Hybrid Architectures Used in the Protection of Large Healthcare Records Based on Cloud and Blockchain Integration: A Review
Abstract
:1. Introduction
1.1. Discussion of Challenges and Limitations in Field of Study
- Efficiency and Scalability: Transaction efficiency and scalability are essential issues in the blockchain. Adding interactions with the cloud can increase complexity and the time required to complete transactions, which can reduce efficiency. Scalability becomes a problem when handling large volumes of data from the cloud to the blockchain, leading to network congestion and longer processing times [24,25].
- Costs and Sustainability: Implementing blockchain and cloud solutions can be costly, both in terms of infrastructure and energy consumption. Sustainability and energy efficiency are important considerations, especially at a time when the carbon footprint of blockchain is under scrutiny. Researching more energy-efficient solutions is crucial [26].
- Interoperability and Standards: Interoperability between different blockchains and cloud providers can be a problem. The lack of common standards and protocols can hinder seamless integration. Researching and developing standards to ensure a smooth interaction is essential [25].
- Quantum Computing Resistance: With the development of quantum computing, resistance to quantum attacks becomes a concern. Blockchain and cloud must be resilient to these emerging technological challenges [27].
1.2. Study Objectives and Motivation behind Them
- RQ1: What is the distribution of papers across different years?
- RQ2: How are the chosen papers related to the proposed keywords?
- RQ3: Which of the papers explores blockchain and cloud computing as a review?
- RQ4: Which papers explore blockchain–cloud computing and healthcare?
- RQ5: In the current landscape of secure blockchain and cloud integration, what constitutes the primary challenges that organizations and practitioners face?
- RQ6: How are large healthcare files currently secured in blockchain–cloud integration, and what methods and techniques are currently being utilized?
1.3. Contributions
- Synthesis of key findings to provide a comprehensive understanding of the current state of secure integration in the given domains. Classification based on topics and keywords.
- Recommendations for future research and potential areas for improvement in the integration of blockchain technology and cloud computing for enhanced security in healthcare applications.
- Analysis of emerging trends and innovative approaches in the secure integration of blockchain and cloud computing.
- Exploration of challenges and field limitations.
2. Material and Methods
2.1. PRISMA
Why PRISMA?
- Reduction of bias: PRISMA includes guidelines that aim to reduce bias in systematic reviews. Transparent reporting helps readers assess the risk of bias in the included studies, leading to a more accurate interpretation of the evidence.
- It enables self-regulated learning by providing systematic search procedures (identification, screening, eligibility, inclusion) via online platforms.
- It serves as a valuable guide for postgraduate students and researchers in conducting comprehensive searches to find necessary papers.
- It aids readers by offering a clear understanding of the process, enabling easy tracking of information sources through systematic review records, and simplifying the evaluation of reported systematic reviews.
- Support for evidence-based practice: PRISMA contributes to the production of high-quality evidence that can be used to inform evidence-based practice, clinical guidelines, and policy decisions.
2.2. Statistics of PRISMA Use in Scientific Review Type Articles
2.3. Importance of PRISMA
2.4. Search Engines and Search Equations
- “Blockchain and Cloud Storage Integration” OR “Blockchain and Cloud Computing” OR “Secure Cloud Storage with Blockchain” OR “Decentralized Cloud Storage” OR “Blockchain-Based Data Security in Cloud” OR “Blockchain for Large File Storage” OR “Blockchain and Cloud Security” OR “Cloud-Based Blockchain Applications” OR “Blockchain for Data Integrity in Cloud” OR “Cloud Exchange with Blockchain” OR “Blockchain and Supply Chain Management” OR “Blockchain in Operations and Supply Chain” OR “Blockchain and Cloud Services” OR “Blockchain in Cloud Infrastructure” OR “Blockchain-Based Cloud Services” OR “Blockchain-Based Cloud Storage Solutions”.
- Blockchain AND Security AND Cloud
- (“All Metadata”: Blockchain) AND (“All Metadata”: Cloud)
- Blockchain and cloud and security and Healthcare
- Blockchain AND oracles
2.5. Incorporation and Exclusion Parameters
3. Results
3.1. Landscape of Healthcare-Related Blockchain Applications for Security and Privacy
Work | Title | Content |
---|---|---|
[42] | A Privacy Preserving Framework for Health Records using Blockchain | A blockchain-based privacy-preserving framework for secure storage and transfer of electronic health records (EHR). Doctors upload the EHR which is encrypted using the SHA256 hashing algorithm and stored as separate blocks on the blockchain. Patients have complete control over their EHR and can share their health records with doctors at various medical institutions through a unique key shared via the doctor’s email. Block validation is done using the Delegated Proof-of-Stake (DPoS) consensus algorithm, which guarantees the privacy of the patient’s data. |
[43] | Privacy Preservation and Access Control for Sharing Electronic Health Records Using Blockchain Technology | It presents a secure blockchain solution with smart contracts to enable the privacy-preserving sharing of electronic medical records between patients and providers while managing granular access controls. The performance scales reasonably with larger file sizes. |
[44] | Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy | Proposes a decentralized framework that integrates blockchain technology with the Interplanetary File System (IPFS) for secure and patient-centric management of electronic health records (EHR). The blockchain provides an immutable and tamper-proof distributed ledger, while the IPFS enables the off-chain storage of encrypted EHR files to overcome blockchain scalability limitations. The framework employs a patient-centric access model where patients control the sharing of their encrypted health data stored on IPFS with healthcare providers. |
[45] | Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems | The article proposes a blockchain-based personal health record (PHR) system model that aims to address several drawbacks of using blockchain for PHR systems, such as limited storage, privacy concerns, irrevocable consent, inefficient performance, and high energy consumption. The proposed model leverages blockchain’s immutability and tamper resistance features while employing proxy re-encryption and other cryptographic techniques to preserve data privacy. Key features of the model include fine-grained and flexible access control, the revocability of consent, auditability, and tamper resistance. The PHR data are encrypted and stored on cloud storage for availability, while metadata are stored on a private blockchain for tamper resistance. |
3.2. Results Based on the Proposed Research Questions
3.3. Innovative Research Perspectives
3.3.1. Encryption
3.3.2. Access Control
3.3.3. Off Chain
3.3.4. Cryptographic Techniques
3.3.5. Oracles
3.3.6. Secure Data Sharing and Consent Management
4. Discussion
4.1. Growing Recognition and Core Themes
4.2. Challenges and Innovation
4.2.1. Secure Protocols Used for Secure Connections via Cloud and Blockchain
Cloud Access Nodes
- -
- These are typically virtual machines or containers deployed in the cloud environment, acting as dedicated gateways or proxies.
- -
- They often run specialized software or agents that handle secure communication and data transfer between the blockchain network and cloud services.
- -
- The cloud access nodes can be part of a load-balanced cluster or pool for high availability and scalability.
- -
- -
- Digital signature verification using algorithms like ECDSA or RSA to ensure data integrity and authenticity [58];
- -
- Access control and authorization mechanisms, such as OAuth 2.0, JWT, or custom authentication protocols [96];
- -
- Firewalls, intrusion detection/prevention systems, and other security appliances for protecting the nodes themselves [74].
Secure APIs
- -
- APIs are the communication interfaces that enable different systems or applications to interact with each other.
- -
- In the context of blockchain and cloud integration, secure APIs are used to facilitate the secure data exchange and invocation of services between the two environments.
- -
- REST APIs over HTTPS/TLS: REST (Representational State Transfer) is a widely used architectural style for building web services. HTTPS/TLS provides encryption and authentication for data in transit [113].
- -
- gRPC over TLS: gRPC is a modern, open-source remote procedure call (RPC) framework that uses HTTP/2 for transport and can be secured with TLS [114].
- -
- WebSocket over TLS: WebSocket enables real-time, bidirectional communication between client and server, and can be secured with TLS [115].
- -
- OAuth 2.0: An industry-standard protocol for authorization, allowing third-party applications to obtain limited access to resources on behalf of a user [116].
- -
- JSON Web Tokens (JWT): A compact, URL-safe means of representing claims (e.g., user identity, permissions) securely between parties [117].
- -
- API keys and secrets: Unique identifiers and secrets issued by the API provider for authentication and authorization purposes [118].
- -
- Certificate-based authentication: Using X.509 digital certificates for mutual authentication between client and server [119].
Data Encryption
- -
- Data encryption is the process of converting plaintext data into ciphertext using an encryption algorithm and a key.
- -
- AES (Advanced Encryption Standard): A symmetric-key algorithm widely used for encrypting data in transit and at rest. AES-256 is a common variant with a 256-bit key size [111].
- -
- RSA (Rivest–Shamir–Adleman): A popular public-key cryptography algorithm used for secure data transmission and digital signatures [111].
- -
- ECC (Elliptic Curve Cryptography): A type of public-key cryptography based on the algebraic structure of elliptic curves, offering strong security with smaller key sizes compared to RSA [111].
- -
- Generating a secure encryption key (symmetric or asymmetric) using industry-standard key generation algorithms;
- -
- Encrypting plaintext data using the encryption algorithm and key;
- -
- Securely transmitting the encrypted data (ciphertext) to the destination (blockchain or cloud).
Digital Signatures
- -
- Digital signatures are used to provide data integrity, authentication, and non-repudiation for data transfers between blockchain and cloud environments.
- -
- They are based on public-key cryptography, where each party has a public/private key pair.
- -
- Calculating a cryptographic hash (e.g., SHA-256, SHA-3) of the data to be signed;
- -
- Using the private key and a digital signature algorithm (e.g., ECDSA, RSA-PSS) to generate a digital signature from the hash;
- -
- Transmitting the data and the digital signature to the recipient;
- -
- The recipient calculates the hash of the received data and verifies the digital signature using the sender’s public key and the same signature algorithm.
Secure Channels
- -
- Secure channels encrypt the entire communication session or connection between the blockchain and cloud environments, providing end-to-end protection for data in transit.
- -
- TLS/SSL (Transport Layer Security/Secure Sockets Layer): These protocols establish an encrypted and authenticated secure channel over an insecure network (e.g., the internet). TLS 1.2 and 1.3 are the latest versions [123].
- -
- IPsec (Internet Protocol Security): A suite of protocols that provide secure communication at the network layer (Layer 3) of the OSI model, enabling secure communication between networks or hosts [121].
- -
- VPNs (Virtual Private Networks): VPNs create a secure, encrypted tunnel over an untrusted network, effectively extending a private network across a public network [122].
- -
- Negotiating cryptographic parameters (e.g., cipher suites, key exchange algorithms) between the parties;
- -
- Authenticating the parties using digital certificates or pre-shared keys;
- -
- Performing a secure key exchange to derive a session key for encrypting the communication;
- -
- Encrypting and authenticating all data transmitted over the secure channel using the negotiated parameters and session key.
Authentication and Authorization
- -
- Authentication is the process of verifying the identity of a user, device, or system trying to access a resource or service.
- -
- Authorization is the process of determining what actions or resources an authenticated entity is allowed to access or perform.
- -
- Username and password credentials, often combined with multi-factor authentication (MFA) for added security [125];
- -
- Digital certificates and public-key infrastructure (PKI) for machine-to-machine authentication [126];
- -
- Biometric authentication methods like fingerprint, facial recognition, or iris scanning [127];
- -
- Federated identity providers (e.g., OAuth, SAML) for single sign-on (SSO) and identity federation across systems [128].
- -
- Role-based access control (RBAC), where permissions are assigned based on an entity’s role within the organization [124];
- -
- Attribute-based access control (ABAC), where access decisions are made based on attributes or characteristics of the requesting entity and the resource [124];
- -
- Access Control Lists (ACLs) that explicitly define which entities have access to specific resources or operations [124];
- -
- Policy-based access control, where access is governed by a set of rules or policies defined by the organization [124].
Monitoring and Auditing
- -
- Monitoring systems continuously track and log all data transfers, access attempts, and other activities between the blockchain and cloud environments.
- -
- This helps detect and respond to security incidents, data breaches, or other anomalies in a timely manner.
- -
- Automated alerting and incident response workflows triggered by predefined rules or anomaly detection models.
- -
- Network traffic monitoring and analysis using tools like network taps, packet captures, and intrusion detection/prevention systems (IDS/IPS).
- -
- Application-level monitoring and logging of API calls, service invocations, and data transfers.
- -
- Continuous monitoring of system logs, audit trails, and other security-related events.
4.3. Promising Trajectories
4.4. Integration Considerations from Reviewed Papers
4.5. Architectures, Security, and Performance
4.6. Applications and Economic Considerations in Healthcare
4.7. Challenges, Blockchain Types, and Consensus Mechanisms
4.8. Technological Landscape for Secure Blockchain–Cloud Integration in Healthcare
5. Conclusions
5.1. Key Findings
5.1.1. Data Security and Privacy
- Increased Data Security through Blockchain: The implementation of blockchain in the healthcare data management system significantly increases data security by ensuring immutability and transparency. The study demonstrated that blockchain’s cryptographic techniques effectively prevent unauthorized access and tampering, addressing critical security vulnerabilities inherent in traditional centralized systems.
- Improved Data Accessibility and Interoperability: The integration of blockchain and cloud computing facilitates better data accessibility and interoperability among different healthcare stakeholders. The study highlighted that seamless and secure data sharing between providers, patients, and insurers is achievable through smart contracts and shared ledgers, improving coordination and patient outcomes.
- Enhanced Data Privacy with Decentralized Storage: Utilizing decentralized storage mechanisms provided by blockchain technology enhances data privacy. This research confirmed that patient data can be stored in a distributed manner, making it less vulnerable to single points of failure and large-scale breaches.
5.1.2. Academic Trends and Challenges
- Growing Academic Interest and Importance: Analysis of recent research papers shows a substantial increase in scholarly attention toward integrating blockchain and cloud technologies for securing large healthcare files. Since 2017, the number of publications on this topic has steadily risen, peaking in 2022. This trend reflects the escalating recognition of the potential benefits and challenges associated with this integration.
- Challenges in Scalability and Performance: Despite the advantages, the research identified significant challenges in terms of scalability and performance. The paper detailed how integration can lead to increased latency and processing times due to the computational demands of blockchain transactions, which need to be addressed for practical, large-scale applications.
5.1.3. Technological Advancements and Patient-Centered Care
- Technological Advancements and Innovative Models: The reviewed literature highlights promising technological advancements and innovative models aimed at overcoming existing hurdles. Hybrid on-chain/off-chain architectures, advances in cryptography and trusted execution environments, and the emergence of decentralized storage networks represent significant strides in addressing scalability, efficiency, and security concerns.
- Potential for Patient-Centered Care: The integration of these technologies has significant potential to enhance patient-centered care. The research showed that patients gain greater control over their health data, which can lead to more personalized and effective treatment plans.
5.1.4. Emerging Trends and Multidisciplinary Collaboration
- Emerging Trends and Research Directions: The analysis also reveals emerging trends and promising research directions within the domain of blockchain–cloud integration for healthcare. Notable trends include the exploration of scalable consensus mechanisms tailored for enhanced scalability without compromising security, the development of interoperability standards to facilitate seamless data exchange, and the quest for quantum-resistant cryptographic solutions.
- Multidisciplinary Collaboration: The review underscores the need for multidisciplinary collaboration between blockchain experts, healthcare professionals, cloud service providers, policymakers, and other stakeholders to address the complex challenges and realize the full potential of this integration.
5.1.5. Implementation Challenges
- Real-World Implementation Challenges: While theoretical models and simulations show promise, this review highlights the significant gap between conceptual designs and practical, large-scale implementation in real-world healthcare environments. Addressing issues like legacy system integration, change management, and operational complexities is crucial for successful deployment.
5.2. Recommendations for Future Research
5.2.1. Implementation and Integration Challenges
- Real-World Implementation Challenges: This review highlights the significant gap between conceptual designs and practical, large-scale implementation in real-world healthcare environments. Addressing issues such as legacy system integration, change management, and operational complexities is crucial for successful deployment. Collaboration with IT professionals and healthcare staff is recommended to develop appropriate integration and training strategies.
- Usability and Adoption Strategies: Future studies should investigate strategies to improve the usability and adoption of blockchain–cloud solutions in healthcare, such as user-friendly interfaces, change management processes, and training programs for healthcare professionals. Research should focus on understanding the needs and challenges of end-users, and developing solutions that are intuitive and easy to implement. Additionally, case studies and pilot projects should be considered to evaluate and refine these strategies in real-world environments.
5.2.2. Technological and Research Advancements
- Exploration of Scalable Consensus Mechanisms: Future research should prioritize the development of novel consensus algorithms specifically designed for blockchain–cloud integration in healthcare settings. These algorithms should aim to improve scalability while maintaining robust security measures. Investigating consensus mechanisms that can efficiently handle the increasing transaction volumes associated with healthcare data management is crucial. Emphasis should be placed on mechanisms that can adapt to dynamic network conditions and evolving technological landscapes, ensuring long-term scalability and performance.
- Quantum-Resistant Solutions Research: Given the looming threat of quantum computing, future research endeavors should prioritize the research and development of cryptographic techniques resistant to quantum attacks. This is particularly crucial for ensuring the long-term security and resilience of blockchain–cloud systems in healthcare. Investigating quantum-resistant encryption algorithms, digital signature schemes, and authentication mechanisms will be instrumental in future-proofing these systems against emerging threats posed by advancements in quantum computing. Collaborations with academic and research institutions in cryptography are recommended.
- Technological Advancements and Innovative Models: The reviewed literature highlights promising technological advancements and innovative models aimed at overcoming existing hurdles. Hybrid on-chain/off-chain architectures, advances in cryptography and trusted execution environments, and the emergence of decentralized storage networks represent significant strides in addressing scalability, efficiency, and security concerns.
- Development of Interoperability Standards: To enhance seamless data exchange and accessibility between blockchain and cloud systems, future research should focus on developing standardized protocols and interoperability standards. These standards will play a pivotal role in enabling different platforms and systems to communicate effectively, facilitating secure and efficient data transfer. Collaboration with international standardization organizations is suggested to ensure global acceptance.
5.2.3. Sustainability and Compliance
- Regulatory Compliance Frameworks Design: Future research should address the complex legal and compliance challenges associated with blockchain–cloud integration in healthcare by designing robust regulatory compliance frameworks. These frameworks should ensure adherence to data protection regulations, privacy laws, and healthcare standards while promoting innovation and technological advancement. Developing clear guidelines and protocols for data sharing, consent management, and regulatory reporting will foster trust and confidence in blockchain–cloud infrastructures within the healthcare sector.
- Long-Term Sustainability Models Proposition: Research efforts should focus on proposing sustainable business models for maintaining blockchain–cloud infrastructures in healthcare settings. Considerations should include factors such as resource consumption, environmental impact, cost-effectiveness, and scalability. Designing sustainable models that align with economic, social, and environmental goals will be crucial for the long-term viability and adoption of blockchain–cloud integration in healthcare. Collaboration with economists and sustainability experts is recommended to develop these proposals.
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
References
- Bhari, S.; Quraishi, S.J. Blockchain and Cloud Computing-A Review. In Proceedings of the 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing, COM-IT-CON 2022, Faridabad, India, 26–27 May 2022. [Google Scholar]
- Taherdoost, H. Blockchain and Healthcare: A Critical Analysis of Progress and Challenges in the Last Five Years. Blockchains 2023, 1, 73–89. [Google Scholar] [CrossRef]
- Karuppasamy, L.; Vasudevan, V. A Novel Double Keys Adapted Elliptic Curve Cryptography and Log Normalized Gaussian Sigmoid Adaptive Neuro-fuzzy Interference System Based Secure Resource Allocation System in Decentralized Cloud Storage. Expert Syst. 2023, 40, e13206. [Google Scholar] [CrossRef]
- Doshi, D.; Khara, S. Blockchain-Based Decentralized Cloud Storage. In EAI/Springer Innovations in Communication and Computing; Springer: Cham, Switzerland, 2021. [Google Scholar]
- Coutinho, E.F.; Paulo, D.E.; Abreu, A.W.; Carla, I.M.B. Towards Cloud Computing and Blockchain Integrated Applications. In Proceedings of the 2020 IEEE International Conference on Software Architecture Companion, ICSA-C 2020, Salvador, Brazil, 16–24 March 2020. [Google Scholar]
- Gai, K.; Guo, J.; Zhu, L.; Yu, S. Blockchain Meets Cloud Computing: A Survey. IEEE Commun. Surv. Tutor. 2020, 22, 2009–2030. [Google Scholar] [CrossRef]
- Han, H.; Fei, S.; Yan, Z.; Zhou, X. A Survey on Blockchain-Based Integrity Auditing for Cloud Data. Digit. Commun. Netw. 2022, 8, 591–603. [Google Scholar] [CrossRef]
- Alromaihi, N.; Ismail, Y.; Elmedany, W. Literature Review of Blockchain-Based Cloud Computing: Data Security Issues and Challenges. In Proceedings of the 2022 International Conference on Data Analytics for Business and Industry, ICDABI 2022, Virtual, 25–26 October 2022. [Google Scholar]
- Xie, S.; Zheng, Z.; Chen, W.; Wu, J.; Dai, H.N.; Imran, M. Blockchain for Cloud Exchange: A Survey. Comput. Electr. Eng. 2020, 81, 106526. [Google Scholar] [CrossRef]
- Sharma, S.G.; Ahuja, L.; Goyal, D.P. Building Secure Infrastructure for Cloud Computing Using Blockchain. In Proceedings of the Proceedings of the 2nd International Conference on Intelligent Computing and Control Systems, ICICCS 2018, Madurai, India, 14–15 June 2018. [Google Scholar]
- Tang, Y.; Zou, Q.; Chen, J.; Li, K.; Kamhoua, C.A.; Kwiat, K.; Njilla, L. ChainFS: Blockchain-Secured Cloud Storage. In Proceedings of the IEEE International Conference on Cloud Computing, CLOUD, San Francisco, CA, USA, 2–7 July 2018. [Google Scholar]
- Zang, H.; Kim, J. A Comprehensive Study on Blockchain-Based Cloud-Native Storage for Data Confidence. In Proceedings of the International Conference on Ubiquitous and Future Networks, ICUFN, Paris, France, 4–7 July 2023; Volume 2023-July. [Google Scholar]
- Wan, J.; Hu, K.; Li, J.; Su, H.; Wu, Q.; Li, M.; Feng, L.; Pan, Y. Smart Contract Service Optimization in Blockchain-Cloud Collaborative Computing. In Proceedings of the IEEE International Conference on Mobile Data Management, Singapore, 3–6 July 2023; Volume 2023-July. [Google Scholar]
- Xu, M.; Liu, S.; Yu, D.; Cheng, X.; Guo, S.; Yu, J. CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA. IEEE Trans. Comput. 2022, 71, 3242–3253. [Google Scholar] [CrossRef]
- Meng, S.; Luo, L.; Sun, P.; Gao, Y. Reliability Service Assurance in Public Clouds Based on Blockchain. In Proceedings of the Companion of the 2020 IEEE 20th International Conference on Software Quality, Reliability, and Security, QRS-C 2020, Macau, China, 11–14 December 2020. [Google Scholar]
- Tapas, N.; Merlino, G.; Longo, F.; Puliafito, A. Blockchain-Based Publicly Verifiable Cloud Storage. In Proceedings of the 2019 IEEE International Conference on Smart Computing, SMARTCOMP 2019, Washington, DC, USA, 12–15 June 2019. [Google Scholar]
- Dorsala, M.R.; Sastry, V.N.; Chapram, S. Blockchain-Based Solutions for Cloud Computing: A Survey. J. Netw. Comput. Appl. 2021, 196, 103246. [Google Scholar] [CrossRef]
- Zhu, H.; Wang, Y.; Hei, X.; Ji, W.; Zhang, L. A Blockchain-Based Decentralized Cloud Resource Scheduling Architecture. In Proceedings of the 2018 International Conference on Networking and Network Applications, NaNA 2018, Xi’an, China, 12–15 October 2018. [Google Scholar]
- Reantongcome, V.; Visoottiviseth, V.; Sawangphol, W.; Khurat, A.; Kashihara, S.; Fall, D. Securing and Trustworthy Blockchain-Based Multi-Tenant Cloud Computing. In Proceedings of the ISCAIE 2020—IEEE 10th Symposium on Computer Applications and Industrial Electronics, Penang, Malaysia, 18–19 April 2020. [Google Scholar]
- Xi, N.; Liu, J.; Li, Y.; Qin, B. Decentralized Access Control for Secure Microservices Cooperation with Blockchain. ISA Trans. 2023, 141, 44–51. [Google Scholar] [CrossRef] [PubMed]
- Duan, L.; Xu, W.; Ni, W.; Wang, W. BSAF: A Blockchain-Based Secure Access Framework with Privacy Protection for Cloud-Device Service Collaborations. J. Syst. Archit. 2023, 140, 102897. [Google Scholar] [CrossRef]
- Esposito, C.; De Santis, A.; Tortora, G.; Chang, H.; Choo, K.-K.R. Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? IEEE Cloud Comput. 2018, 5, 31–37. [Google Scholar] [CrossRef]
- Xia, Q.; Sifah, E.B.; Smahi, A.; Amofa, S.; Zhang, X. BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments. Information 2017, 8, 44. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In Proceedings of the 2017 IEEE 6th International Congress on Big Data, BigData Congress 2017, Honolulu, HI, USA, 25–30 June 2017. [Google Scholar]
- Hasan, M.; Ogan, K.; Starly, B. Hybrid Blockchain Architecture for Cloud Manufacturing-as-a-Service (CMaaS) Platforms with Improved Data Storage and Transaction Efficiency. Procedia Manuf. 2021, 53, 594–605. [Google Scholar] [CrossRef]
- Prasad, S.N.; Rekha, C. Block Chain Based IAS Protocol to Enhance Security and Privacy in Cloud Computing. Meas. Sens. 2023, 28, 100813. [Google Scholar] [CrossRef]
- Mechkaroska, D.; Popovska-Mitrovikj, A.; Mitrevska, S. Overview of Blockchain and Cloud Computing Services Integration. In Proceedings of the 2022 30th Telecommunications Forum, TELFOR 2022, Belgrade, Serbia, 15–16 November 2022. [Google Scholar]
- Yang, F.; Lei, L.; Zhu, H. Overview of Blockchain and Cloud Service Integration. In Proceedings of the 2022 IEEE 8th International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2022, Jinan, China, 6–8 May 2022. [Google Scholar]
- Zou, J.; He, D.; Zeadally, S.; Kumar, N.; Wang, H.; Choo, K.R. Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. ACM Comput. Surv. 2022, 54, 1–36. [Google Scholar] [CrossRef]
- Sharma, S.; Sharma, S.; Choudhury, T. A Study And Analysis of Decentralized Cloud Based Platform. In Proceedings of the Confluence 2022—12th International Conference on Cloud Computing, Data Science and Engineering, Noida, India, 27–28 January 2022. [Google Scholar]
- Wilczyński, A.; Kołodziej, J. Modelling and Simulation of Security-Aware Task Scheduling in Cloud Computing Based on Blockchain Technology. Simul. Model Pr. Theory 2020, 99, 102038. [Google Scholar] [CrossRef]
- Ahmad, H.; Aujla, G.S. GDPR Compliance Verification through a User-Centric Blockchain Approach in Multi-Cloud Environment. Comput. Electr. Eng. 2023, 109, 108747. [Google Scholar] [CrossRef]
- Aljaloud, A.; Razzaq, A. Modernizing the Legacy Healthcare System to Decentralize Platform Using Blockchain Technology. Technology 2023, 11, 84. [Google Scholar] [CrossRef]
- Berdik, D.; Otoum, S.; Schmidt, N.; Porter, D.; Jararweh, Y. A Survey on Blockchain for Information Systems Management and Security. Inf. Process Manag. 2021, 58, 102397. [Google Scholar] [CrossRef]
- Taghavi, M.; Bentahar, J.; Otrok, H.; Bakhtiyari, K. A Reinforcement Learning Model for the Reliability of Blockchain Oracles. Expert Syst. Appl. 2023, 214, 119160. [Google Scholar] [CrossRef]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. Declaración PRISMA 2020: Una Guía Actualizada Para La Publicación de Revisiones Sistemáticas. Rev. Española Cardiol. (Engl. Ed.) 2021, 74, 790–799. [Google Scholar] [CrossRef]
- Urrútia, G.; Bonfilll, X. La Declaración Prisma: Un Paso Adelante En La Mejora de Las Publicaciones de La Revista Española de Salud Pública. Rev. Esp. Salud Publica 2013, 87, 99–102. [Google Scholar] [CrossRef] [PubMed]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 Statement: An Updated Guideline for Reporting Systematic Reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef] [PubMed]
- Tith, D.; Lee, J.S.; Suzuki, H.; Wijesundara, W.M.A.B.; Taira, N.; Obi, T.; Ohyama, N. Application of Blockchain to Maintaining Patient Records in Electronic Health Record for Enhanced Privacy, Scalability, and Availability. Health Inf. Res 2020, 26, 3–12. [Google Scholar] [CrossRef] [PubMed]
- Dagher, G.G.; Mohler, J.; Milojkovic, M.; Marella, P.B. Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology. Sustain. Cities Soc. 2018, 39, 283–297. [Google Scholar] [CrossRef]
- Yue, X.; Wang, H.; Jin, D.; Li, M.; Jiang, W. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control. J. Med. Syst. 2017, 40, 218. [Google Scholar] [CrossRef] [PubMed]
- Karunakaran, C.; Ganesh, K.; Ansar, S.; Subramani, R. A Privacy Preserving Framework for Health Records Using Blockchain. Pertanika J. Sci. Technol. 2021, 29, 3081–3098. [Google Scholar] [CrossRef]
- Boumezbeur, I.; Zarour, K. Privacy Preservation and Access Control for Sharing Electronic Health Records Using Blockchain Technology. Acta Inform. Pragensia 2022, 11, 105–122. [Google Scholar] [CrossRef]
- Jayabalan, J.; Jeyanthi, N. Scalable Blockchain Model Using Off-Chain IPFS Storage for Healthcare Data Security and Privacy. J. Parallel Distrib. Comput. 2022, 164, 152–167. [Google Scholar] [CrossRef]
- Thwin, T.T.; Vasupongayya, S. Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. Secur. Commun. Netw. 2019, 2019, 1–5. [Google Scholar] [CrossRef]
- Seenivasan, M.; Krishnasamy, V.; Muppudathi, S.S. Data Division Using Fuzzy Logic and Blockchain for Data Security in Cyber Space. Procedia Comput. Sci. 2022, 215, 452–460. [Google Scholar] [CrossRef]
- Dai, F.; Shi, Y.; Meng, N.; Wei, L.; Ye, Z. From Bitcoin to Cybersecurity: A Comparative Study of Blockchain Application and Security Issues. In Proceedings of the 2017 4th International Conference on Systems and Informatics, ICSAI 2017, Hangzhou, China, 11–13 January 2017; Volume 2018-January. [Google Scholar]
- Yang, Z.; Chen, Y.; Huang, Y.; Li, X. Protecting Personal Sensitive Data Security in the Cloud with Blockchain. Adv. Comput. 2021, 120, 195–231. [Google Scholar]
- Che, J.; Duan, Y.; Zhang, T.; Fan, J. Study on the Security Models and Strategies of Cloud Computing. Procedia Eng. 2011, 23, 586–593. [Google Scholar] [CrossRef]
- Nahar, N.; Hasin, F.; Taher, K.A. Application of Blockchain for the Security of Decentralized Cloud Computing. In Proceedings of the 2021 International Conference on Information and Communication Technology for Sustainable Development, ICICT4SD 2021, Dhaka, Bangladesh, 27–28 February 2021. [Google Scholar]
- Meenakshi, K.; Bharathi, B.; Thangaraj, S.J.J.; Sivasubramanian, S. Cloud Security Analysis Using Blockchain Technology. In Proceedings of the Proceedings of the 2nd International Conference on Edge Computing and Applications, ICECAA 2023, Namakkal, India, 19–21 July 2023. [Google Scholar]
- Ren, H.; Xu, G.; Qi, H.; Zhang, T. PriFR: Privacy-Preserving Large-Scale File Retrieval System via Blockchain for Encrypted Cloud Data. In Proceedings of the 2023 IEEE 9th International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity-HPSC-IDS 2023, New York, NY, USA, 6–8 May 2023. [Google Scholar]
- Pise, R.; Patil, S. Enhancing Security of Data in Cloud Storage Using Decentralized Blockchain. In Proceedings of the 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India, 4–6 February 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 161–167. [Google Scholar]
- Gaba, S.; Budhiraja, I.; Makkar, A.; Garg, D. Machine Learning for Detecting Security Attacks on Blockchain Using Software Defined Networking. In Proceedings of the 2022 IEEE International Conference on Communications Workshops, ICC Workshops 2022, Seoul, Republic of Korea, 16–20 May 2022. [Google Scholar]
- Cai, W.; Qu, J. Systematic Research on Information Security Based on Blockchain Technology. In Proceedings of the Proceedings of the International Conference on Electronics and Renewable Systems, ICEARS 2022, Tuticorin, India, 16–18 March 2022. [Google Scholar]
- Gong-Guo, Z.; Wan, Z. Blockchain-Based IoT Security Authentication System. In Proceedings of the 2021 International Conference on Computer, Blockchain and Financial Development, CBFD 2021, Nanjing, China, 23–25 April 2021. [Google Scholar]
- Wang, X.; Badshah, A.; Tu, S.; Waqas, M. Blockchain Boundary Security Protection Based on Trusted Computing. In Proceedings of the 2021 2nd Asia Symposium on Signal Processing, ASSP 2021, Beijing, China, 12–14 November 2021. [Google Scholar]
- Fartitchou, M.; Marraki, H.; El Lafkir, L.; Azzouz, A.; El Makkaoui, K.; El Allali, Z. Public-Key Cryptography behind Blockchain Security. In Proceedings of the 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5G/6G-Based Interconnected Digital Worlds, NISS 2022, Bandung, Indonesia, 30–31 March 2022. [Google Scholar]
- Vidal, F.R.; Ivaki, N.; Laranjeiro, N. Advancing Blockchain Security: From Vulnerability Detection to Transaction Revocation. In Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks—Supplemental Volume, DSN-S 2023, Porto, Portugal, 27–30 June 2023. [Google Scholar]
- Bai, L.H.; Liu, L.H. Research on Software Defined Network Security Model Based on Blockchain. In Proceedings of the 2021 IEEE 6th International Conference on Intelligent Computing and Signal Processing, ICSP 2021, Xi’an, China, 9–11 April 2021. [Google Scholar]
- Sharma, S.; Shah, K. Exploring Security Threats on Blockchain Technology along with Possible Remedies. In Proceedings of the 2022 IEEE 7th International conference for Convergence in Technology, I2CT 2022, Mumbai, India, 7–9 April 2022. [Google Scholar]
- Hammouti, I.; Addaim, A.; Guennoun, Z. Proposed Architecture of Cyber Security in Smart Grids, Blockchain as Solution. In Proceedings of the 2022 IEEE Information Technologies and Smart Industrial Systems, ITSIS 2022, Paris, France, 15–17 July 2022. [Google Scholar]
- Kim, J.J.; Lingga, P.; Jeong, J.P.; Choi, Y.; Park, J. A Web-Based Monitoring System of Network Security Functions in Blockchain-Based Cloud Security Systems. In Proceedings of the International Conference on Information Networking, Jeju, Republic of Korea, 12–15 January 2022; Volume 2022-January. [Google Scholar]
- Tiwari, A.; Agarwal, V.; Aggarwal, Y.; Srivastava, U. Server Security in Cloud Computing Using Blockchain. In Proceedings of the 8th International Conference on Advanced Computing and Communication Systems, ICACCS 2022, Coimbatore, India, 25–26 March 2022. [Google Scholar]
- Harshavardhan, A.; Vijayakumar, T.; Mugunthan, S.R. Blockchain Technology in Cloud Computing to Overcome Security Vulnerabilities. In Proceedings of the International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2018, Palladam, India, 30–31 August 2018. [Google Scholar]
- Lo, S.K.; Xu, X.; Staples, M.; Yao, L. Reliability Analysis for Blockchain Oracles. Comput. Electr. Eng. 2020, 83, 106582. [Google Scholar] [CrossRef]
- Hassan, A.; Makhdoom, I.; Iqbal, W.; Ahmad, A.; Raza, A. From Trust to Truth: Advancements in Mitigating the Blockchain Oracle Problem. J. Netw. Comput. Appl. 2023, 217, 103672. [Google Scholar] [CrossRef]
- Ahmed, M.; Akhter, A.F.M.S.; Rashid, A.N.M.B.; Pathan, A.S.K. A Dependable and Secure Consensus Algorithm for Blockchain Assisted Microservice Architecture. Comput. Electr. Eng. 2023, 109, 108762. [Google Scholar] [CrossRef]
- Zhang, Y.; Xiong, L.; Li, F.; Niu, X.; Wu, H. A Blockchain-Based Privacy-Preserving Auditable Authentication Scheme with Hierarchical Access Control for Mobile Cloud Computing. J. Syst. Archit. 2023, 142, 102949. [Google Scholar] [CrossRef]
- Samuel Babu, G.J.; Baskar, M. Application of Blockchain Methodology in Secure Task Scheduling in Cloud Environment. Adv. Eng. Softw. 2022, 172, 103175. [Google Scholar] [CrossRef]
- Chung, K.H.Y.; Li, D.; Adriaens, P. Technology-Enabled Financing of Sustainable Infrastructure: A Case for Blockchains and Decentralized Oracle Networks. Technol. Forecast Soc. Chang. 2023, 187, 122258. [Google Scholar] [CrossRef]
- Kochovski, P.; Gec, S.; Stankovski, V.; Bajec, M.; Drobintsev, P.D. Trust Management in a Blockchain Based Fog Computing Platform with Trustless Smart Oracles. Future Gener. Comput. Syst. 2019, 101, 747–759. [Google Scholar] [CrossRef]
- Eltayieb, N.; Elhabob, R.; Hassan, A.; Li, F. A Blockchain-Based Attribute-Based Signcryption Scheme to Secure Data Sharing in the Cloud. J. Syst. Archit. 2020, 102, 101653. [Google Scholar] [CrossRef]
- Kumar, M.; Singh, A.K. Distributed Intrusion Detection System Using Blockchain and Cloud Computing Infrastructure. In Proceedings of the Proceedings of the 4th International Conference on Trends in Electronics and Informatics, ICOEI 2020, Tirunelveli, India, 15–17 June 2020. [Google Scholar]
- Shah, M.; Shaikh, M.; Mishra, V.; Tuscano, G. Decentralized Cloud Storage Using Blockchain. In Proceedings of the 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), Tirunelveli, India, 15–17 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 384–389. [Google Scholar]
- Huang, L.; Lee, H.H. A Medical Data Privacy Protection Scheme Based on Blockchain and Cloud Computing. Wirel. Commun. Mob. Comput. 2020, 2020, 1–11. [Google Scholar] [CrossRef]
- Qi, G.; Zhu, Z.; Haner, M.; Sim, J.; Sun, J.; Chai, Y.; Chen, Y.; Yongfu, L. Blockchain Based Consensus Checking in Cloud Storage. In Proceedings of the 2019 IEEE 14th International Symposium on Autonomous Decentralized Systems, ISADS 2019, Utrecht, The Netherlands, 8–10 April 2019. [Google Scholar]
- Liu, X. Research on University Book Sharing Cloud Platform Based on Blockchain. In Proceedings of the ACM International Conference Proceeding Series, Chongqing, China, 28–30 May 2021. [Google Scholar]
- Wijesekara, P.A.D.S.N.; Gunawardena, S. A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges. Network 2023, 3, 343–421. [Google Scholar] [CrossRef]
- Praveena Anjelin, D.; Ganesh Kumar, S. Blockchain Technology for Data Sharing in Decentralized Storage System. Adv. Intell. Syst. Comput. 2021, 1172, 369–382. [Google Scholar]
- Soares, P.; Saraiva, R.; Fernandes, I.; Neto, A.; Souza, J. A Blockchain-Based Customizable Document Registration Service for Third Parties. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2022, Shanghai, China, 2–5 May 2022. [Google Scholar]
- Fitwi, A.; Chen, Y.; Zhu, S. A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge. In Proceedings of the 2019 2nd IEEE International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, 14–17 July 2019. [Google Scholar]
- Yang, Y.; Hu, M.; Cheng, Y.; Liu, X.; Ma, W. Keyword Searchable Encryption Scheme Based on Blockchain in Cloud Environment. In Proceedings of the 2020 3rd International Conference on Smart BlockChain, SmartBlock 2020, Zhengzhou, China, 23–25 October 2020. [Google Scholar]
- Uthayashangar, S.; Dhanya, T.; Dharshini, S.; Gayathri, R. Decentralized Blockchain Based System for Secure Data Storage in Cloud. In Proceedings of the 2021 International Conference on System, Computation, Automation and Networking, ICSCAN 2021, Puducherry, India, 30–31 July 2021. [Google Scholar]
- Spoorti, H.; Sneha, R.; Soujanya, V.; Heena, K.; Pooja, S.; Narayan, D.G. Secure Access Control to Cloud Resources Using Blockchain. In Proceedings of the 2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2021, Nitte, India, 19–20 October 2021. [Google Scholar]
- Mendki, P. Securing Cloud Native Applications Using Blockchain. In Proceedings of the 2021 12th International Conference on Information and Communication Systems, ICICS 2021, Valencia, Spain, 24–26 May 2021. [Google Scholar]
- Lahoti, S.; Singh, D. Blockchain Technology Based Secure Data Sharing in Cloud Computing. In Proceedings of the IEEE International Conference on Knowledge Engineering and Communication Systems, ICKES 2022, Chickballapur, India, 28–29 December 2022. [Google Scholar]
- Li, X. Development of Cloud Information Platform Based on Blockchain Public Service Platform. In Proceedings of the 6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022, Dharan, Nepal, 10–12 November 2022. [Google Scholar]
- Yao, S.; Wang, M.; Qu, Q.; Zhang, Z.; Zhang, Y.F.; Xu, K.; Xu, M. Blockchain-Empowered Collaborative Task Offloading for Cloud-Edge-Device Computing. IEEE J. Sel. Areas Commun. 2022, 40, 3485–3500. [Google Scholar] [CrossRef]
- Chee, T.H.; Rana, M.E. An Exploratory Study on the Impact of Hosting Blockchain Applications in Cloud Infrastructures. In Proceedings of the 2023 15th International Conference on Developments in eSystems Engineering (DeSE), Baghdad & Anbar, Iraq, 9–12 January 2023; IEEE: Piscataway, NJ, USA, 2023; Volume 2023-January, pp. 381–386. [Google Scholar]
- Thipphonexai, X.; Guanghui, Y. Research on Analysis and Design of Cloud ERP Based on Blockchain Technology. In Proceedings of the 2020 International Conference on Virtual Reality and Intelligent Systems, ICVRIS 2020, Zhangjiajie, China, 18–19 July 2020. [Google Scholar]
- Bacis, E.; De Capitani Di Vimercati, S.; Foresti, S.; Paraboschi, S.; Rosa, M.; Samarati, P. Securing Resources in Decentralized Cloud Storage. IEEE Trans. Inf. Forensics Secur. 2020, 15, 286–298. [Google Scholar] [CrossRef]
- Karuppasamy, L.; Vasudevan, V. Security Management in Decentralized Cloud Storage via Improved Bees Swarm Optimisation Data Slicers. In Proceedings of the International Conference on Edge Computing and Applications, ICECAA 2022, Tamilnadu, India, 13–15 October 2022. [Google Scholar]
- Bacis, E.; De Capitani DI Vimercati, S.; Foresti, S.; Paraboschi, S.; Rosa, M.; Samarati, P. Dynamic Allocation for Resource Protection in Decentralized Cloud Storage. In Proceedings of the 2019 IEEE Global Communications Conference, GLOBECOM 2019, Waikoloa, HI, USA, 9–13 December 2019. [Google Scholar]
- Doan, T.V.; Psaras, Y.; Ott, J.; Bajpai, V. Toward Decentralized Cloud Storage With IPFS: Opportunities, Challenges, and Future Considerations. IEEE Internet Comput. 2022, 26, 7–15. [Google Scholar] [CrossRef]
- Khatiwada, P.; Yang, B. An Access Control and Authentication Scheme for Secure Data Sharing in the Decentralized Cloud Storage System. In Proceedings of the 5th Conference on Cloud and Internet of Things, CIoT 2022, Marrakech, Morocco, 28–30 March 2022. [Google Scholar]
- Golightly, L.; Modesti, P.; Garcia, R.; Chang, V. Securing Distributed Systems: A Survey on Access Control Techniques for Cloud, Blockchain, IoT and SDN. Cyber Secur. Appl. 2023, 1, 100015. [Google Scholar] [CrossRef]
- Baranwal, G.; Kumar, D.; Vidyarthi, D.P. Blockchain Based Resource Allocation in Cloud and Distributed Edge Computing: A Survey. Comput. Commun. 2023, 209, 469–498. [Google Scholar] [CrossRef]
- Tarannum, W.; Abidin, S. Integration of Blockchain and Cloud Computing: A Review. In Proceedings of the 17th INDIACom; 2023 10th International Conference on Computing for Sustainable Global Development, INDIACom 2023, New Delhi, India, 15–17 March 2023. [Google Scholar]
- Feng, T.; Liu, Y. Research on PoW Protocol Security under Optimized Long Delay Attack. Cryptography 2023, 7, 32. [Google Scholar] [CrossRef]
- Kim, M.; Yu, S.; Lee, J.; Park, Y.; Park, Y. Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain. Sensors 2020, 20, 2913. [Google Scholar] [CrossRef]
- AbuHalimeh, A.; Ali, O. Comprehensive Review for Healthcare Data Quality Challenges in Blockchain Technology. Front. Big Data 2023, 6, 1173620. [Google Scholar] [CrossRef] [PubMed]
- Miyachi, K.; Mackey, T.K. HOCBS: A Privacy-Preserving Blockchain Framework for Healthcare Data Leveraging an on-Chain and off-Chain System Design. Inf. Process Manag. 2021, 58, 102535. [Google Scholar] [CrossRef]
- Kumar, R.; Marchang, N.; Tripathi, R. Distributed Off-Chain Storage of Patient Diagnostic Reports in Healthcare System Using IPFS and Blockchain. In Proceedings of the 2020 International Conference on COMmunication Systems and NETworkS, COMSNETS 2020, Bengaluru, India, 7–11 January 2020. [Google Scholar]
- Zhou, J.; Feng, Y.; Wang, Z.; Guo, D. Using Secure Multi-Party Computation to Protect Privacy on a Permissioned Blockchain. Sensors 2021, 21, 1540. [Google Scholar] [CrossRef] [PubMed]
- Knott, B.; Venkataraman, S.; Hannun, A.; Sengupta, S.; Ibrahim, M.; van der Maaten, L. CrypTen: Secure Multi-Party Computation Meets Machine Learning. Adv. Neural Inf. Process Syst. 2021, 34, 4961–4973. [Google Scholar]
- Diro, A.; Zhou, L.; Saini, A.; Kaisar, S.; Hiep, P.C. Leveraging Zero Knowledge Proofs for Blockchain-Based Identity Sharing: A Survey of Advancements, Challenges and Opportunities. J. Inf. Secur. Appl. 2024, 80, 103678. [Google Scholar] [CrossRef]
- Pop, C.D.; Antal, M.; Cioara, T.; Anghel, I.; Salomie, I. Blockchain and Demand Response: Zero-Knowledge Proofs for Energy Transactions Privacy. Sensors 2020, 20, 5678. [Google Scholar] [CrossRef] [PubMed]
- Caldarola, F.; d’Atri, G.; Zanardo, E. Neural Fairness Blockchain Protocol Using an Elliptic Curves Lottery †. Mathematics 2022, 10, 3040. [Google Scholar] [CrossRef]
- Kumar, S.K.; Ramana, K.; Dhiman, G.; Singh, S.; Yoon, B. A Novel Blockchain and Bi-linear Polynomial-based Qcp-abe Framework for Privacy and Security over the Complex Cloud Data. Sensors 2021, 21, 7300. [Google Scholar] [CrossRef] [PubMed]
- de Moraes Rossetto, A.G.; Sega, C.; Leithardt, V.R.Q. An Architecture for Managing Data Privacy in Healthcare with Blockchain. Sensors 2022, 22, 8292. [Google Scholar] [CrossRef]
- Brickman, A.; Baykara, Y.; Carabaño, M.; Hacking, S.M. Whole Slide Images as Non-Fungible Tokens: A Decentralized Approach to Secure, Scalable Data Storage and Access. J. Pathol. Inf. 2024, 15, 100350. [Google Scholar] [CrossRef]
- Makhdoom, I.; Zhou, I.; Abolhasan, M.; Lipman, J.; Ni, W. PrivySharing: A Blockchain-Based Framework for Privacy-Preserving and Secure Data Sharing in Smart Cities. Comput. Secur. 2020, 88, 101653. [Google Scholar] [CrossRef]
- Bondarenko, A.; Zaytsev, K. Studying Systems of Open Source Messaging. J. Theor. Appl. Inf. Technol. 2019, 97, 5115–5125. [Google Scholar]
- Bormann, C.; Lemay, S.; Tschofenig, H.; Hartke, K.; Silverajan, B.B.; Raymor, E. CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets. RFC 8323. 2018. Available online: https://www.rfc-editor.org/rfc/rfc8323 (accessed on 1 April 2024).
- Senapartha, I.K.D. Implementasi Single Sign-On Menggunakan Google Identity, REST Dan OAuth 2.0 Berbasis Scrum. J. Tek. Inform. Dan Sist. Inf. 2021, 7, 307. [Google Scholar] [CrossRef]
- Bucko, A.; Vishi, K.; Krasniqi, B.; Rexha, B. Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History. Computers 2023, 12, 78. [Google Scholar] [CrossRef]
- Dahlmanns, M.; Sander, C.; Decker, R.; Wehrle, K. Secrets Revealed in Container Images: An Internet-Wide Study on Occurrence and Impact. In Proceedings of the ACM Conference on Computer and Communications Security, Copenhagen, Denmark, 26–30 November 2023. [Google Scholar]
- Saleem, T.; Janjua, M.U.; Hassan, M.; Ahmad, T.; Tariq, F.; Hafeez, K.; Salal, M.A.; Bilal, M.D. ProofChain: An X.509-Compatible Blockchain-Based PKI Framework with Decentralized Trust. Comput. Netw. 2022, 213, 109069. [Google Scholar] [CrossRef]
- Toradmalle, D.; Singh, R.; Shastri, H.; Naik, N.; Panchidi, V. Prominence of ECDSA over RSA Digital Signature Algorithm. In Proceedings of the International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2018, Palladam, India, 30–31 August 2018. [Google Scholar]
- Liyanage, M.; Braeken, A.; Jurcut, A.D.; Ylianttila, M.; Gurtov, A. Secure Communication Channel Architecture for Software Defined Mobile Networks. Comput. Netw. 2017, 114, 32–50. [Google Scholar] [CrossRef]
- Abdulazeez, A.M.; Salim, B.W.; Zeebaree, D.Q.; Doghramachi, D. Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol. Int. J. Interact. Mob. Technol. 2020, 14, 154. [Google Scholar] [CrossRef]
- Satapathy, A.; Livingston, J. A Comprehensive Survey on SSL/ TLS and Their Vulnerabilities. Int. J. Comput. Appl. 2017, 153, 31–38. [Google Scholar] [CrossRef]
- Zhu, Y.; Wu, X.; Hu, Z. Fine Grained Access Control Based on Smart Contract for Edge Computing. Electronics 2022, 11, 167. [Google Scholar] [CrossRef]
- Asim, J.; Khan, A.S.; Saqib, R.M.; Abdullah, J.; Ahmad, Z.; Honey, S.; Afzal, S.; Alqahtani, M.S.; Abbas, M. Blockchain-Based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review. Appl. Sci. 2022, 12, 3551. [Google Scholar] [CrossRef]
- Zhao, G.; Di, B.; He, H. A Novel Decentralized Cross-Domain Identity Authentication Protocol Based on Blockchain. Trans. Emerg. Telecommun. Technol. 2022, 33, e4377. [Google Scholar] [CrossRef]
- Pandiyan, S.; Keerthika, V.; Surendran, S.; Ravi, S. Secure and Privacy Improved Cloud User Authentication in Biometric Multimodal Multi Fusion Using Blockchain-Based Lightweight Deep Instance-Based DetectNet. Netw. Comput. Neural Syst. 2024. [Google Scholar] [CrossRef] [PubMed]
- Sri Sathya, K.B.; Nithyasri, A.; Amirtha, E.; Fowjiya, S. Serverless Blockchain-Based AI-Powered Financial Transaction Management System on Cloud. In Proceedings of the Proceedings of the 3rd International Conference on Smart Technologies in Computing, Electrical and Electronics, ICSTCEE 2022, Bengaluru, India, 16–17 December 2022. [Google Scholar]
- Safana Hyder Abbas; Wedad Abdul Khuder Naser; Amal Abbas Kadhim Subject Review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). Glob. J. Eng. Technol. Adv. 2023, 14, 155–158. [CrossRef]
Papers Included | Papers Excluded |
---|---|
Papers must talk about blockchain and cloud integration. | Papers that focus on cryptocurrencies or its focus is Internet of Things. |
Papers that mention ways of securely connecting the cloud with blockchain and show the process. | Papers published before 2017. |
Review papers that help the purpose and objective of this paper. | Papers that proposed storing the chain in the cloud. |
Year | Number of Papers |
---|---|
2017 | 6 |
2018 | 6 |
2019 | 12 |
2020 | 26 |
2021 | 21 |
2022 | 29 |
2023 | 29 |
Work | Security | Review/ Survey | Blockchain–Cloud | Chain Integrity | Healthcare |
---|---|---|---|---|---|
[46,47] | X | X | X | X | |
[15,26,28,31,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65] | X | X | X | ||
[4,5,10,11,12,13,14,16,18,19,20,21,23,24,25,27,32,35,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91] | X | X | |||
[49,92,93] | X | X | |||
[3,30,94,95,96] | X | ||||
[1,6,7,9,17,29,97,98,99] | X | X | X | ||
[100] | X | ||||
[10,65] | X | X | X |
Work | Title | Area of Focus | Content |
---|---|---|---|
[99] | Integration of Block-chain and Cloud Computing: A Review. | Blockchain, Cloud Computing, and security. | Explores the rising use of blockchain for enhancing cloud data security across various sectors. Suggests integrating blockchain to address vulnerabilities in centralized cloud computing systems. The focus is on reviewing the benefits and applications of cloud-based blockchain services, emphasizing current trends and security challenges. |
[1] | Blockchain and Cloud Computing-A Review | Blockchain and Cloud Computing | Examine the literature on blockchain-based enterprise solutions from 2008 to 2021. It explores three categories: blockchain using IaaS, PaaS, and SaaS, discussing characteristics and their relation to cloud services. The study investigates cutting-edge applications in ledger storage, strategy creation, computation, data aggregation, micro-services, and extraction. The report concludes with current issues, expected obstacles, and potential opportunities in blockchain-based cloud technology, aiming to contribute to a comprehensive understanding and the future development of cloud computing environments. |
[8] | Literature Review of Blockchain-based Cloud Computing: Data Security Issues and Challenges | Blockchain, Cloud Computing, Security Issues, and Challenges | This paper highlights the growing acceptance of cloud computing for handling IT infrastructure and data services efficiently. Also, it explores how blockchain technology, known for its incorruptible nature, can address security issues in cloud applications. As well, the paper emphasizes the importance of security in realizing the benefits of both cloud computing and blockchain. It proposes a literature review to examine how academics utilize blockchain to enhance cloud data security. |
[99] | Blockchain Technology Application in Security: A Systematic Review | Blockchain, Cloud Com-putting, and security. | The study focuses on categorizing blockchain types, consensus mechanisms, smart contract usage, and integration with other software-based algorithms. The authors emphasize the increasing popularity of blockchain beyond digital currencies, particularly in securing networks. The systematic review identifies the Internet of Things (IoT) as the primary field where blockchain enhances security. |
Work | Title | Contribution(s) |
---|---|---|
[2] | A Critical Analysis of Progress and Challenges in the Last Five Years | The paper significantly contributes by objectively evaluating the impact of blockchain technology in the healthcare sector, drawing insights from a thorough analysis of 124 papers published by MDPI over the past five years. Its noteworthy identification of advancements, such as improved data security and interoperability, adds depth to our understanding of blockchain’s positive influence on healthcare. |
[33] | A. Modernizing the Legacy Healthcare System to Decentralize Platform Using Blockchain Technology. | The authors aim to address challenges related to complex medical procedures, large-scale medical data management, and cost optimization. The paper reviews the existing literature and proposes workflows for better data management, implemented using the Ethereum blockchain platform. The feasibility of the proposed system is analyzed in terms of associated costs, and a model-driven engineering approach is used to recover the architecture of traditional healthcare systems. |
[101] | Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain | This paper addresses the challenges of electronic health record (EHR) management in traditional systems and proposes a secure protocol using blockchain and cloud computing. The authors highlight the potential of blockchain technology to enable the sharing of EHRs across various medical service centers, promoting decentralization and data integrity. However, the integration of cloud computing into the EHR system introduces security vulnerabilities, as sensitive data are transmitted over public channels. The proposed secure protocol aims to address these challenges by using blockchain for data integrity and access control, while the cloud server manages and stores patient EHRs securely. Elliptic curve cryptosystems (ECC) are employed for secure health data sharing within the cloud computing environment. |
Work | Title | Challenges |
---|---|---|
[8] | Literature Review of Blockchain-based Cloud Computing: Data Security Issues and Challenges | Data privacy: Blockchain-based cloud computing presents challenges in ensuring data privacy, as the data are stored in a decentralized manner and is accessible to all nodes in the network. Data integrity: Ensuring data integrity is a challenge in blockchain-based cloud computing, as the data are stored in a decentralized manner and is accessible to all nodes in the network. Scalability: Blockchain-based cloud computing presents scalability challenges; as the number of nodes in the network increases, the time required to reach consensus increases. Interoperability: Interoperability is a challenge in blockchain-based cloud computing, as different blockchains may have different protocols and standards. Regulatory compliance: Blockchain-based cloud computing presents regulatory compliance challenges, as the regulatory framework for blockchain technology is still evolving. |
[29] | Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges | Cloud computing introduces new security challenges in secure service management and control, privacy protection, data integrity protection in distributed databases, data backup, and synchronization. Blockchain can be leveraged to address these challenges, partly due to the underlying characteristics such as transparency, traceability, decentralization, security, immutability, and automation. Also, the team explores how cloud computing can affect blockchain, especially the performance improvements that cloud computing can provide for the blockchain. |
[33] | A. Modernizing the Legacy Healthcare System to Decentralize Platform Using Blockchain Technology | Migrated classes: Ensure that the migrated classes are compatible with the blockchain platform. This requires a deep understanding of the blockchain architecture, and the programming languages used to write smart contracts. Patient mobility: When patients move from one hospital to another, their data may be dispersed among multiple hospitals, making it difficult for them to access their medical records. |
[95] | Toward Decentralized Cloud Storage With IPFS: Opportunities, Challenges, and Future Considerations | Content availability: IPFS relies on peers to host content, which can lead to content unavailability if the peers hosting the content go offline. Content discovery: IPFS uses content addressing to locate content, which can be challenging when the content is not popular or has not been accessed recently. Content integrity: IPFS does not provide any guarantees about the integrity of the content, which can be compromised if the content is modified by a malicious peer. Content privacy: IPFS does not provide any privacy guarantees, which can lead to privacy violations if the content is accessed by unauthorized parties. Content distribution: IPFS does not provide any mechanisms for incentivizing peers to host content, which can lead to the uneven distribution of content. |
[102] | Comprehensive review for healthcare data quality challenges in blockchain technology | It highlights blockchain’s inherent features such as decentralized storage, distributed ledger, immutability, security, and authentication, which have facilitated its practical adoption across various industries, including healthcare. The study analyzes 65 articles from 2016 onwards to identify data quality issues in healthcare blockchain adoption, categorizing these challenges into three domains: adoption, operational, and technological. Despite blockchain’s potential to enhance transparency, traceability, privacy, and security, it faces significant challenges such as integration with legacy systems, protection of sensitive data, and regulatory compliance. The review aims to support professionals and organizations in implementing blockchain transformation projects by providing an overview of current research, knowledge gaps, and future research directions. |
Approaches | Works | Description |
---|---|---|
Encryption | [52,83] | Protecting patient privacy is paramount in healthcare. To ensure this, sensitive medical information is scrambled with powerful codes before being stored electronically. This scrambling process, known as encryption, acts like a complex lock. Even if someone manages to break into the storage system, the scrambled data remains unreadable, safeguarding patient information from unauthorized access. |
Access control | [20,40,42,45,69,85,96,97] | Access to healthcare files is typically governed by robust access control mechanisms. Role-based access control (RBAC) and attribute-based access control (ABAC) are commonly used to regulate access based on predefined roles, permissions, and attributes. These mechanisms ensure that only authorized individuals or entities can access and manipulate the data. |
Off chain | [44,103,104] | In many blockchain–cloud integrations, the actual healthcare files are stored off-chain (e.g., in cloud storage), while the metadata and hashes of the files are recorded on the blockchain. This approach leverages the immutability and transparency of the blockchain for data integrity and provenance tracking, while cloud storage provides scalability and efficient data retrieval. |
Cryptographic techniques | [105,106,107,108,109] | SMPC is a cryptographic technique that enables multiple parties to jointly compute a function over their inputs while keeping the inputs private. In the context of healthcare data, SMPC can be used to perform computations or analysis on encrypted data without revealing the original data to any party involved. ZKPs are cryptographic protocols that allow one party (the prover) to prove to another party (the verifier) that a statement is true without revealing any additional information. In healthcare data management, ZKPs can be used to verify the integrity and correctness of data without exposing the actual data. |
Oracles | [35,66,67,71] | Oracles are third-party services that serve as bridges between blockchains and external data sources or systems. They provide a secure and trusted way to bring off-chain data onto a blockchain network, enabling smart contracts and decentralized applications (DApps) to interact with real-world data and events. In essence, oracles act as data providers, feeding external information to the blockchain in a tamper-proof and verifiable manner. This external data can include various types of information, such as financial data, weather data, IoT sensor readings, or in the case of healthcare, medical records, test results, or patient information stored in cloud-based systems. |
Secure Data Sharing and Consent Management | [23,73,80,87,96,110] | Blockchain–cloud integrations often implement secure data-sharing mechanisms that allow patients to control and grant access to their healthcare data. Consent management protocols ensure that data are shared only with authorized entities and for approved purposes, respecting patient privacy and data sovereignty. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lopez, L.J.R.; Millan Mayorga, D.; Martinez Poveda, L.H.; Amaya, A.F.C.; Rojas Reales, W. Hybrid Architectures Used in the Protection of Large Healthcare Records Based on Cloud and Blockchain Integration: A Review. Computers 2024, 13, 152. https://doi.org/10.3390/computers13060152
Lopez LJR, Millan Mayorga D, Martinez Poveda LH, Amaya AFC, Rojas Reales W. Hybrid Architectures Used in the Protection of Large Healthcare Records Based on Cloud and Blockchain Integration: A Review. Computers. 2024; 13(6):152. https://doi.org/10.3390/computers13060152
Chicago/Turabian StyleLopez, Leonardo Juan Ramirez, David Millan Mayorga, Luis Hernando Martinez Poveda, Andres Felipe Carbonell Amaya, and Wilson Rojas Reales. 2024. "Hybrid Architectures Used in the Protection of Large Healthcare Records Based on Cloud and Blockchain Integration: A Review" Computers 13, no. 6: 152. https://doi.org/10.3390/computers13060152
APA StyleLopez, L. J. R., Millan Mayorga, D., Martinez Poveda, L. H., Amaya, A. F. C., & Rojas Reales, W. (2024). Hybrid Architectures Used in the Protection of Large Healthcare Records Based on Cloud and Blockchain Integration: A Review. Computers, 13(6), 152. https://doi.org/10.3390/computers13060152