Skip to main content

Advances, Systems and Applications

Table 9 Comparison of main contributions

From: Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions

Reference

Target & contribution

Improvement in Blockchain

Solution to attack

[14]

Decentralized access control for privacy protect

/

/

[81]

Trust management among IoT-related stakeholders by integrating blockchain and SDN [81]

proof-of-concept (PoC)

DDoS attacks on edge networks

[82]

An IoT-Fog/Edge-Cloud integration framework to facilitate end-to-end operations on sensitive data

/

/

[83]

Combination of blockchain, edge computing, cloud computing, SDN to construct a security framework for IoT applications

User registration, data confidentiality estimation, shortest path finding, attack detection and avoidance

probable single or cooperative security attacks

[84]

IoT-Fog-Cloud hybrid framework for secure and efficient IoT applicaitons

delay aware tree construction (DATC) algorithm and a RSA-based EPID scheme

/

[85]

A blockchain-based framework to manage data provenance of cloud including data collection, data storage and data validation [85]

/

/

[86]

Distributed solution for large-scaled data storage and protection [86]

Blockchain transactions

/

[87]

Three levels of requirements for system security [87]

/

/

[88]

Trust management in IoT ecosystems, distributed management of the IoT device life cycle and data privacy

Smart contract logic

/

[89]

A decentralized trust framework in vehicle networks to defend against malicious vehicles and RSUs [89]

/

Message spoofing attack, bad mouthing and ballot stuffing attack, compromised RSU

[90]

A blockchain-based security framework for cloud file storage and solve the file block replica placement

/

/

[91]

Incentive mechanisms for data sharing in multi-clouds systems

Combination of PoW, PoS, PBFT

/

[92]

Blockchain-based data deletion scheme

/

/

[93]

Blockchain-based time stamping scheme for cloud storage

/

malicious file owner, malicious competitor

[94]

Hybrid data management model to achieve storage efficiency

User registration algorithm, voting and counting algorithm

User Collusion Attack

[95]

Consortium blockchain to secure data management in VECONs, and a reputation-based data sharing scheme

Data Storage Smart Contract (DSSC), Information Sharing Smart Contract (ISSC) [90], combination of proof-of-storage and proof-of-work

abnormal vehicles