Advances, Systems and Applications
Reference | Target & contribution | Improvement in Blockchain | Solution to attack |
---|---|---|---|
[70] | Ensure the enforcement of cloud service SLA through blockchain technology | Witness-pool smart contract, specific-SLA smart contract | / |
[71] | Blockchain and SDN hybrid architecture to enhance the integrity of cloud resource management | / | Malicious Hosts abusing the cloud platform |
[72] | hybrid blockchain-based cloud manufacturing platform | Resource smart contract (RSC), Job smart contract (JSC) | Single point of failure |
[12] | Blockchain-based security framework to solve privacy and security issues in the transportation system as well as in SDN-enabled 5G-VANET [12] | Combination of proof-of-work and proof-of-stake | Privacy leakage, Malicious traffic broadcasting |
[73] | Design a Cleanroom Security Service Protocol (CSSP) to secure software deployment and usage based on a consortium blockchain framework [73] | / | / |
[74] | Design a dynamic and customized reputation system framework to manage the reputation of cloud providers using blockchain to prevent the malicious tampering [74] | / | / |
[75] | Secure E-commerce transactions based on ETTF, a decentralized trusted trading framework | Peer blockchain protocol (PBP) and ECA: E-commence consensus algorithm | Â |
[76] | Fair payment framework for cloud outsourcing services | / | / |
[77] | Use game theory to improve the performance of cloud mining | / | / |
[78] | Design an auction-based market model to maximize the profits of provider and miner in cloud mining | / | / |
[79] | The pricing scheme in cloud mining to reach the Stakelberg equilibrium | / | / |
[13] | Blockchain-based NFV framework for resource allocation in MEC | Blockchain-based NFV framework for resource allocation in MEC | / |
[80] | Blockchain-based decentralized Docker trust model | Carbonchain library | Dos Attack |