Professional Documents
Culture Documents
Literature Review
PRATIMA SHARMA and RAJNI JINDAL, Delhi Technological University, Delhi, India
MALAYA DUTTA BORAH, National Institute of Technology Silchar, Assam, India
The demand for Blockchain innovation and the significance of its application has inspired ever-progressing
exploration in various scientific and practical areas. Even though it is still in the initial testing stage, the
blockchain is being viewed as a progressive solution to address present-day technology concerns, such as de-
centralization, identity, trust, character, ownership of data, and information-driven choices. Simultaneously,
the world is facing an increase in the diversity and quantity of digital information produced by machines and
users. While effectively looking for the ideal approach to storing and processing cloud data, the blockchain
innovation provides significant inputs. This article reviews the application of blockchain technology for se-
curing cloud storage.
CCS Concepts: • General and reference → Surveys and overviews; • Computer systems organization
→ Peer-to-peer architectures; • Information systems → Distributed storage; • Security and privacy →
Security services;
Additional Key Words and Phrases: Blockchain technology, decentralization, cloud computing, cloud security,
cloud storage
ACM Reference format:
Pratima Sharma, Rajni Jindal, and Malaya Dutta Borah. 2020. Blockchain Technology for Cloud Storage: A
Systematic Literature Review. ACM Comput. Surv. 53, 4, Article 89 (August 2020), 32 pages.
https://doi.org/10.1145/3403954
1 INTRODUCTION
In recent years, cloud technology has attained an emerging trend by showing a possibility in both
academia and industry for its efficiency and availability. Although it is a widely accepted technol-
ogy, with an outburst of data origins, there has been an increased issue of storage and usage of
data owing to the inability of a conventional data management tool to manage the exponentially
growing data. The traditional cloud storage model comprised a back-end platform that could be
storage or server, a front-end platform that could be a mobile device or a client and a network,
possibly an intranet or internet. Attention is given to cloud technology with this outburst of data
origin by the researchers in presenting solutions for the intricacies of storage and usability in cloud 89
storage technology [1].
Author’s addresses: P. Sharma and R. Jindal, Department of Computer Science and Engineering, Delhi Technological Uni-
versity, Bawana Road, Delhi-110042, India; emails: pratimasharma1114@gmail.com, rajnijindal@dce.ac.in; M. D. Borah,
Department of Computer Science and Engineering, National Institute of Technology Silchar, Fakiratilla, Silchar, Assam
788010, India; email: malayaduttaborah@gmail.com.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and
the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored.
Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires
prior specific permission and/or a fee. Request permissions from permissions@acm.org.
© 2020 Association for Computing Machinery.
0360-0300/2020/08-ART89 $15.00
https://doi.org/10.1145/3403954
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:2 P. Sharma et al.
Cloud computing is usually adopted in military and commercial environments to aid in data
storage. The heterogeneous environments of cloud computing are distributed with various com-
ponents of the hardware and software that are obtained from the vendors, which could introduce
incompatibility and vulnerabilities. The security affirmation of inter- and intra-cloud transfer and
management of information emerges as a key issue [2]. Cloud computing is a pay-per-use model
to enable on-demand, convenient available network access for shared computing resources, such
as storage, servers, applications, and networks, which could be provisioned quickly and released
with minimum effort of management or interaction with the service providers [3, 4].
Outsourcing computation is a vital service provided by cloud computing, thereby acting as one
of the significant advantages of the cloud. With the approach of pay-per-use, the computing re-
sources are used by the cloud, further overcoming the limitations of computationally weak devices
[5, 6] by outsourcing their data within the cloud. The user can rent and pay the storage services or
utility computation based on the requirement with the help of the cloud services. When compared
with traditional storage techniques, the cloud is more flexible and has elasticity [7]. The user device
has a limited storage capacity, so the data are stored on the cloud. For the classifier and data, con-
fidentiality is vital because of privacy requirements, and the service provider is not trusted [8, 9].
The major challenge explored and highlighted by the researchers is the processing and storing
of data into the cloud. Moreover, while saving the data, the issue of heterogeneity is considered
the main challenge for the researchers. This issue of heterogeneity in data storage is termed as
big data or large-scale data. The cloud environment and the technology of the blockchain [10] are
adapted for this usability. Therefore, for the improvement in the performance of existing appli-
cations, these two approaches are combined [11]. Therefore, blockchain is a distributed and safe
networking system in which many computers called nodes are stored. This technology is of the
utmost importance with many possibilities for transmitting and storing a vast volume of data. It
also minimizes costs and improves accuracy [12].
In this survey article, the following main points are covered:
Figure 1 illustrates an overview of the study in the form of a block diagram. First, the article
presents an overview of cloud computing and blockchain as separate concepts, reviews the studies
that integrate blockchain and cloud storage, and analyzes real-life projects based on blockchain and
cloud storage. Finally, some properties of blockchain for secure cloud storage are analyzed, chal-
lenges are discussed, inferences are drawn from the study, and some suggestions are made based
on the inferences. This article is arranged as follows: Section 2 discusses the procedure for the sys-
tematic literature review. Section 3 covers the background details of cloud storage and blockchain
technology. The work-related to cloud computing and blockchain technology is explained in
Section 4. Section 5 covers the study of current blockchain-based cloud storage. Section 6 includes
the various real-life projects related to blockchain-based decentralized cloud storage technolo-
gies. Section 7 presents the properties of blockchain-based secure cloud storage. Blockchain and
cloud storage integration requirements and challenges are listed in Section 8. Section 9 highlights
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:3
inferences and suggestions related to blockchain-based cloud storage. Finally, conclusions are pro-
vided in Section 10.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:4 P. Sharma et al.
• RQ2: What are the different strategies used for preventing the illegal use of data stored on
the cloud?
To identify the different techniques that are used for preventing the stored information in the
cloud.
• RQ3: What are the main security difficulties to be faced in the future based on cloud storage
technology?
To study and understand the blockchain technology, we thereby collected all the critical research
papers from logical databases and mapped the current research area.
• RQ5: What are blockchain technology’s current research topics for cloud storage?
To study and understand the blockchain technology-based cloud storage techniques. This
would, hence, help the researchers to figure out the present research topics related to blockchain
technology for cloud storage.
• RQ6: What are the different methods utilized to save, delete, and update the cloud data using
blockchain technology?
To study and understand the methods used to perform the various operation on the cloud data
using blockchain technology.
The search was directed from 2010 until 2019 by utilizing the online logical database. The search
methodology for the survey was necessarily coordinated toward finding distributed papers in jour-
nals and conference papers through the accepted literature search engines and databases Google
Scholar, Springer Digital Library, ACM Digital Library, IEEE Xplore, Elsevier and Science Direct. In
2018, the published articles had the highest rank. Likewise, papers distribution based on published
articles from 2010–2019 appears in Figure 3.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:5
50
No. of References
40 39 40
30
20 22
15
10
3 2 5 5
2 2
0
2010 2011 2012 2013 2014 2015 2016 2017 2018 2019
Year
3 BACKGROUND
3.1 Overview of Cloud Storage
The cloud is described as the chain of servers and connections to give a computing benefit for
storing the user data. Presently, several organizations and internet sources are adopting cloud
storage for individual and organizational users [13]. One of the cloud computing models is cloud
storage, which stores a colossal amount of data and can be retrieved using the internet. Cloud
storage service providers can control any data, i.e., organized or semi-organized [14].
Cloud storage provides a deliberation to physical capacity gadgets. Also, it presents information
storage as a service, regularly charged on a user premise. It is this reason for cloud storage, which
enables a client to store and access information records someplace within the cloud, without un-
derstanding the points of interest of where documents are saved. Moreover, the record can be made
accessible on a worldwide premise in cloud storage [15]. The expansion of the number of clients
who put their benefits on the cloud has led the cloud storage to become an important theme. How-
ever, these clients regularly do not trust the fact where their information will be stored and who
will approach this information. Hence, numerous clients feel the commitment of applying safety
efforts to have an aggregate authority over their information. For this, authentication, integrity,
availability, confidentiality, and privacy problems are the requirements that the users look for. In
the explicit instance of endeavor, these suggest essential contemplation; ought to be incorporated
into any cloud benefit contract.
4 RELATED WORK
This segment presents research works relating to traditional cloud computing techniques that
proved their significant improvement toward increasing security and academic studies on the
blockchain and cloud computing.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:7
and Communications Technology (ICT) and cloud services progressed, numerous scientific work
has been dedicated to increasing the performance and safety of the data. To protect user data
stored on the cloud, a symmetric cryptographic scheme is used with encrypted bloom filters to al-
low the user to recognize unauthorized modifications in the outsourced data [28]. In 2018, Yunxue
Yan et al. [29] developed a protection scheme to enhance the security of signature information for
user data. In [30], the authors proposed an integrity assurance algorithm using a standard storage
template for various control methods. Tags for validation and process generating proofs relied on
the index pointers. In References [31–34], the authors introduced a novel and efficient integrity
verification technique by using various approaches like Merkle hash tree, proof of storage, and
paillier homomorphic cryptography method, respectively. In References [35, 37], the authors il-
lustrated a safe group user revocation method with an effective public integrity audit scheme. It
facilitated public monitoring and the effective removal of users. Yibin Li et al. [38] concentrated
on the problems of cloud operator misuse concerns aimed to prevent the cloud user’s data re-
lease from cloud servers. Pooranian et al. [39] proposed a RAndom REsponse (RARE) method
that removed the cloud storage facilities deduplication response side channel and retained the use
of deduplication simultaneously. Chia-Mu Yu et al. [40] proposed a zero-knowledge deduplica-
tion response as a side-channel shield that is based on a zero-knowledge cross-user deduplication
response structure. Although these schemes provide secure storage, integrity checking, efficient
user revocation, and data duplication removal, there are still some problems existing in the sys-
tems, such as centralized data storage that severely harms physical server security and the need
for trusted third-party, which are nightmares for the privacy of users’ data. It has been observed
that most methods consider only static data sets and does not apply to a large volume of data.
The issues of cloud storage data security are not resolved through some techniques. Therefore, it
seems very meaningful to understand the blockchain-based solutions for cloud storage known so
far and to carry out investigations to conclude.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:8 P. Sharma et al.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:9
“y” generates a token for a keyword and send it back to Master “x”; (4) Master x receives the token
and send it to the cloud; (5) To locate the appropriate encoded documents, the cloud utilizes the
token and send the resultant documents back to Master x. (?) At any time, Master y’s data verifier
can confirm the integrity of the information.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:10 P. Sharma et al.
resources. The disk-level deduplication is further divided into two parts; these are forward refer-
ence deduplication and backward reference deduplication.
5.3 Blockchain-based Data Integrity Checking Technique for Cloud Storage Service
The decentralized data integrity checking is enabled by a blockchain-based structure for cloud
storage services. The integrity checking method is mostly dependent on three components. They
are the blockchain, the Cloud Storage Service Provider (CSS), to which the information is out-
sourced and the data user. Data Integrity Service (DIS) is built on the structure of the blockchain.
The blockchain client should be started initially on nodes when the DIS is needed [59]. Blockchain
can use Merkle trees for data integrity verification. This comprises two phases: the pre-processing
stage and the validation phase.
• Pre-processing phase: Initially, the data are sliced by the data consumer to form different
shards, and these shards are then used for constructing a hash Merkle tree. Then, the con-
sumer and CSS will approve the hash Merkle trees, and the consumer stores the root of
this hash tree. The user data and public Merkle trees are uploaded on CSS. CSS sends the
address of the stored user’s data to the user.
• Verification phase: CSS receives a challenge number from the client, and it is used to select
shards to check. The hash function is used based on challenge number and shard to cal-
culate a hash digest. CSS forward digest and the equivalent are supporting statistics to the
blockchain. The smart contract calculates a fresh hash root and compares the hash roots.
The data integrity will be assured when the hash roots are equal. If not, then data integrity
has been degraded. Finally, the verified output is sent to the client by the blockchain [60].
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:11
system while storing the data. To manage huge volumes of data, the MapReduce method is used,
but it is not suitable for a relational database management system [62]. BigchainDB is a masterless,
scalable, decentralized database of cloud data storage. BigchainDB is incorporated on top of a
NoSQL RethinkDB database as an additional layer, which is efficient storage for cloud storage. It
utilizes a database underlying and provides blockchain-like functionalities such as hashed blocks,
transactions, voting, and record immutability [63].
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:12 P. Sharma et al.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:13
using the same “one-bit-return” protocol procedure: The cloud server removes the data and re-
verses the one-bit result. The owner of the information must trust the outcome, because the owner
cannot verify it. Consequently, the deletion scheme based on the blockchain can increase trans-
parency in the deletion operation. The data owner may test the deletion result irrespective of how
malevolently the cloud server behaves. Also, the safe deletion technique can obtain public vali-
dation without any third party with the application of blockchain [73]. Even though deleting the
data securely has been hypothetically explained; however, the proposed plans still have two char-
acteristic constraints. The majority of the proposed plans with overwriting strategy are unable to
support verification. In such protocols, the owner of the information must accept the framework
of managing the data, since they cannot check the consequence of data deletion. Despite a few
schemes verifying, they have to introduce a third party that can be trusted. The other innate con-
straints are that the proposed conventions are not effective in the case of practical applications.
It is considerable for designing secure information deletion plans to erase information effectively
and permanently [74].
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:14 P. Sharma et al.
manager cannot change the changed records discretionarily. The Performance Evaluation indicates
the proposed plan is safe and effective.
A smart and decentralized public auditing plan for cloud storage was proposed in Reference
[80]. By bringing the blockchain framework into the plan eliminated the TPA in the framework
model. Stability and reliability are enhanced because of the completely decentralized development.
Likewise, they developed an automatic auditing protocol along with the smart contract, which can
check periodically the integrity of the data in the cloud instead of the owner of the data. Hence
this ensures that the data owner is rid of the periodic verification burden. Since every single, smart
contract is executed and stored by all nodes in the system, the audit results cannot be altered.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:15
since they have improved safety and are not constrained by the transactional speed restrictions.
In a traditional on-chain transaction, each transfer would have to be validated by all peers in the
network before the transfer is labelled as complete, which keeps it very slow. In contrast, in an
off-chain transfer, not all peers need to wait for the transfer to be verified before it is labelled as
successful or complete.
Because off-chain platforms are not linked to the public internet, it is more protected, since
it is very close to the protection that could achieve by deploying a server or software in the in-
tranet as opposed to the internet. The on-chain transaction includes a lot of members checking
transfers, and all participants’ validation signatures have to be an exact match to be considered
valid for that transaction. Whereas the details of each exchange are released for inspection on the
public blockchain so that they are not altered or turned back, this may take longer than for off-
chain transactions. Also, there is a very probable possibility for the payment costs to be costly, as
participants can choose the off-chain scheme [84].
In an article published by IBM [85], off-chain transactions deal with “values outside of the
Blockchain that can be finished using a variety of methods.” Both sides must concur on the transfer,
and then another party comes in to verify the transaction. Because non-transaction information
such as images, agreements, PDFs, and private data are not recommended to be stored in the main
blockchain database, some kind of off-chain or sideDB space is required. A hash or signature will
be produced for the off-chain object, and that is what is kept in the blockchain database. The in-
dividual object is stored either in the cloud, on-premises, or in a near-cloud storage network. The
needed capacity for off-chain data is expected to exceed storage requirements for the blockchain
database. Any kind of off-chain transaction is pretty fast and immediate, without the higher on-
chain transaction fees.
The various applications of blockchain technology for cloud storage and their properties are
summarized in Tables 1 and 2. Removal of duplicate data on the cloud, storage of cloud data using
blockchain, maintaining the security of the cloud data, encryption methods, security and privacy
issues, safe deletion of data, secure access control mechanism, off-chain cloud storage, and fair
payment method utilized for cloud services using blockchain technology are presented in these
tables.
6.1 MaidSafe
The SAFE (Secure Access For Everyone) Network is a P2P decentralized network of data and com-
munications built by MaidSafe.net. The framework supports all existing centralized web applica-
tions and data centers with a secure and confidential network of additional computing resources
for their users. SAFE Network is a distributed, independent data storage and communications net-
work [97]. The performance, reliability, privacy, and security of the network data are incredibly
high. The current server-client-based internet offers information possession to whoever manages
the servers, rather than to the data-creating people. The following categories are selected to ana-
lyze the network.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:16 P. Sharma et al.
Authors Finding
Hoang Giang Do Presented a BlockDS system for providing a reliable distributed storage service for
et al. [55] searching keywords using blockchain technology.
Jingyi Li et al. [56] Suggested a deduplication scheme that allocates files to multiple servers and documents
blockchain storage information. They describe smart contract-based protocols to ensure
secure deduplication without central authority participants.
Bin Liu et al. [59] Suggested a framework for integrity service based on blockchain. This framework pro-
vides a more trustworthy verification of the integrity of data for both consumers and
data holders without depending on a trusted party.
Dongdong Yue In P2P cloud storage, a blockchain-based method for verifying data integrity is intro-
et al. [60] duced to make the verification process more effective and open. In this context, the
Merkle tree is presented to identify data integrity and evaluate performance and relia-
bility under various Merkle tree structures.
Josef Gattermayer Proposed a multi-level system for clusters dependent on cryptocurrency principles to
et al. [63] obtain a masterless reputation rating throughout the cluster.
Jiaxing Li et al. [66] Proposed a blockchain-based system for distributed cloud storage that would allow cus-
tomers to divide their documents into encrypted chunks of information and upload
them randomly to a peer-to-peer network.
Ilya Sukhodolskiy Developed a model for controlling the access depending on blockchain, stored data in
et al. [67] untrustworthy space, and implemented attribute encryption based on Ethereum smart
contracts.
Jason Paul Cruz An RBAC-SC was introduced to implement a trans-organizational framework for RBAC.
et al. [69] Safe RBAC method (users cannot disguise roles and only allowed users must perform
tasks), customer-oriented method (customers can report their duties to any agency),
testable (everyone can verify the position of the user).
Yinghui Zhang Introduced a BCPay, a cloud computing service payment system focused on blockchain.
et al. [72] This system ensures that without any trusted party, the outsourcing services are paid
safely and reasonably.
Changsong Yanga Build a novel, data deletion scheme based on blockchain. If the server may not honestly
et al. [73] delete the information, then this scheme allows the data owner to identify the cloud
server’s malevolent operation.
Sharma et al. [86] The authors developed a novel architecture based on a decentralized blockchain cloud
with an activated SDN controller at the end of the network to fulfill the essential design
principles.
Hasan et al. [87] Developed an effective method to use blockchain and IFPS (InterPlanetary File System)
to store provenance information. Users were also able to check the validity of their
results.
Manzoor et al. [88] This study proposes a blockchain-based trading platform combined with a pairing free
proxy re-encoding scheme to transfer sensor data to the user securely.
Zhang et al. [89] Development of a certificate less public validation technique against the procrastinat-
ing auditor, namely, CPVPA, using on-chain currencies. Here, the verification process
conducted is combined with the on-chain blockchain currency payment.
Wang et al. [90] Developed a decentralized scheme for securing cloud storage using access control. The
conventional encryption algorithm based on attributes was modified by the introduc-
tion of Ethereum’s smart contract technique. The distribution key is not reliant on the
central authority, thus preventing the attacks on the central authority.
Zhang et al. [91] A secure technique of Public-key encryption with an option to search for keywords re-
ferred to as SEPSE against keyword guessing attacks (KGA) is developed. In this scheme,
users can encrypt keywords through a threshold with the help of specific key servers.
(Continued)
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:17
Table 1. Continued
Authors Finding
Tosh et al. [92] A BlockCloud has been developed for the cloud computing framework, a blockchain-
enabled information provenance architecture. Also, a PoS consensus mechanism was
presented for BlockCloud to lessen the overhead of computational necessities that the
conventional PoW consensus requires.
Chen et al. [93] They developed a framework for storing medical data by using blockchain and cloud
storage technologies so that the data could be stored and shared safely.
Cao et al. [94] A secure eHealth framework assisted by the cloud referred to as TP-EHR, which ensured
the integrity, correctness, and confidentiality of outsourced EHRs without the introduc-
tion of a trusted entity was developed. The EHR generated by a doctor during the period
of treatment was unified into the transaction of currencies based on blockchain. This
technique employed a key agreement based on a user-friendly password for establish-
ing channels among the doctors and the patients that are safe and can prevent attacks
of guessing passwords without the need for any extra investments.
Wang et al. [95] A system that combined the attribute-based encryption (ABE), Ethereum blockchain,
and decentralized storage system IPFS. The data holder can transmit the secret key
to users and encrypt the shared information by specifying the access policy and the
technique that has been done with fine-grained data access control.
Wang et al. [79] Developed protocol for cloud storage by utilizing blockchain and Rank-based Merkle
AVL tree (RB-MHT) to accomplish preservation of privacy and batch auditing for main-
taining the security of the modified record in the scheme based on blockchain.
Yu et al. [80] Developed a smart and decentralized public auditing plan for cloud storage, which elim-
inated the requirement TPA for auditing.
Chen et al. [96] Suggested a performance-driven, auction-based reward system based on a blockchain
consortium that ensures belief for both on-chain and off-chain information. Authors
implemented a consortium that used as a distributed hyperledger to tackle on-chain
data protection. Using an information performance-driven auction system, the assessed
data performance used to maintain trust in off-chain data.
Distributed Storage: SAFE network resources are never higher than 1 MB each. Clients oper-
ating with files greater than 1 MB would then have their data broken into 1 MB chunks, which will
then be spread around a network. This specifies that a standard file consists of several parts: chunks
that are individual portions of 1 MB after breaking the file and a datamap that stores each portion
of the file’s identifier. The client maintains a datamap record of the resource identifier. Therefore,
the entire file can be retrieved by first retrieving the particular resource (i.e., the datamap) even
though it is distributed over many individual resources.
Consensus: Utilizing a method called Proof of Resource (POR), the system can validate in a
mathematically verifiable manner which and what provides the resource. It is achieved by the
network trying to save and access chunks of data on/from its nodes. A node’s ability to perform
such activities will be calculated by a combination of its CPU power, availability of bandwidth,
unused storage space, and online time.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:18 P. Sharma et al.
Blockchain-based
Access
Work Confidentiality Integrity Authentication Searching Auditing distributed cloud
Control
data storage
[55]
[56]
[59]
[60]
[63]
[66]
[67]
[69]
[72]
[73]
[86]
[87]
[88]
[89]
[90]
[91]
[92]
[93]
[94]
[95]
[79]
[80]
Confidentiality: -> privacy of information achieves through encryption and data access management.
Integrity: -> to manage unauthorized manipulation of data.
Authentication: -> to identify the valid user.
Access Control: -> to identify permission to use a resource.
Searching: -> process of locating data on the cloud.
Auditing: -> examination of records to validate data security.
Blockchain-based cloud storage: -> decentralized storage of cloud data without trusted parties.
Distributed Database: Upon uploading, the Sia program divides files into 30 parts, each tar-
geted towards distribution to hosts worldwide. This distribution means no one host serves a single
failure point and increases overall network uptime and redundancy.
Encryption: Every section of the file is encrypted before entering a renter’s machine. It means
that only authenticated pieces of user data are stored in hosts. It is different from traditional cloud
storage services like Amazon, which does not opt to encrypt user data. Sia utilizes the Twofish
algorithm, an open-source and secure encryption standard [115].
Smart Contract: The renters form file contracts with hosts using the Sia blockchain. These
contracts set rates, expectations on uptime, and other aspects of the renters-hosts partnership.
The smart contract enables to create cryptographic Service-Level Agreements (SLAs), which are
collected on the Sia blockchain. Since the network automatically enforces file contracts, Sia does
not need intermediaries or trusted third parties.
Payment Method: Renters and hosts both use Siacoin, a special crypto-currency developed
on the blockchain of Sia. Renters utilize Siacoin to purchase storage space from hosts, while hosts
spend Siacoin as collateral in each file contract. After a file contract, the host must show that he/she
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:19
is saving the data for the renter. It is called proof of storage if the proof of storage appears on the
blockchain within a given time, the host will be paid. If not, then the host will be penalized.
6.3 Storj
The Storj network is a reliable store of objects that encodes, fragments, and disperses data for
storage to nodes worldwide. Information is kept and delivered in a way intended to prevent viola-
tions. The platform that underlies Storj is a peer-to-peer, implementable space contract. It is a way
for two entities (or computers) to decide to trade a certain amount of storage for money without
knowing each other. They call the machine-selling space the “farmer,” and the computer-buying
space, the “renter.” Storj implements encryption on the client-side, which means that only the
person who uploads the file has access to that. Sharding is used for the splitting of data between
several nodes [100]. For decentralized networks, this provides stability, preserving connectivity
even when nodes fall off the network. Also, if a network host could decrypt a file, then they would
have only one small piece. Hosts are “audited” continuously with an automated algorithm that
verifies that they have the documents that they claim to have.
Distributed Hash Table (DHT): A DHT is simply a means of transforming a bunch of self-
organized nodes into a functional web. The DHT enables farmers and tenants to transmit their
contract offers to a large node community rather than having a central server register each node
and manage all contracts.
Contracts and Audits: A fixed-term contract. Over this period, the renter keeps an eye that
the farmer is still available. The farmer responds with encoded evidence that the file is still in
them. The renter ends up paying the farmer for every proof they get and verify. This method of
challenge-> evidence-> payment is called an “audit,” since the renter audits the farmer’s storage.
Web Applications (dapps) code and data and blockchain data. From an economic perspective,
it allows users to pool their storage and bandwidth resources to provide those utilities to all
members of the network. At the same time, Ethereum encourages them to do so. Swarm [101]
offers a peer-to-peer application and service solution that is fault-tolerant, surveillance-resistant,
and auto-sustaining and facilitates transaction exchange resources. The following selected
categories are summarized below.
Distributed Database: Uploading data comprises of posting information at local Swarm node,
followed by “synchronizing” local Swarm node to the resulting chunks of data with their peers in
the network. In the meantime, downloading content comprises of local Swarm node querying the
appropriate chunks of data for its peers in the network and then reconstructing the information
locally.
Encryption: The encryption feature is intended to protect the data and make the shredded
information hard to read for any Swarm node handling. To encrypt and decrypt the content, Swarm
uses counter mode encryption. When uploading content to Swarm, the uploaded data is broken
down into 4 KB chunks. These chunks are all encoded with a separate encryption key created at
random.
6.5 Filecoin
Filecoin is a distributed platform [102] that transforms the cloud storage over an algorithmic sector.
The platform executes on a blockchain with a proprietary token (also called as “Filecoin”), which
miners are obtaining by supplying space for storage to clients. Instead, customers are spending
Filecoin employing miners to save or circulate data. Filecoin functions as a reward layer on top of
IPFS [103] that can provide any data storage infrastructure.
Decentralized Storage Network (DSN): Filecoin DSN is a distributed storage system that
can be audited, publicly validated, and incentively built. Customers pay a network of miners for
information storage and retrieval; in return for fees, miners provide disk space and bandwidth.
DSNs cumulative repository provided by numerous individual space suppliers and self-contained,
providing customers with data storage and access.
Consensus: Storage providers have to persuade their customers in the Filecoin protocol that
they saved the information they were paying to store; in practice, storage providers must create
Proofs-of-Storage (PoS) that the blockchain network (or the customers themselves) verifies. Proof-
of-Replication (PoRep) is a novel Proof-of-Storage that enables a server to persuade a customer
that certain information has been repeated into its own unique physical space. Proof-of-storage
systems allow customers to verify whether a storage provider is storing the outsourced data at the
moment of the challenge.
Smart Contract: Filecoin offers end-users with two core primitives: Get and Put. These
primitives enable customers to store information at their preferred price and to retrieve data from
the markets. In contrast, the primitives provide the standard use cases for Filecoin by promoting
smart contracts.
6.6 IPFS: InterPlanetary File System
The IPFS is a decentralized, peer-to-peer file network designed to link all computer nodes to the
same file system. IPFS integrates a distributed hash table, a block sharing reward, and a self-
certification namespace. IPFS has no single point of fault, and nodes do not need to believe each
other. IPFS is a P2P document sharing method aimed at radically changing the way information
is shared across the globe. IPFS [103] is made up of a variety of developments in communication
protocols and decentralized systems combined to create a file system like no other. Nodes can
store and share data with the Distributed Hash Table without central coordination. The following
categories are selected for analyzing the IPFS network.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:21
Distributed Hash Table: A hash table is a set of information that gathers data as key/value sets.
Information is distributed over a network in DHT and organized effectively to allow fast access
and lookup between nodes. Decentralization, fault tolerance, and scalability are the key benefits
of DHTs.
Merkle DAG: A Merkle DAG is a combination of a Merkle tree and a Directed Acyclic Graph.
Merkle trees guarantee right, undamaged and unaltered data blocks exchanged over P2P networks.
This test is done by using hash algorithms to group data blocks. Hash is primarily a function that
takes up the input and generates a single alphanumeric (hash) sequence, which refers to that input.
Table 3 highlighted the basic building blocks of distributed technologies.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:22 P. Sharma et al.
file, then the file signature will be invalid. No one can deny that blockchain offers a reliable
and secure solution with independent information confirmation.
• Reliable Service: Blockchain is a representative anonymity technology. Blockchain can
be upgraded to a reliable service in combination with the cloud computing environment
[107]. The blockchain makes it unfeasibly hard for attackers to obtain and split network
data from a storage process. The blockchain’s information is distributed, encrypted, and
cross-checked.
• Obscurity Empowering: The public blockchains have gotten the early features and ap-
provals for empowering obscurity, making private blockchains that confine access to spe-
cific clients. Regardless of this, we understand the advantages of a decentralized distributed
system. Yet, anybody getting to a private blockchain must validate their personality to ob-
tain entrance benefits, which tend to be limited to specific transactions, thereby increases
privacy protection [108].
• Automation through smart contracts: One of the most likely consequences of blockchain
technology is companies and individuals’ potential to cut off the intermediaries in terms of
information monitoring. However, one blockchain-related technology that would improve
how people make a trade is smart contracts, which can potentially automate all transactions
and exchanges.
• Verifiability: Blockchain not only stores data in a distributed and authenticated manner
but also offers a serial chain with a cryptographic hash of the block in each transaction for
the verification purpose. It connects the blocks, creating a decentralized and tamper-proof
transaction ledger.
For blockchain systems, the transaction number can be massive. The enormous amounts of
information created need flexible resources in information handling. Scalability and Flexibility
are perhaps the most critical functionalities within the cloud frameworks to provide dynamically
changing activities with on-demand cloud properties. Public clouds have the potential to deliver
a large-scale resource network that is open to consumers who pay only for those that are being
used. More often than not, private clouds should be configured to accommodate enormous datasets.
Cloud systems can effectively cover the physical area of knowledge from a security perspective.
Tuning experiments can be continuously performed with a negligible impact on deployed appli-
cations, which is crucial to the successful implementation of most blockchain algorithms. Any
blockchain system must accept data sovereignty rules and store and process the information only
in areas allowed by the guidelines. This means that the cloud service provider requires its cus-
tomers to have control over the areas in which their information is processed and stored. Another
significant problem with blockchain systems is the resilience of the architecture and the power
to a fault. This means that even a single node failure in the blockchain network should not af-
fect the entire framework’s work. In these instances, cloud services aid by replicating the stored
information and using different programming applications.
At last, using the algorithms of the blockchain might enhance the blockchain framework se-
curity. Within a centralized cloud environment, the program could be managed centrally with
information being stored on the local data server. Oracle Blockchain Cloud Service venture [110]
and iEx.ec venture [111] are ongoing instances of such effective coordination of the blockchain
with cloud stages.
The mapping of blockchain technology features with the safety services supplied to protect
cloud information is presented in Table 4. This table shows the case where we can take advantage
of the numerous blockchain features to ensure cloud data privacy, confidentiality, accessibility,
and transparency, thus increasing efficiency and accuracy.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:24 P. Sharma et al.
party. It could be used to create a blockchain-based identity system, making it possible for
entities to handle it, offering them more power over who has their data and how they access
it. It is, therefore, necessary to combine the decentralized blockchain principle with identity
control to create a digital ID that will function as a digital watermark that can be given to
any internet transaction [112].
• Secure Data Classification: Cloud computing data centers can store the data of distinctive
users. Based on the importance of information, the characterization of information provides
security in the cloud. Dependent on the category of data, this scheme offers various aspects
such as recurrence, refresh recurrence, and access by different users [113]. The security level
incorporates classification, encryption, respectability, capacity, and so on that are chosen to
depend on the type of information [114]. The classified information must be secured, since
it contains the most sensitive information. There is a definite need for a better solution
based on blockchain security methods to secure a customer’s classified information.
• Cloud Computing Service for Trust-based Secure Solution: The security domain for im-
plementation of the cloud computing administrations alongside in general security contem-
plations is a test. The cloud computing framework should be focused on the requirement
of a secure and trusted solution based on blockchain for cloud computing service [115].
Blockchain is a concept aimed at decentralization as a security measure, has the function
of creating a global index for all transactions that take place in a given network and makes
them unchangeable [116].
• Infrastructure Security: Concerning which party (customer or CSP) provides which pro-
tection methods there is a need for transparency. There is likely a need for agreement,
which gives the details about the security capacities and more noteworthy confirmation
over the CSP’s efforts and capabilities [117]. To address the issues, the identity administra-
tion system needs to be adopted in the current blockchain infrastructure for resolving the
interrelationship between service model, user, and system [118].
• Data Storage and Security: For the future of cloud computing, information security abil-
ities are significant. This allows us to save information in the cloud and be safe. For data
storage and security in the future, they combined with the present deficient encryption, key
administration capacities, and cryptographic research endeavors. For example, to restrain
the amount of information, the predicate encryption can be used to decode the information
in the cloud [119]. Cloud computing’s main significance is homomorphic encryption, which
involves the process of encoding information in the cloud. Therefore, the future business
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:25
practicality of such abilities would be a huge advantage to cloud computing [120]. It needs
a block-based system with a secure boolean search for secure cloud storage.
• Security Management: There is a need to initiate standard organizations (e.g., World Wide
Web Consortium (W3C), the Internet Engineering Task Force (IETF), the Organization for
the Advancement of Structured Information Standards (OASIS)) and start new efforts for
the management protocols that interoperate with many clouds [121, 122]. To increase cloud
selection, the cloud management standards will be created and supported by the cloud ser-
vice provider, which encourages consistent interoperability crosswise over different clouds.
Like the customer/server period, guidelines will make a biological system of Independent
Software Vendors (ISVs) and specialist organizations that give clients decision, adaptability,
and greater agility by the method of computerization [123]. Also, there is a need for Soft-
ware Defined Networking (SDN)-based blockchain to adapt the security without the review
of the administrator automatically. It can alleviate specific problems such as adaptability,
effectiveness, accessibility, and safety [124].
• Privacy: Privacy is essential for the CSP to understand the main privacy laws to realize
the data transaction from one place to another. It is yet to solve the type of government
intercession or the formation of a worldwide security standard that will give reliability
crosswise controls. Specific gauges will offer to characterize the way organizations can use
cloud computing [125]. When cloud computing turns out to be more standard, the reports of
regular review increased by specific necessities around protection and security may review
concerned with the handling of information and its protection concerns [126]. Blockchain-
based data provenance architecture is necessary to ensure the processing of information in
cloud storage while at the same time, increasing privacy and accessibility [127].
Table 5 summarizes the details of the studies addressing each research question.
10 CONCLUSIONS
In this article, a systematic survey (2010–2019) of blockchain technology and cloud computing to
secure cloud storage has been assessed. Blockchain presents numerous guarantees for the future
of cloud data. The first one is that clients could be responsible for controlling their data and
the transactions in various areas. Hence, trust is built that the transactions are being executed
precisely as per the protocol directions, eliminating the trusted third-party requirement. This
idea can impact cloud data to discover a solution for managing and storing the information
appropriately on a P2P network. Blockchain innovation can be another piece of the encompassing
biological system of instruments that cloud data utilizes. In reality, it can assume a vital job
in security for authenticating and preventing access depending on the user’s requirements by
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:26 P. Sharma et al.
recording the histories of data access and legitimate utilization of encryption on the information.
A few challenges are still present, for example, accord models, the computational expenses of
mining blocks, and transaction validation. Additionally, Blockchain applications provide solutions
involving essential changes or complete replacement of existing frameworks. That is the reason
for the transaction not being quick and straightforward. In any case, we are still in the beginning
stages of the development of Blockchain, and these impediments will, in the end, be overcome,
opening the way for some energizing potential outcomes.
REFERENCES
[1] Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, and Kui Ren. 2016. A privacy-preserving and
copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Info. Forensics Secur. 11, 11
(2016), 2594–2608. https://doi.org/10.1109/TIFS.2016.2590944
[2] Xueping Liang, Sachin Shetty, Deepak Tosh, Charles Kamhoua, Kevin Kwiat, and Laurent Njilla. 2017. Provchain:
A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability.
In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing. 468–477.
https://doi.org/10.1109/CCGRID.2017.8
[3] David S. Linthicum. 2010. Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide. Pearson
Education.
[4] Rajnish Choubey, Rajshree Dubey, and Joy Bhattacharjee. 2011. A survey on cloud computing security, challenges,
and threats. Int. J. Comput. Sci. Engineer. 3 (2011), 1227–1231.
[5] Bin Feng, Xinzhu Ma, Cheng Guo, Hui Shi, Zhangjie Fu, and Tie Qiu. 2016. An efficient protocol with bidirec-
tional verification for storage security in cloud computing. IEEE Access 4 (2016), 7899–7911. https://doi.org/10.1109/
ACCESS.2016.2621005
[6] Cong Wang, Kui Ren, and Jia Wang. 2016. Secure optimization computation outsourcing in cloud computing: A case
study of linear programming. IEEE Trans. Comput. 65, 1 (2016), 216–229. https://doi.org/10.1109/TC.2015.2417542
[7] Jin Li, Yinghui Zhang, Xiaofeng Chen, and Yang Xiang. 2018. Secure attribute-based data sharing for resource-limited
users in cloud computing. Comput. Secur. 72 (2018), 1–12. https://doi.org/10.1016/j.cose.2017.08.007
[8] Ping Li, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wen-Bin Chen, and Kai Chen. 2017. Privacy-preserving outsourced
classification in cloud computing. Cluster Comput. 21, 1 (2017), 1–10. https://doi.org/10.1007/s10586-017-0849-9
[9] Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, and Yang Xiang. 2015. Verifiable auditing for outsourced
database in cloud computing. IEEE Trans. Comput. 1 (2015), 1–1. https://doi.org/10.1109/TC.2015.2401036
[10] Michael Nofer, Peter Gomber, Oliver Hinz, and Dirk Schiereck. 2017. Blockchain. Bus. Info. Syst. Engineer. 59, 3
(2017), 183–187. https://doi.org/10.1007/s12599-017-0467-3
[11] Chenhan Xu, Kun Wang, and Mingyi Guo. 2017. Intelligent resource management in blockchain-based cloud data
centers. IEEE Cloud Comput. 4, 6 (2017), 50–59. https://doi.org/10.1109/MCC.2018.1081060
[12] Harleen Kaur, M. Afshar Alam, Roshan Jameel, Ashish Kumar Mourya, and Victor Chang. 2018. A proposed solution
and future direction for blockchain-based heterogeneous medicare data in cloud environment. J. Med. Syst. 42, 8
(2018), 156. https://doi.org/10.1007/s10916-018-1007-5
[13] Farid Daryabar, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2017. Cloud storage forensics: MEGA as a case
study. Austral. J. Forensic Sci. 49, 3 (2017), 344–357. https://doi.org/10.1080/00450618.2016.1153714
[14] Sushant Rajkumar Patil. 2016. A comparative review on Ceph and Swift open source cloud storage platform, global
trends in signal processing. In Proceedings of the IEEE International Conference on Information Computing and Com-
munication (ICGTSPICC’16). https://doi.org/10.1109/ICGTSPICC.2016.7955300
[15] David Brian Ferriera. 2014. Policy driven cloud storage management and cloud storage policy router. 5 (2014), 8.
[16] A. Maxmen. 2018. AI researchers embrace bitcoin technology to share medical data. Nature, 555 (2018), 7696.
[17] Wei Cai, Zehua Wang, Jason B. Ernst, Zhen Hong, Chen Feng, and Victor C. M. Leung. 2018. Decentralized ap-
plications: the blockchain-empowered software system. IEEE Access 6 (2018), 53019–53033. https://doi.org/10.1109/
ACCESS.2017
[18] Saveen A. Abeyratne, and Radmehr P. Monfared. 2016. Blockchain ready manufacturing supply chain using
distributed ledger. International Journal of Research in Engineering and Technology 5, 9 (2016). Retrieved from
https://repository.lboro.ac.uk/articles/Blockchain_ready_manufacturing_supply_chain_using_distributed_ledger/
9566069 https://doi.org/10.15623/ijret.2016.0509001.
[19] Santoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from https://bitcoin.org/
bitcoin.pdf.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:27
[20] Zachary Baynham-Herd, 2017. Enlist blockchain to boost conservation. Nature 548, 7669 (2017), 523–523. https://
doi.org/10.1038/548523c
[21] Selena Ahmed, and Noah ten Broek. 2017. Blockchain could boost food security. Nature 550, 7674 (2017), 43–43.
https://doi.org/10.1038/550043e
[22] Jong-Hyouk Lee and Marc Pilkington. 2017. How the blockchain revolution will reshape the consumer electron-
ics industry [future directions]. IEEE Consumer Electron. Mag. 6, 3 (2017), 19–23. https://doi.org/10.1109/MCE.2017.
2684916
[23] Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. 2017. An overview of blockchain
technology: Architecture, consensus, and future trends. In Proceedings of the IEEE International Congress on Big Data
(BigData’17). 557–564. https://doi.org/10.1109/BigDataCongress.2017.85
[24] Mosakheil and Jamal Hayat. 2018. Security threats classification in blockchains. Culminating Projects in Information
Assurance. Retrieved from https://repository.stcloudstate.edu/msia_etds/48.
[25] Lakshmi Siva Sankar, M. Sindhu, and M. Sethumadhavan. 2017. Survey of consensus protocols on blockchain ap-
plications. Proceedings of the 4th IEEE International Conference on Advanced Computing and Communication Systems
(ICACCS’17). https://doi.org/10.1109/ICACCS.2017.8014672
[26] Ao Lei, Haitham Cruickshank, Yue Cao, Philip Asuquo, Chibueze P. Anyigor Ogah, and Zhili Sun. 2017. Blockchain-
based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4, 6
(2017), 1832–1843. https://doi.org/10.1109/JIOT.2017.2740569
[27] Chinmay A. Vyas and Munindra Lunagaria. 2014. Security concerns and issues for bitcoin. In Proceedings of the
National Conference cum Workshop on Bioinformatics and Computational Biology (NCWBCB’14).
[28] Luca Ferretti, Mirco Marchetti, Mauro Andreolini, and Michele Colajanni. 2018. A symmetric cryptographic scheme
for data integrity verification in cloud databases. Info. Sci. 422 (2018), 497–515. https://doi.org/10.1016/j.ins.2017.09.
033
[29] Yunxue Yan, Lei Wu, Ge Gao, Hao Wang, and Wenyu Xu. 2018. A dynamic integrity verification scheme of cloud
storage data based on lattice and Bloom filter. J. Info. Secur. Appl. 39 (2018), 10–18. https://doi.org/10.1016/j.jisa.2018.
01.004
[30] Guangwei Xu, Miaolin Lai, Jing Li, Li Sun, and Xiujin Shi. 2018. A generic integrity verification algorithm of version
files for cloud deduplication data storage. EURASIP J. Info. Secur. 12 (2018), 1. https://doi.org/10.1186/s13635-018-
0083-x
[31] Hao Jin, Ke Zhou, Hong Jiang, Dongliang Lei, Ronglei Wei, and Chunhua Li. 2018. Full integrity and freshness for
cloud data. Future Gen. Comput. Syst. 80 (2018), 640–652. https://doi.org/10.1016/j.future.2016.06.013
[32] Rajat Saxena and Somnath Dey. 2016. Cloud audit: A data integrity verification approach for cloud computing.
Procedia Comput. Sci. 89 (2016), 142–151. https://doi.org/10.1016/j.procs.2016.06.024
[33] Jian Mao, Yan Zhang, Pei Li, Teng Li, Qianhong Wu, and Jianwei Liu. 2017. A position aware Merkle tree for dynamic
cloud data integrity verification. Soft Comput. 21, 8 (2017), 2151–2164. https://doi.org/10.1007/s00500-015-1918-8
[34] Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, and Xiaojun Zhang. 2017. Efficient public verifi-
cation of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans. Info. Forensics
Secur. 12, 3 (2017), 676–688. https://doi.org/10.1109/TIFS.2016.2631951
[35] Tao Jiang, Xiaofeng Chen, and Jianfeng Ma. 2016. Public integrity auditing for shared dynamic cloud data with group
user revocation. IEEE Trans. Comput. 65, 8 (2016), 2363–2373. https://doi.org/10.1109/TC.2015.2389955
[36] Marcus Brandenburger, Christian Cachin, and Nikola Knežević. 2017. Don’t trust the cloud, verify: Integrity and
consistency for cloud object stores. ACM Trans. Privacy Secur. 20 (2017), 3. https://doi.org/10.1145/3079762
[37] Jiawei Yuan and Shucheng Yu. 2015. Public integrity auditing for dynamic data sharing with multiuser modification.
IEEE Trans. Info. Forensics Secur. 10, 8 (2015), 1717–1726. https://doi.org/10.1109/TIFS.2015.2423264
[38] Yibin Li, Keke Gai, Longfei Qiu, Meikang Qiu, and Zhao Hui. 2017. Intelligent cryptography approach for secure
distributed big data storage in cloud computing. Info. Sci. 387 (2017), 103–115. https://doi.org/10.1016/j.ins.2016.09.
005
[39] Zahra Pooranian, Kang-Cheng Chen, Chai-Mu Yu, and Mauro Conti. 2018. RARE: Defeating side channels based
on data-deduplication in cloud storage. In Proceedings of the Infocom Workshop. https://doi.org/10.1109/INFCOMW.
2018.8406888
[40] Chia-Mu Yu, Sarada P. Gochhayat, Mauro Conti, and Chun-Shien Lu. 2018. Privacy aware data deduplication for
side channel in cloud storage. IEEE Trans. Cloud Comput. 1 (2018), 1–1. https://doi.org/10.1109/TCC.2018.2794542
[41] Ioannis Konstantinidis, Georgious Siaminos, Christos Timplalexis, Panagiotis Zervas, Vassilios Peristeras, and Stefan
Decker. 2018. Blockchain for business applications: A systematic literature review. In Proceedings of the International
Conference on Business Information Systems. Springer, Cham, 384–399. https://doi.org/10.1007/978-3-319-93931-
5_28
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:28 P. Sharma et al.
[42] Qalab E. Abbas, and Jang S. Bong. 2019. A survey of blockchain and its applications. In Proceedings of the Inter-
national Conference on Artificial Intelligence in Information and Communication (ICAIIC’19). 1–3. https://doi.org/10.
1109/ICAIIC.2019.8669067
[43] F. Rizal Batubara, Jolien Ubacht, and Marijn Janssen. 2018. Challenges of blockchain technology adoption for e-
government: A systematic literature review. In Proceedings of the 19th Annual International Conference on Digital
Government Research: Governance in the Data Age. 1–9. https://doi.org/10.1145/3209281.3209317
[44] Cornelius C. Agbo, Qusay H. Mahmoud, and J. Mikael Eklund. 2019. Blockchain technology in healthcare: A sys-
tematic review. Healthcare Multidisc. Digital Publish. Inst. 7, 2 (2019), 56. https://doi.org/10.3390/healthcare7020056
[45] Seyednima Khezr, Md Moniruzzaman, Abdulsalam Yassine, and Rachid Benlamri. 2019. Blockchain technology in
healthcare: A comprehensive review and directions for future research. Appl. Sci. 1–28. https://doi.org/10.3390/
app9091736
[46] Asad A. Siyal, Aisha Z. Junejo, Muhammad Zawish, Kainat Ahmed, Aiman Khalil, and Georgia Soursou. 2019. Ap-
plications of blockchain technology in medicine and healthcare: Challenges and future perspectives. Cryptography
3, 1 (2019), 1–16. https://doi.org/10.3390/cryptography3010003
[47] Rui Zhang, Rui Xue, and Ling Liu. 2019. Security and privacy issues on blockchain. ACM Comput. Surveys 52, 3
(2019), 1–35. https://doi.org/10.1145/3316481
[48] Joanna Kołodziej, Andrezej Wilczyński, Damian F. Cerero, and Alejandro F. Montes. 2018. Blockchain secure cloud:
A new generation integrated cloud and blockchain platforms-general concepts and challenges. Eur. Cybersecur. J.
28–34.
[49] Guangsheng Yu, Xu Wang, Kan Yu, Wei Ni, J. Andrew Zhang, and Ren P. Liu. 2019. Survey: Sharding in blockchains.
IEEE Access 8 (2019), 14155–14181. https://doi.org/10.1109/ACCESS.2020.2965147
[50] Shaoan Xie, Zibin Zheng, Weili Chen, Jiajing Wu, Hong N. Dai, and Muhammad Imran. 2019. Blockchain for cloud
exchange: A survey. Comput. Electric. Engineer. 81 (2019), 1–20. https://doi.org/10.1016/j.compeleceng.2019.106526
[51] Ruizhe Yang, F. Richard Yu, Pengbo Si, Zhaoxin Yang, and Yanhua Zhang. 2018. Integrated blockchain and edge
computing systems: A survey, some research issues and challenges. IEEE Commun. Surveys Tutor. 21, 2 (2018), 1–22.
https://doi.org/10.1109/COMST.2019.2894727
[52] Tara Salman, Maede Zolanvari, Aiman Erbad, Raj Jain, and Mohammed Samaka. 2019. A security services using
blockchains: A state of the art survey. IEEE Commun. Surveys Tutor. 21, 1 (2019), 858–879. https://doi.org/10.1109/
COMST.2018.2863956
[53] Bhabendu K. Mohanta, Debasish Jena, Soumyashree S. Panda, and Srichandan Sobhanayak. 2019. Blockchain tech-
nology: A survey on applications and security privacy challenges. Internet Things 8 (2019), 1–19. https://doi.org/10.
1016/j.iot.2019.100107
[54] Youngjoo Shin, Dongyoung Koo, and Junbeom Hur. 2017. A survey of secure data deduplication schemes for cloud
storage systems. ACM Comput. Surveys 49 (2017), 4. https://doi.org/10.1145/3017428 54=137
[55] Hoang Giang Do and Wee Keong Ng. 2017. Blockchain-based system for secure data storage with private key-
word search. In Proceedings of the IEEE World Congress on Services (SERVICES’17). 90–93. https://doi.org/10.1109/
SERVICES.2017.23
[56] Li, Jingyi, Jigang Wu, Long Chen, and Jiaxing Li. 2018. Deduplication with blockchain for secure cloud storage. In
Proceedings of the CCF Conference on Big Data. Springer, 558–570. https://doi.org/10.1007/978-981-13-2922-7_36
[57] Xiao-Long Liu, Ruey-Kai Sheu, Shyan-Ming Yuan, and Yu-Ning Wang. 2016. A file-deduplicated private cloud stor-
age service with CDMI standard. Comput. Stand. Interfaces 44, 18–27. https://doi.org/10.1016/j.csi.2015.09.010
[58] S. Supriya and S. Mythili. 2017. Study on data deduplication in cloud computing. Int. J. Adv. Res. Comput. Sci. 8 (2017),
8. https://doi.org/10.26483/ijarcs.v8i8.4689
[59] Liu, Bin, Xiao Liang Yu, Shiping Chen, Xiwei Xu, and Liming Zhu. 2017. Blockchain based data integrity service
framework for IoT data. In Proceedings of the IEEE International Conference on Web Services (ICWS’17). 468–475.
https://doi.org/10.1109/ICWS.2017.54
[60] Yue, Dongdong, Ruixuan Li, Yan Zhang, Wenlong Tian, and Chengyi Peng. 2018. blockchain based data integrity
verification in p2p cloud storage. In Proceedings of the IEEE 24th International Conference on Parallel and Distributed
Systems (ICPADS’18). 561–568. https://doi.org/10.1109/PADSW.2018.8644863
[61] Deka Ganesh Chandra, Ravi Prakash, and Swati Lamdharia. 2012. A study on cloud database. In Proceedings of the
4th IEEE International Conference on Computational Intelligence and Communication Networks (CICN’12). 513–519.
https://doi.org/10.1109/CICN.2012.35
[62] Vandana Bhatia and Ajay Jangra. 2014. SETiNS: Storage efficiency techniques in No-SQL database for Cloud based
design. In Proceedings of the IEEE International Conference on Advances in Engineering and Technology Research
(ICAETR’14). https://doi.org/10.1109/ICAETR.2014.7012839
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:29
[63] Josef Gattermayer and Pavel Tvrdik. 2017. Blockchain-based multi-level scoring system for P2P clusters. In Proceed-
ings of the 46th International Conference on Parallel Processing Workshops (ICPPW’17). 301–308. https://doi.org/10.
1109/ICPPW.2017.50
[64] Hussam Abu-Libdeh, Lonnie Princehouse, and Hakim Weatherspoon. 2010. RACS: A case for cloud storage diversity.
In Proceedings of the 1st ACM Symposium on Cloud Computing. https://doi.org/10.1145/1807128.1807165
[65] Ambarish Kumar Patel. 2017. Cloud storage and its secure techniques. Int. J. Engineer. Sci. 7 (2017), 6603.
[66] Jiaxing Li, Jigang Wu, and Long Chen. 2018. Block-Secure: Blockchain based scheme for secure P2P cloud storage.
Info. Sci. 465, 219–231. https://doi.org/10.1016/j.ins.2018.06.071
[67] Ilya Sukhodolskiy and Sergey Zapechnikov. 2018. A blockchain-based access control system for cloud storage. In
Proceedings of the IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus’18).
1575–1578. https://doi.org/10.1109/EIConRus.2018.8317400
[68] Qi Xia, Emmanuel Sifah, Abla Smahi, Sandro Amofa, and Xiaosong Zhang. 2017. BBDS: Blockchain-based data
sharing for electronic medical records in cloud environments. Information 8, 2 (2017), 44. https://doi.org/10.3390/
info8020044
[69] Jason Paul Cruz, Yuichi Kaji, and Naoto Yanai. 2018. RBAC-SC: Role-based access control using smart contract. IEEE
Access 6 (2018), 12240–12251. https://doi.org/10.1109/ACCESS.2018.2812844
[70] Ittay Eyal, Adem E. Gencer, Emin G. Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain pro-
tocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16).
45–59.
[71] Christopher Natoli and Vincent Gramoli. 2016. The blockchain anomaly. In Proceedings of the IEEE 15th International
Symposium on Network Computing and Applications (NCA’16), 310–317. https://doi.org/10.1109/NCA.2016.7778635
[72] Yinghui Zhang, Robert H. Deng, Ximeng Liu, and Dong Zhen. 2018. Blockchain based robust and efficient fair
payment for outsourcing services in cloud computing. Info. Sci. 462 (2018), 262–277. https://doi.org/10.1016/j.ins.
2018.06.018
[73] S. Pavithra, S. Ramya, and S. Prathibha. 2019. A survey on cloud security issues and blockchains. In Proceedings
of the 3rd International Conference on Computing and Communication Technologies (ICCCT’19), 136–140. https://doi.
org/10.1109/ICCCT2.2019.8824891
[74] Changsang Yang, Xiaofeng Chen, and Yang Xiang. 2018. Blockchain-based publicly verifiable data deletion scheme
for cloud storage. J. Netw. Comput. Appl. 103 (2018), 185–193. https://doi.org/10.1016/j.jnca.2017.11.011
[75] Pasquale Giungato, Roberto Rana, Angela Tarabella, and Caterina Tricase. 2017. Current trends in sustainability of
bitcoins and related blockchain technology. Sustainability 9, 12 (2017), 2214. https://doi.org/10.3390/su9122214
[76] Mahdi H. Miraz and Maaruf Ali. 2018. Applications of blockchain technology beyond cryptocurrency. International
Association of Educators and Researchers (IAER) 2, 1 (2018), 1–6. https://doi.org/10.33166/AETiC.2018.01.001
[77] Huige Li, Haibo Tian, and Jiejie He. 2018. Blockchain-based searchable symmetric encryption scheme. Comput.
Electric. Engineer. 73 (2018), 32–45. https://doi.org/10.1016/j.compeleceng.2018.10.015
[78] Hong Giang Do and Wee Keong Ng. 2017. Blockchain-based system for secure data storage with private keyword
search. In Proceedings of the IEEE World Congress on Services (SERVICES’17) 90–93. https://doi.org/10.1109/SERVICES.
2017.23
[79] Han Wang, Xu An Wang, Shuai Xiao, and Zichen Zhou. 2019. Blockchain-based public auditing scheme for shared
data. In Proceedings of the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
Springer, Cham, 197–206. https://doi.org/10.1007/978-3-030-22263-5_19
[80] Hiayang Yu and Zhen Yang. 2018. Decentralized and smart public auditing for cloud Storage. In Proceedings of the
IEEE 9th International Conference on Software Engineering and Service Science (ICSESS’18) (491–494). IEEE. https:
//doi.org/10.1109/ICSESS.2018.8663780
[81] Jin Ho Park and Jong Hyuk Park. 2017. Blockchain security in cloud computing: Use cases, challenges and solutions.
Symmetry 9, 8 (2017), 1–13. https://doi.org/10.3390/sym9080164
[82] Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, and Dong Zheng. 2018. TKSE: Trustworthy keyword
search over encrypted data with two-side verifiability via blockchain. IEEE Access 6 (2018), 31077–31087. https://
doi.org/10.1109/ACCESS.2018.2844400
[83] Jacob Eberhardt and Stefan Tai. 2017. On or off the blockchain? Insights on off-chaining computation and data. In
Service-Oriented and Cloud Computing (ESOCC’17), F. De Paoli, S. Schulte, and Johnsen E. Broch (Eds.). Lecture Notes
in Computer Science, Vol. 10465, Springer, Cham. https://doi.org/3-15. 10.1007/978-3-319-67262-5_1.
[84] Xiaolong Liu, Riqing Chen, Yu-Wen Chen, and Shyan-Ming Yuan. 2018. Off-chain data fetching architecture for
ethereum smart contract. In Proceedings of the International Conference on Cloud Computing, Big Data and Blockchain
(ICCBB’18). 1–4. https://doi.org/10.1109/ICCBB.2018.8756348
[85] Storage Needs for Blockchain Technology. 2019. IBM storage. Retrieved from https://www.ibm.com/blogs/systems/
storage-for-blockchain-and-modern-distributed-database-processing/.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:30 P. Sharma et al.
[86] Pradip K. Sharma, Mu-Yen Chen, and Jong H. Park. 2017. A software defined fog node based distributed blockchain
cloud architecture for IoT. IEEE Access 6 (2017), 115–124. https://doi.org/10.1109/ACCESS.2017.2757955
[87] Syed S. Hasan, Nazatul H. Sultan, and Ferdous A. Barbhuiya. 2019. Cloud data provenance using ipfs and blockchain
technology. In Proceedings of the 7th International Workshop on Security in Cloud Computing. 5–12. https://doi.org/
10.1145/3327962.3331457
[88] Ahsan Manzoor, Madhsanka Liyanage, An Braeke, Salil S. Kanhere, and Mika Ylianttila. 2019, May. Blockchain
based proxy re-encryption scheme for secure IOT data sharing. In Proceedings of the IEEE International Conference
on Blockchain and Cryptocurrency (ICBC’19). 99–103. https://doi.org/10.1109/BLOC.2019.8751336
[89] Yuan Zhang, Chunxiang Xu, Xiaodong Lin, and Xuemin S. Shen. 2019. Blockchain-based public integrity verifica-
tion for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. https://doi.org/10.1109/TCC.2019.
2908400
[90] Shangping Wang, Xu Wang, and Yaling Zhang. 2019. A secure cloud storage framework with access control based
on blockchain. IEEE Access. 7 (2019), 112713–112725. https://doi.org/10.1109/ACCESS.2019.2929205
[91] Yuan Zhang, Chunxiang Xu, Jianbing Ni, Hongwei Li, and Xuemin S. Shen. 2019. Blockchain-assisted public-key
encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Trans. Cloud Comput.
https://doi.org/10.1109/TCC.2019.2923222
[92] Deepak Tosh, Sachin Shetty, Xueping Liang, Charles Kamhoua, and Laurent L. Njilla. 2019. Data provenance in the
cloud: A blockchain-based approach. IEEE Consumer Electron. Mag. 84, 38–44. https://doi.org/10.1109/MCE.2019.
2892222
[93] Yi Chen, Shuai Ding, Zheng Xu, Handong Zheng, and Shanlin Yang. 2019. Blockchain-based medical records secure
storage and medical service framework. J. Med. Syst. 43, 1 (2019), 5. https://doi.org/10.1007/s10916-018-1121-4
[94] Sheng Cao, Gexiang Zhang, Pengfei Liu, Xiaosong Zhang, and Ferrante Neri. 2019. Cloud-assisted secure eHealth
systems for tamper-proofing EHR via blockchain. Info. Sci. 485, 427–440. https://doi.org/10.1016/j.ins.2019.02.038
[95] Shangping Wang, Yinglong Zhang, and Yaling Zhang. 2018. A blockchain-based framework for data sharing with
fine-grained access control in decentralized storage systems. IEEE Access 6, 38437–38450. https://doi.org/10.1109/
ACCESS.2018.2851611
[96] Wuhui Chen, Yufei Chen, Xu Chen, and Zibin Zheng. 2019. Toward secure data sharing for the IoV: A quality-
driven incentive mechanism with on-chain and off-chain guarantees. IEEE Internet Things J. 7, 3 (2019), 1625–1640.
https://doi.org/10.1109/JIOT.2019.2946611
[97] Nick Lambert, Qi Ma, and David Irvine. 2015. Safecoin: The decentralized network token. Retrieved from
https://docs.maidsafe.net/Whitepapers/pdf/Safecoin.pdf.
[98] Vitalik Buterin. 2013. Ethereum white paper: A next generation smart contract and decentralized application plat-
form. Retrieved from https://blockchainlab.com/pdf/Ethereum_white_paper-a_next_generation_smart_contract_
and_decentralized_application_platform-vitalik-buterin.pdf.
[99] David Vorick. and Luke Champine. 2014. Sia: Simple decentralized storage. Nebulous Inc. Retrieved from
https://sia.tech/sia.pdf.
[100] Storj Labs, Inc. 2018. Storj: A decentralized cloud storage network framework. Retrieved from https://storj.io/storj.
pdf.
[101] Swarm. 2017. Retrieved from https://swarm-guide.readthedocs.io/en/latest/introduction.html.
[102] Protocol Labs. 2017. Filecoin: A Decentralized Storage Network. Retrieved from https://filecoin.io/filecoin.pdf.
[103] Juan Benet. IPFS: Content Addressed, Versioned, P2P File System. Retrieved from https://ipfs.io/ipfs/
QmR7GSQM93Cx5eAg6a6yRzNde1FQv7uL6X1o4k7zrJa3LX/ipfs.draft3.pdf.
[104] Karim Sultan, Umar Ruhi, and Rubina Lakhani. 2018. Conceptualizing blockchains: Characteristics and applications.
Retrieved from https://arxiv.org/abs/1806.03693v1.
[105] Barenji, Ali Vatankhah, Hanyang Guo, Zonggui Tian, Zhi Li, W. M. Wang, and George Q. Huang. 2019. Blockchain-
based cloud manufacturing: decentralization. Retrieved from https://arxiv.org/abs/1901.10403.
[106] Emil Stefanov, Marten van Dijk, Ari Juels, and Alina Oprea. 2012. Iris: A scalable cloud file system with efficient
integrity checks. In Proceedings of the 28th Annual Computer Security Applications Conference. 229–238. https://doi.
org/10.1145/2420950.2420985
[107] Jesus Emanuel Ferreira, Vanessa R. L. Chicarino, Célio VN de Albuquerque, and Antônio A. de A. Rocha. 2018. A
survey of how to use blockchain to secure internet of things and the stalker attack. Secur. Commun. Networks 7
(2018), 1–27. https://doi.org/10.1155/2018/9675050
[108] Nurzhan Aitzhan, Zhumabekuly, and Davor Svetinovic. 2018. Security and privacy in decentralized energy trading
through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Depend. Secure Comput. 15, 5
(2018), 840–852. https://doi.org/10.1109/TDSC.2016.2616861
[109] Lizhe Wang, Rajiv Ranjan, Jinjun Chen, and Boualem Benatallah. 2011. Cloud computing: Methodology, systems,
and applications. CRC Press. https://doi.org/10.1201/b11149
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Blockchain Technology for Cloud Storage: A Systematic Literature Review 89:31
[110] Oracle. 2017. Oracle blockchain cloud service project. Retrieved from https://cloud.oracle.com/blockchain.
[111] iEx.ec. 2018. Retrieved from https://iex.ec/.
[112] Jacobovitz, Ori. 2016. Blockchain for identity management. The Lynne and William Frankel Center for Computer
Science Department of Computer Science. Ben-Gurion University, Beer Sheva. Retrieved from https://www.cs.bgu.ac.
il/∼frankel/TechnicalReports/2016/16-02.pdf.
[113] Hassan Saad Alqahtani and Ghita Kouadri-Mostefaou. 2014. Multi-clouds mobile computing for the secure storage
of data. In IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC’14). IEEE. https://doi.org/
10.1109/UCC.2014.68
[114] Jia Yu, Kui Ren, Cong Wang, and Vijay Varadharajan. 2015. Enabling cloud storage auditing with key-exposure
resistance. IEEE Trans. Info. Forensics Secur. 10, 6 (2015), 1167–1179. https://doi.org/10.1109/TIFS.2015.2400425
[115] Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, and Wenjing Lou. 2013. Privacy-preserving public auditing
for secure cloud storage. IEEE Trans. Comput. 62, 2 (2013), 362–375. https://doi.org/10.1109/TC.2011.245
[116] Yannan Li, Yong Yu, Willy Susilo, Jianbing Ni, and Kim-Wang Raymand Choo. 2017. Fuzzy identity-based data
integrity auditing for reliable cloud storage systems. IEEE Trans. Depend. Secure Comput. 16, 1 (2017), 72–83. https:
//doi.org/10.1109/TDSC.2017.2662216
[117] Yi-Sheng Su. 2017. Constructions of fractional repetition codes with flexible per-node storage and repetition de-
gree. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’17). 1–6. https://doi.org/10.1109/
GLOCOM.2017.8255008
[118] Pradip Kumar Sharma, Mu-Yen Chen, and Jong Hyuk Park. 2018. A software defined fog node based distributed
blockchain cloud architecture for IoT. IEEE Access. 6, 115–124. https://doi.org/10.1109/ACCESS.2017.2757955
[119] Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou, and Duncan S. Wong. 2018. Lightweight and privacy-preserving
delegable proofs of storage with data dynamics in cloud storage. IEEE Trans. Cloud Comput.
[120] Liehuang Zhu, Yulu Wu, Keke Gai, and Kim-Kwang Raymond Choo. 2018. Controllable and trustworthy blockchain-
based cloud data management. Future Gen. Comput. Syst. 91 (2018), 527–535. https://doi.org/10.1016/j.future.2018.
09.019
[121] Jingyi Li, Jigang Wu, Long Chen, and Jiaxing Li. 2018. Deduplication with blockchain for secure cloud storage. In
Proceedings of the CCF Conference on Big Data. Springer. https://doi.org/10.1007/978-981-13-2922-7_36
[122] Ripon Patgiri, Irani Acharjamayum, and Dhruwajita Devi. 2018. Blockchain: A tale of peer-to-peer security. In Pro-
ceedings of the IEEE Symposium Series on Computational Intelligence. IEEE SSCI, 18–21. https://doi.org/10.1109/SSCI.
2018.8628826
[123] Jesse Yli-Huumo, Deokyoon Ko, Sujin Choi, Sooyong Park, and Kari Smolander. 2016. Where is current research on
blockchain technology?—A systematic review. PloS One 11, 10. https://doi.org/10.1371/journal.pone.0163477
[124] Roy, Shanto, Md Ashaduzzaman, Mehedi Hassan, and Arnab Rahman Chowdhury. 2018. Blockchain for IoT security
and management: Current prospects, challenges and future directions. In Proceedings of the 5th IEEE International
Conference on Networking, Systems and Security (NSysS). 1–9. https://doi.org/10.1109/NSysS.2018.8631365
[125] William J. Luther. 2016. Bitcoin and the future of digital payments. The Independent Review 20, 3 (2016), 397–404.
https://www.jstor.org/stable/24562161.
[126] Trent J. MacDonald, Darcy W. E. Allen, and Jason Potts. 2016. Blockchains and the boundaries of self-organized
economies: Predictions for the future of banking. In Banking Beyond Banks and Money. Springer, 279–296. https://
doi.org/10.1007/978-3-319-42448-4_14
[127] Liang, Xueping, Sachin Shetty, Deepak Tosh, Charles Kamhoua, Kevin Kwiat, and Laurent Njilla. 2017. Provchain:
A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability.
In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. 468–477.
https://doi.org/10.1109/CCGRID.2017.8
[128] Walid Al-Saqaf and Nicolas Seidler. 2017. Blockchain technology for social impact: Opportunities and challenges
ahead. J. Cyber Policy. 2, 3 (2017), 338–354. https://doi.org/10.1080/23738871.2017.1400084
[129] Bayu Adhi Tama, Bruno Joachim Kweka, Youngho Park, and Kyung-Hyune Rhee. 2017. A critical review of
blockchain and its current applications. In Proceedings of the International Conference on Electrical Engineering and
Computer Science (ICECOS’17). 109–113. https://doi.org/10.1109/ICECOS.2017.8167115
[130] Charalampos Alexopoulos et al. 2018. BlockChain technologies in government 3.0: A review. EGOV-CeDEM-ePart.
In Proceedings of the International Conference EGOV-CeDEM-ePart, Danube University Krems, Austria. Retrieved from
http://depts.washington.edu/egcdep18/documents/Virkar_et_al_2018.pdf.
[131] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Yujing Han, and Shimin Chen. 2011. Collaborative integrity verification in hy-
brid clouds. In Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications,
and Worksharing (CollaborateCom’11). IEEE, 191-200.
[132] Aaron Wright and Primavera De Filippi. 2015. Decentralized blockchain technology and the rise of lex cryptographia.
SSRN Electronic Journal. Retrieved from https://ssrn.com/abstract=2580664. https://dx.doi.org/10.2139/ssrn.2580664.
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
89:32 P. Sharma et al.
[133] Lin, Iuon-Chang, and Tzu-Chun Liao. 2017. A survey of blockchain security issues and challenges. Int. J. Netw. Secur.
19, 5 (2017), 653–659. https://doi.org/10.6633/IJNS.201709.19(5).01
[134] Yong Yuan and Fei-Yue Wang. 2016. Towards blockchain-based intelligent transportation systems, in intelligent
transportation systems (ITSC). In Proceedings of the 19th International Conference on IEEE, 2663–2668. https://doi.
org/10.1109/ITSC.2016.7795984
[135] Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo. 2017. A survey on the security of blockchain systems, Future Gen.
Comput. Syst. 107 (2017), 841–853. https://doi.org/10.1016/j.future.2017.08.020
ACM Computing Surveys, Vol. 53, No. 4, Article 89. Publication date: August 2020.
Copyright of ACM Computing Surveys is the property of Association for Computing
Machinery and its content may not be copied or emailed to multiple sites or posted to a
listserv without the copyright holder's express written permission. However, users may print,
download, or email articles for individual use.