008.

31. Mann, C.; Loebenberger, D. Two-factor authentication for the Bitcoin protocol. In International Workshop on Security

and Trust Management; Springer International Publishing: Cham, Switzerland, 2015.

32. Yuan, Y.; Wang, F.-Y. Towards blockchain-based intelligent transportation systems. In Proceedings of the 2016 IEEE

19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil, 1–4 November 2016.

33. Kogias, E.K.; Jovanovic, P.; Gailly, N.; Khoffi, I.; Gasser, L.; Ford, B. ÉcolePolytechniqueFédérale de Lausanne (EPFL).

Enhancing bitcoin security and performance with strong consistency via collective signing. In Proceedings of the 25th

USENIX Security Symposium (USENIX Security 16), Austin, TX, USA, 10–12 August 2016.

34. Vasek, M.; Thornton, M.; Moore, T. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In

Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 3–

7 March 2014; Springer: Berlin/Heidelberg, Gemany, 2014.

35. Bastiaan, M. Preventing the 51%-Attack: A Stochastic Analysis of Two Phase Proof of Work in Bitcoin.Available online:

http://referaat.cs.utwente.nl/conference/22/paper/7473/preventingthe-51-attack-astochastic-analysis-of-two-phase-

proof-of-work-in-bitcoin.pdf (accessed on 29 June 2017).

36. Kroll, J.A.; Davey, I.C.; Felten, E.W. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries.Proc.

WEIS.2013.

37. Eyal, I.; Gencer, A.E.; Sirer, E.G.; van Renesse, R. Bitcoin-ng: A scalable blockchain protocol. In Proceedings of the

13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), Santa Clara, CA, USA, 2

February 2016.

38. Karame, G.O.; Elli, A.; Srdjan, C. Double-spending fast payments in bitcoin. In Proceedings of the 2012 ACM

Conference on Computer and Communications Security, Raleigh, CA, USA, 16–18 October 2012.