Int J Performability Eng ›› 2025, Vol. 21 ›› Issue (9): 473-484.doi: 10.23940/ijpe.25.09.p1.473484
Gagandeep Singh Kahlona,*, Rajeev Kumar Bedib, and S K Guptaa
Submitted on
;
Revised on
;
Accepted on
Contact:
*E-mail address: Gagandeep Singh Kahlon, Rajeev Kumar Bedi, and S K Gupta. A Comparative Review on Blockchain and Anonymization Based Techniques for Security in Cloud Computing [J]. Int J Performability Eng, 2025, 21(9): 473-484.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
[1] Tabrizchi H., and Kuchaki Rafsanjani M., 2020. A survey on security challenges in cloud computing: issues, threats, and solutions. the Journal of Supercomputing,76(12), pp. 9493-9532. [2] Buyya R., Srirama S.N., Casale G., Calheiros R., Simmhan Y., Varghese B., Gelenbe E., Javadi B., Vaquero L.M., Netto M.A., and Toosi A.N., 2018. A manifesto for future generation cloud computing: research directions for the next decade. ACM Computing Surveys (CSUR),51(5), pp. 1-38. [3] Dizdarević J., Carpio F., Jukan A., and Masip-Bruin X., 2019. A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration. ACM Computing Surveys (CSUR),51(6), pp. 1-29. [4] Darwish A., Hassanien A.E., Elhoseny M., Sangaiah A.K., and Muhammad K., 2019. The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. Journal of Ambient Intelligence and Humanized Computing,10(10), pp. 4151-4166. [5] Kumar P., and Kumar R., 2019. Issues and challenges of load balancing techniques in cloud computing: A survey. ACM Computing Surveys (CSUR),51(6), pp. 1-35. [6] Gill S.S., Tuli S., Xu M., Singh I., Singh K.V., Lindsay D., Tuli S., Smirnova D., Singh M., Jain U., and Pervaiz H., 2019. Transformative effects of IoT, blockchain and artificial intelligence on cloud computing: evolution, vision, trends and open challenges.Internet of Things, 8, 100118. [7] Van Eyk E., Toader L., Talluri S., Versluis L., Uță A., and Iosup A., 2018. Serverless is more: from paas to present cloud computing. IEEE Internet Computing,22(5), pp. 8-17. [8] Domingo-Ferrer J., Farras O., Ribes-González J., and Sánchez D., 2019. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges.Computer Communications, 140, pp. 38-60. [9] Zhang Y., Deng R.H., Liu X., and Zheng D., 2018. Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Transactions on Services Computing,14(4), pp. 1152-1166. [10] Sharma P., Jindal R., and Borah M.D., 2020. Blockchain technology for cloud storage: A systematic literature review. ACM Computing Surveys (CSUR),53(4), pp. 1-32. [11] Karaszewski R., Modrzyński P., and Modrzyńska J., 2021. The use of blockchain technology in public sector entities management: an example of security and energy efficiency in cloud computing data processing.Energies, 14(7), 1873. [12] Baalamurugan K.M., Kumar S.R., Kumar A., Kumar V., and Padmanaban S., 2021. Blockchain security in cloud computing. Springer Nature. [13] Gai K., Guo J., Zhu L., and Yu S., 2020. Blockchain meets cloud computing: A survey. IEEE Communications Surveys & Tutorials,22(3), pp. 2009-2030. [14] Prashar D., Jha N., Shafiq M., Ahmad N., Rashid M., Amin Band ay S., and Khan H.U., 2021. Blockchain‐based automated system for identification and storage of networks.Security and Communication Networks, 2021(1), 6694281. [15] Jha N., and Prashar D., 2022. Using blockchain in resolving the challenges faced by IIoT. InIndustrial Internet of Things, pp. 189-216. [16] Gong J., and Navimipour N.J., 2022. An in-depth and systematic literature review on the blockchain-based approaches for cloud computing. Cluster Computing,25(1), pp. 383-400. [17] Wilczyński A., and Kołodziej J., 2020. Modelling and simulation of security-aware task scheduling in cloud computing based on blockchain technology.Simulation Modelling Practice and Theory, 99, 102038. [18] Abbasi A., and Mohammadi B., 2022. A clustering‐based anonymization approach for privacy‐preserving in the healthcare cloud.Concurrency and Computation: Practice and Experience, 34(1), e6487. [19] Zhang X., Dou W., Pei J., Nepal S., Yang C., Liu C., and Chen J., 2014. Proximity-aware local-recoding anonymization with mapreduce for scalable big data privacy preservation in cloud. IEEE Transactions on Computers,64(8), pp. 2293-2307. [20] Yuvaraj N., Praghash K., and Karthikeyan T., 2022. Data privacy preservation and trade-off balance between privacy and utility using deep adaptive clustering and elliptic curve digital signature algorithm. Wireless Personal Communications,124(1), pp. 655-670. [21] Sai Kumar S., Reddy A.R., Krishna B.S., Rao J.N., and Kiran A., 2022. Privacy preserving with modified grey wolf optimization over big data using optimal K anonymization approach.Journal of Interconnection Networks, 22(Supp01), 2141039. [22] Rubai S.M.,2022. Hybrid heuristic-based key generation protocol for intelligent privacy preservation in cloud sector.Journal of Parallel and Distributed Computing, 163, pp. 166-180. [23] Abdul-Jabbar M.D., and Aldeen Y.A.A.S., 2023. State-of-the-art in data integrity and privacy-preserving in cloud computing. Journal of Engineering,29(01), pp. 42-60. [24] Yang Z., Wang R., Wang H., and Wu D., 2022. Cloud edge-client collaborative trajectory privacy protection system and technology. IEEE Network,36(4), pp. 190-196. [25] Li J., Wu J., and Chen L., 2018. Block-secure: blockchain based scheme for secure P2P cloud storage.Information Sciences, 465, pp. 219-231. [26] Subramanian N., and Jeyaraj A., 2018. Recent security challenges in cloud computing.Computers & Electrical Engineering, 71, pp. 28-42. [27] Singh S., Ra I.H., Meng W., Kaur M., and Cho G.H., 2019. SH-BlockCC: A secure and efficient internet of things smart home architecture based on cloud computing and blockchain technology.International Journal of Distributed Sensor Networks, 15(4), 1550147719844159. [28] Sharma P., Jindal R., and Borah M.D., 2022. Blockchain-based cloud storage system with CP-ABE-based access control and revocation process. the Journal of Supercomputing,78(6), pp. 7700-7728. [29] Sharma P., Borah M.D., and Namasudra S., 2021. Improving security of medical big data by using blockchain technology.Computers & Electrical Engineering, 96, 107529. [30] Murthy C.V.B., Shri M.L., Kadry S., and Lim S., 2020. Blockchain based cloud computing: architecture and research challenges.IEEE Access, 8, pp. 205190-205205. [31] Wang Y., Zhang A., Zhang P., and Wang H., 2019. Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain.IEEE Access, 7, pp. 136704-136719. [32] Medhane D.V., Sangaiah A.K., Hossain M.S., Muhammad G., and Wang J., 2020. Blockchain-enabled distributed security framework for next-generation IoT: an edge cloud and software-defined network-integrated approach. IEEE Internet of Things Journal,7(7), pp. 6143-6149. [33] Velmurugadass P., Dhanasekaran S., Anand S.S., and Vasudevan V., 2021. Enhancing blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm.Materials Today: Proceedings, 37, pp. 2653-2659. [34] Kurkin A.V., Giraev A.V., and Medzhidov Z.U., 2020. Corporate database management on the basis of cloud technologies, blockchain technologies and technologies of big data processing: effectiveness and security. InState and Corporate Management of Region's Development in the Conditions of the Digital Economy, pp. 79-83. [35] Zhu L., Wu Y., Gai K., and Choo K.K.R., 2019. Controllable and trustworthy blockchain-based cloud data management.Future Generation Computer Systems, 91, pp. 527-535. [36] Alkadi O., Moustafa N., Turnbull B., and Choo K.K.R., 2020. A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet of Things Journal,8(12), pp. 9463-9472. [37] Al Omar A., Bhuiyan M.Z.A., Basu A., Kiyomoto S., and Rahman M.S., 2019. Privacy-friendly platform for healthcare data in cloud based on blockchain environment.Future Generation Computer Systems, 95, pp. 511-521. [38] Xie L., Ding Y., Yang H., and Wang X., 2019. Blockchain-based secure and trustworthy internet of things in SDN-enabled 5G-VANETs.IEEE Access, 7, pp. 56656-56666. [39] Yang C., Tan L., Shi N., Xu B., Cao Y., and Yu K., 2020. AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud.IEEE Access, 8, pp. 70604-70615. [40] Kaynak B., Kaynak S., and Uygun Ö., 2019. Cloud manufacturing architecture based on public blockchain technology.IEEE Access, 8, pp. 2163-2177. [41] Jiao Y., Wang P., Niyato D., and Suankaewmanee K., 2019. Auction mechanisms in cloud/fog computing resource allocation for public blockchain networks. IEEE Transactions on Parallel and Distributed Systems,30(9), pp. 1975-1989. [42] Xiong Z., Feng S., Wang W., Niyato D., Wang P., and Han Z., 2018. Cloud/fog computing resource management and pricing for blockchain networks. IEEE Internet of Things Journal,6(3), pp. 4585-4600. [43] Xu Q., Jin C., Rasid M.F.B.M., Veeravalli B., and Aung K.M.M., 2018. Blockchain-based decentralized content trust for docker images. Multimedia Tools and Applications,77(14), pp. 18223-18248. [44] Tuli S., Mahmud R., Tuli S., and Buyya R., 2019. Fogbus: A blockchain-based lightweight framework for edge and fog computing.Journal of Systems and Software, 154, pp. 22-36. [45] Li R., Song T., Mei B., Li H., Cheng X., and Sun L., 2018. Blockchain for large-scale internet of things data storage and protection. IEEE Transactions on Services Computing,12(5), pp. 762-771. [46] Yu B., Wright J., Nepal S., Zhu L., Liu J., and Ranjan R., 2018. IoTChain: establishing trust in the internet of things ecosystem using blockchain. IEEE Cloud Computing,5(4), pp. 12-23. [47] Zhang Y., Xu C., Cheng N., Li H., Yang H., and Shen X., 2019. Chronos+: an accurate blockchain-based time-stamping scheme for cloud storage. IEEE Transactions on Services Computing,13(2), pp. 216-229. [48] George R.S., and Sabitha S., 2013. Data anonymization and integrity checking in cloud computing. In2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1-5. [49] Arava K., and Lingamgunta S., 2020. Adaptive k-anonymity approach for privacy preserving in cloud. Arabian Journal for Science and Engineering,45(4), pp. 2425-2432. [50] Aldeen Yousra S., and Mazleena S., 2018. A new heuristic anonymization technique for privacy preserved datasets publication on cloud computing. InJournal of Physics: Conference Series, 1003, 012030. [51] Bibal Benifa J.V., and Venifa Mini G., 2020. Privacy based data publishing model for cloud computing environment. Wireless Personal Communications,113(4), pp. 2215-2241. [52] Kalia P., Bansal D., and Sofat S., 2021. Privacy preservation in cloud computing using rand omized encoding. Wireless Personal Communications,120(4), pp. 2847-2859. [53] Singh A.K., and Gupta R., 2022. A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimedia Tools and Applications,81(23), pp. 33127-33150. [54] Shrivastava P., Alam B., and Alam M., 2024. An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing. Cluster Computing,27(10), pp. 13675-13691. [55] Priya J., and Palanisamy C., 2023. Novel block chain technique for data privacy and access anonymity in smart healthcare. Intelligent Automation and Soft Computing,35(1), pp. 243-259. [56] Balamurugan G., and Tyagi A.K., 2023. A survey on privacy preserving and trust building techniques of blockchain-based systems. InPrivacy Preservation and Secured Data Storage in Cloud Computing, pp. 430-457. [57] Baranwal G., Kumar D., and Vidyarthi D.P., 2023. Blockchain based resource allocation in cloud and distributed edge computing: A survey.Computer Communications, 209, pp. 469-498. [58] Subramani J., Maria A., Sivaraman A., Vijayakumar P., Alqahtani F., and Tolba A., 2024. An efficient anonymous authentication scheme for blockchain assisted and fog-enabled smart grid.Computers and Electrical Engineering, 119, 109508. [59] Abed H., Al-Zoubi O., Alayan H., and Alshboul M., 2024. Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting. Cluster Computing,27(4), pp. 4635-4657. [60] Saini H., Singh G., Dalal S., Lilhore U.K., Simaiya S., and Dalal S., 2024. Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach. Peer-to-Peer Networking and Applications,17(6), pp. 4084-4109. |
[1] | Preety, Shubham Kumar Sharma. Serverless Architectures for Scalable and Cost-Efficient Information Systems in SMEs [J]. Int J Performability Eng, 2025, 21(8): 438-449. |
[2] | Vikas, Rajesh Prasad, Santosh Kumar Upadhyay, Amit Kumar. Zero Trust-Driven Anomaly Detection Framework for Wireless Sensor Networks [J]. Int J Performability Eng, 2025, 21(8): 463-471. |
[3] | Ramya Rajamanickam, Renu Mishra, and Saumya Chaturvedi. A Hybrid Cryptographic Framework for Privacy-Preserving and Securing Blockchain Transactions [J]. Int J Performability Eng, 2025, 21(6): 308-315. |
[4] | Santosh Kumar and Sandip Kumar Goyal. A Meta-Heuristic Framework for Trust Establishment in Social Cloud Computing [J]. Int J Performability Eng, 2025, 21(4): 209-218. |
[5] | Vikas, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Trust Management in WSN using ML for Detection of DDoS Attacks [J]. Int J Performability Eng, 2025, 21(3): 157-167. |
[6] | Vibha Mani and Shruti Jaiswal. Comparative Analysis of Hash Functions in Blockchain for Implementation of Blockchain on a Resource-Constrained System [J]. Int J Performability Eng, 2025, 21(2): 84-93. |
[7] | Anshu Devi, Ramesh Kait, and Virender Ranga. A Novel Approach for Secure and Efficient VANET Communication: Integrating Clustering, Curve Fitting, and Fog Computing [J]. Int J Performability Eng, 2024, 20(9): 572-580. |
[8] | Simarjit Singh Malhi, Raj Kumar, and Amardev Singh. Optimized Load Balancing Scheme to Enhance the Efficiency of the WLAN [J]. Int J Performability Eng, 2024, 20(6): 391-399. |
[9] | Ayushi Sharma and Kavita Pandey. MARR_VDS: A New Scheduling Approach for Energy & Cost Efficiency in VANET [J]. Int J Performability Eng, 2024, 20(5): 292-299. |
[10] | Jain Megha and Pandey Dhiraj. Blockchain-Driven Methods for Fake Product Identification [J]. Int J Performability Eng, 2024, 20(10): 631-639. |
[11] | Sahil Sikarwar, N. Jeyanthi, R. Thandeeswaran, and Hamid Mcheick. SDS-IAM: Secure Data Storage with Identity and Access Management in Blockchain [J]. Int J Performability Eng, 2024, 20(1): 32-39. |
[12] | Divya K and Uma Priyadarsini P S. Defending Delicate Health Information with Corda Blockchain Enabled MAC and UCON-Based Access Controls via IPFS [J]. Int J Performability Eng, 2024, 20(1): 48-55. |
[13] | Kavita Pandey and Shikha Jain. A Secured and Privacy Preserved VANET Communication using Blockchain [J]. Int J Performability Eng, 2023, 19(6): 417-424. |
[14] | Mohammad Adnan Muzafar, Aman Bhargava, Anupriya Jha, and Parma Nand. Securing the Supply Chain: A Comprehensive Solution with Blockchain Technology and QR-Based Anti-Counterfeit Mechanism [J]. Int J Performability Eng, 2023, 19(5): 312-323. |
[15] | Amanpreet Singh and Jyoti Batra. Strategies for Data Backup and Recovery in the Cloud [J]. Int J Performability Eng, 2023, 19(11): 728-735. |
|