Skip to main content

Comparative Requirements Analysis for the Feasibility of Blockchain for Secure Cloud

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 809))

Abstract

Cloud users are striving for minimum provider interference in accessing services from cloud’s shared pool of resources due to the dynamic and untrusted nature of cloud, and untrusted, vulnerable and greedy nature of Cloud Service Providers (CSPs). Service level agreements (SLA) are a critical aspect in maintaining security, trust and provisioning Quality of Service (QoS) in Cloud. The SLA consists of Service-level goals or the Functional and Non-Functional levels that are officially agreed by the customer and the providers. The SLA lifecycle is costly and time-consuming process. Using Blockchain technology’s use-cases with Cloud can solve the trust and security requirements of cloud users as well as make SLAs transparent and open to cloud users for quick service provisioning. In order to analyze the feasibility of using Blockchain technology with Cloud, this paper, comparatively analyze the Security and trust requirements and Non-Functional requirements of Cloud and Blockchain to solve the security and trust requirements of cloud users in cloud. We also propose a secure and self-adaptive Blockchain based framework for cloud. Blockchain being the backbone of this framework, this framework exploits the feasible use cases of the Blockchain to enhance the trust requirement of the third party (Cloud Service provider) in Cloud and maintain trust and security in the Cloud by making data secure and SLA transparent and open to all Cloud users, aiding users to analyze and make spontaneous decisions for using Cloud services.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Li, J., Jia, C., Li, J., Chen, X.: Outsourcing encryption of attribute-based encryption with MapReduce. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 191–201. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34129-8_17

    Chapter  Google Scholar 

  2. Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. (TPDS) 22(7), 1214–1221 (2011)

    Article  Google Scholar 

  3. Verizon 2015: 2015 Data Breach Investigations Report (2015). http://www.verizonenterprise.com/DBIR/2015/. Accessed 20 Sept 2017

  4. Buyya, R., Yeo, C.S., Venugopal, S.: Market-oriented cloud computing: vision, hype, and reality for delivering it services as computing utilities. In: 10th IEEE International Conference on High Performance Computing and Communications, pp. 5–13. IEEE (2008)

    Google Scholar 

  5. Tang, J., Cui, Y., Li, Q., Ren, K., Liu, J., Buyya, R.: Ensuring security and privacy preservation for cloud data services. ACM Comput. Surv. (CSUR) 49(1), 1–39 (2016)

    Article  Google Scholar 

  6. Rong, C., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1), 47–54 (2013)

    Article  Google Scholar 

  7. Almorsy, M., Grundy, J., Ibrahim, A.S.: MDSE@R: model-driven security engineering at runtime. In: Xiang, Y., Lopez, J., Kuo, C.-C.J., Zhou, W. (eds.) CSS 2012. LNCS, vol. 7672, pp. 279–295. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35362-8_22

    Chapter  Google Scholar 

  8. Kertész, A., Kecskemeti, G., Brandic, I.: An interoperable and self-adaptive approach for SLA-based service virtualization in heterogeneous cloud environments. Future Gener. Comput. Syst. 32, 54–68 (2014)

    Article  Google Scholar 

  9. Aljoumah, E., Al-Mousawi, F., Ahmad, I., Al-Shammri, M., Al-Jady, Z.: SLA in cloud computing architectures: A comprehensive study. Int. J. Grid Distrib. Comput. 8(5), 7–32 (2015)

    Article  Google Scholar 

  10. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  11. Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutorials 1(3), 2084–2123 (2016)

    Article  Google Scholar 

  12. Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc. (2015)

    Google Scholar 

  13. Omohundro, S.: Cryptocurrencies, smart contracts, and artificial intelligence. AI Matters 1(2), 19–21 (2014)

    Article  MathSciNet  Google Scholar 

  14. Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: a global naming and storage system secured by Blockchains. In: USENIX Annual Technical Conference, pp. 181–194 (2016)

    Google Scholar 

  15. Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., Pautasso, C., Rimba, P.: A taxonomy of Blockchain-based systems for architecture design. In: 2017 IEEE International Conference on Software Architecture (ICSA), pp. 243–252. IEEE (2017)

    Google Scholar 

  16. Pilkington, M.: Blockchain technology: principles and Applications. In: Olleros, F.X., Zhegu, M., Elgar, E. (eds.) Research Handbook on Digital Transformations (2016). SSRN: https://ssrn.com/abstract=2662660. Accessed 2015

  17. Xu, X., Pautasso, C., Zhu, L., Gramoli, V., Ponomarev, A., Chen, S.: The blockchain as a software connector. In: 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), pp. 182–191. IEEE (2016)

    Google Scholar 

  18. Rimba, P., Tran, A.B., Weber, I., Staples, M., Ponomarev, A., Xu, X.: Comparing Blockchain and cloud services for business process execution. In: 2017 IEEE International Conference on Software Architecture (ICSA), pp. 257–280. IEEE (2017)

    Google Scholar 

  19. Ludwig, H., Keller, A., Dan, A., King, R.P., Franck, R: Web service level agreement (WSLA) language specification. IBM Corporation, pp. 815–824 (2003)

    Google Scholar 

Download references

Acknowledgement

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2017R1D1A1B03034279).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seok-Won Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, I., Lee, SW. (2018). Comparative Requirements Analysis for the Feasibility of Blockchain for Secure Cloud. In: Kamalrudin, M., Ahmad, S., Ikram, N. (eds) Requirements Engineering for Internet of Things. APRES 2017. Communications in Computer and Information Science, vol 809. Springer, Singapore. https://doi.org/10.1007/978-981-10-7796-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7796-8_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7795-1

  • Online ISBN: 978-981-10-7796-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics