{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:50:39Z","timestamp":1743015039140,"version":"3.40.3"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031040351"},{"type":"electronic","value":"9783031040368"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T00:00:00Z","timestamp":1649289600000},"content-version":"vor","delay-in-days":96,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Blockchain can be successfully utilised in diverse areas, including the financial sector and the Information and Communication Technology environments, such as computational clouds (CC). While cloud computing optimises the use of resources, it does not (yet) provide an effective solution for the secure hosting scheduling and execution of large computing and data applications and prevention of external attacks.<\/jats:p><jats:p>This chapter briefly reviews the recent blockchain-inspired task scheduling and information processing methods in computational clouds. We pay special attention to security, intrusion detection, and unauthorised manipulation of tasks and information in such systems. As an example, we present the implementation of a new blockchain-based scheduler in the computational cloud. We defined a new Proof of Schedule consensus algorithm, which works with the Stackelberg game, regulates checking and adding new blocks to the blockchain, and determines how to validate schedules stored in transactions. The proposed model assumes competition between different schedule providers. The winner of such a competition takes account of the client\u2019s requirements faster and prepares an optimal schedule to meet them. The presented scheduler extends the possibilities of using different scheduling modules by the end-users. By delegating the preparation of the schedules, providers can get benefits only for that, without executing customer tasks.<\/jats:p>","DOI":"10.1007\/978-3-031-04036-8_8","type":"book-chapter","created":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T12:03:11Z","timestamp":1649246591000},"page":"162-201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Based Task and\u00a0Information Management in\u00a0Computational Cloud Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6774-3667","authenticated-orcid":false,"given":"Andrzej","family":"Wilczy\u0144ski","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5181-8713","authenticated-orcid":false,"given":"Joanna","family":"Ko\u0142odziej","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,7]]},"reference":[{"key":"8_CR1","unstructured":"51% attack (2019). https:\/\/www.investopedia.com\/terms\/1\/51-attack.asp"},{"key":"8_CR2","unstructured":"CPU performance (2019). https:\/\/setiathome.berkeley.edu\/cpu_list.php"},{"key":"8_CR3","unstructured":"Geekbench 5 - cross-platform benchmark (2019). https:\/\/www.geekbench.com\/"},{"key":"8_CR4","unstructured":"Passmark - CPU benchmarks - list of benchmarked CPUs (2019). https:\/\/www.cpubenchmark.net\/cpu_list.php"},{"key":"8_CR5","unstructured":"State of the dapps - ranking the best ethereum dapps (2019). https:\/\/www.stateofthedapps.com\/rankings\/platform\/ethereum"},{"key":"8_CR6","unstructured":"What are blockchain confirmations? (2019). https:\/\/www.ethos.io\/what-are-blockchain-confirmations"},{"key":"8_CR7","unstructured":"Discover our data center locations (2020). https:\/\/www.google.com\/about\/datacenters\/locations\/"},{"key":"8_CR8","unstructured":"Global infrastructure (2020). https:\/\/aws.amazon.com\/about-aws\/global-infrastructure\/"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Bo\u0161njak, L., Sre\u0161, J., Brumen, B.: Brute-force and dictionary attack on hashed real-world passwords. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1161\u20131166 (2018). https:\/\/doi.org\/10.23919\/MIPRO.2018.8400211","DOI":"10.23919\/MIPRO.2018.8400211"},{"issue":"6","key":"8_CR10","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599\u2013616 (2009). https:\/\/doi.org\/10.1016\/j.future.2008.12.001","journal-title":"Future Gener. Comput. Syst."},{"key":"8_CR11","unstructured":"Chana, I., Kaur, T.: Delivering IT as A utility- A systematic review. CoRR abs\/1306.1639 (2013). http:\/\/arxiv.org\/abs\/1306.1639"},{"key":"8_CR12","unstructured":"Chowdhury, S.: Survey on various scheduling algorithms. Imp. J. Interdiscip. Res. (IJIR) 3, 4 (2018)"},{"key":"8_CR13","unstructured":"Ding, C.H., Nutanong, S., Buyya, R.: P2P networks for content sharing. CoRR cs.DC\/0402018 (2004). http:\/\/arxiv.org\/abs\/cs\/0402018"},{"key":"8_CR14","unstructured":"Dorovskaya, D.: Review of peercoin cryptocurrency: history of creation and predictions (2018). https:\/\/peercoin.net\/"},{"key":"8_CR15","unstructured":"The Apache Software Foundation: Commons math: The apache commons mathematics library (2016). https:\/\/commons.apache.org\/proper\/commons-math\/"},{"key":"8_CR16","unstructured":"Gagniuc, M.G.: Virtual machines technologies. In: Proceedings of 9th International Conference on Development and Application Systems, Suceava, Romania, pp. 200\u2013205 (2008)"},{"key":"8_CR17","unstructured":"Garner, B.: What is decred (DCR)? \u2014 a guide on decentralized blockchain governance (2019). https:\/\/coincentral.com\/decred-lowdown-decentralized-blockchain-governance\/"},{"key":"8_CR18","doi-asserted-by":"publisher","unstructured":"Grzonka, D., Szczygiel, M., Bernasiewicz, A., Wilczynski, A., Liszka, M.: Short analysis of implementation and resource utilization for the openstack cloud computing platform. In: Mladenov, V.M., Georgieva, P., Spasov, G., Petrova, G. (eds.) ECMS 2015 Proceedings of European Council for Modeling and Simulation, Albena (Varna), Bulgaria (2015). https:\/\/doi.org\/10.7148\/2015","DOI":"10.7148\/2015"},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Guharoy, R., et al.: A theoretical and detail approach on grid computing a review on grid computing applications. In: 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), pp. 142\u2013146 (2017). https:\/\/doi.org\/10.1109\/IEMECON.2017.8079578","DOI":"10.1109\/IEMECON.2017.8079578"},{"key":"8_CR20","unstructured":"Karatza, H.D.: Performance evaluation and analysis of large scale distributed systems: issues, trends, problems and solutions (2016). http:\/\/chipset-cost.eu\/wp-content\/uploads\/2016\/05\/EK-SummerSchool-Bucharest-Sep2016.pdf"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Hileman, G., Rauchs, M.: Global Cryptocurrency Benchmarking Study. Cambridge Centre for Alternative Finance, Cambridge Judge Business School, University of Cambridge (2017). https:\/\/EconPapers.repec.org\/RePEc:jbs:altfin:201704-gcbs","DOI":"10.2139\/ssrn.2965436"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3390\/fi9040085","volume":"9","author":"Z Hong","year":"2017","unstructured":"Hong, Z., Wang, Z., Cai, W., Leung, V.C.M.: Blockchain-empowered fair computational resource sharing system in the D2D network. Future Internet 9, 85 (2017)","journal-title":"Future Internet"},{"key":"8_CR23","doi-asserted-by":"publisher","unstructured":"Jak\u00f3bik, A., Grzonka, D., Palmieri, F.: Non-deterministic security driven meta scheduler for distributed cloud organizations. Simul. Model. Pract. Theory 76, 67\u201381 (2017). https:\/\/doi.org\/10.1016\/j.simpat.2016.10.011. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1569190X16302532. High-Performance Modelling and Simulation for Big Data Applications","DOI":"10.1016\/j.simpat.2016.10.011"},{"key":"8_CR24","doi-asserted-by":"publisher","unstructured":"Joshi, A.P., Han, M., Wang, Y.: A survey on security and privacy issues of blockchain technology. Math. Found. Comput. 1, 121 (2018). https:\/\/doi.org\/10.3934\/mfc.2018007. http:\/\/aimsciences.org\/\/article\/id\/d27803a2-7ce7-46e8-900d-30001fd4785a","DOI":"10.3934\/mfc.2018007"},{"key":"8_CR25","doi-asserted-by":"publisher","unstructured":"Kalra, M., Singh, S.: A review of metaheuristic scheduling techniques in cloud computing. Egypt. Inform. J. 16(3), 275\u2013295 (2015). https:\/\/doi.org\/10.1016\/j.eij.2015.07.001. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1110866515000353","DOI":"10.1016\/j.eij.2015.07.001"},{"key":"8_CR26","doi-asserted-by":"publisher","unstructured":"Kar, U.N., Sanyal, D.K.: An overview of device-to-device communication in cellular networks. ICT Express 4(4), 203\u2013208 (2018). https:\/\/doi.org\/10.1016\/j.icte.2017.08.002. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2405959517301467","DOI":"10.1016\/j.icte.2017.08.002"},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Khatibi Bardsiri, A., Hashemi, S.M.: QoS metrics for cloud computing services evaluation. Int. J. Intell. Syst. Technol. Appl. 6, 27\u201333 (2014). https:\/\/doi.org\/10.5815\/ijisa.2014.12.04","DOI":"10.5815\/ijisa.2014.12.04"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Ko\u0142odziej, J.: Evolutionary Hierarchical Multi-Criteria Metaheuristics for Scheduling in Large-Scale Grid Systems (2012)","DOI":"10.1007\/978-3-642-28971-2"},{"issue":"2","key":"8_CR29","first-page":"28","volume":"4","author":"J Ko\u0142odziej","year":"2018","unstructured":"Ko\u0142odziej, J., Wilczy\u0144ski, A.: Blockchain secure cloud: a new generation integrated cloud and blockchain platforms - general concepts and challenges. Eur. Cybersecur. J. 4(2), 28\u201335 (2018)","journal-title":"Eur. Cybersecur. J."},{"key":"8_CR30","doi-asserted-by":"publisher","unstructured":"Ko\u0142odziej, J., Xhafa, F.: Integration of task abortion and security requirements in GA-based meta-heuristics for independent batch grid scheduling. Comput. Math. Appl. 63(2), 350\u2013364 (2012). https:\/\/doi.org\/10.1016\/j.camwa.2011.07.038. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S089812211100592X. Advances in context, cognitive, and secure computing","DOI":"10.1016\/j.camwa.2011.07.038"},{"key":"8_CR31","doi-asserted-by":"publisher","unstructured":"Li, Z., et al.: A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds. Future Gener. Comput. Syst. 65, 140\u2013152 (2016). https:\/\/doi.org\/10.1016\/j.future.2015.12.014. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X15003982. Special Issue on Big Data in the Cloud","DOI":"10.1016\/j.future.2015.12.014"},{"key":"8_CR32","first-page":"653","volume":"19","author":"IC Lin","year":"2017","unstructured":"Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19, 653\u2013659 (2017)","journal-title":"Int. J. Netw. Secur."},{"key":"8_CR33","unstructured":"Lokhandwala, F.A.: A Heuristic Approach to Improve Task Scheduling in Cloud Computing using Blockchain technology. Master\u2019s thesis, Dublin, National College of Ireland. http:\/\/trap.ncirl.ie\/3299\/"},{"key":"8_CR34","doi-asserted-by":"publisher","unstructured":"Madni, H., Shafie, A.L., Abdullahi, M., Abdulhamid, S., Usman, M.: Performance comparison of heuristic algorithms for task scheduling in IAAS cloud computing environment. PLoS ONE 12, e0176321 (2017). https:\/\/doi.org\/10.1371\/journal.pone.0176321","DOI":"10.1371\/journal.pone.0176321"},{"key":"8_CR35","unstructured":"Michael, J.W., Rennock, A.C., Butcher, J.: Blockchain technology and regulatory investigations. Practical Law (2018)"},{"key":"8_CR36","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Cryptography Mailing list (2009). https:\/\/metzdowd.com"},{"key":"8_CR37","doi-asserted-by":"publisher","unstructured":"Perrey, R., Lycett, M.: Service-oriented architecture. In: Proceedings of 2003 Symposium on Applications and the Internet Workshops, pp. 116\u2013119 (2003). https:\/\/doi.org\/10.1109\/SAINTW.2003.1210138","DOI":"10.1109\/SAINTW.2003.1210138"},{"key":"8_CR38","doi-asserted-by":"crossref","unstructured":"Pointcheval, D.: Asymmetric cryptography and practical security (2002)","DOI":"10.26636\/jtit.2002.4.146"},{"key":"8_CR39","first-page":"975","volume":"46","author":"A Prasanth","year":"2012","unstructured":"Prasanth, A.: Cloud computing services: a survey. Int. J. Comput. Appl. 46, 975\u20138887 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"8_CR40","doi-asserted-by":"publisher","unstructured":"Rachmawati, D., Tarigan, J., Ginting, A.B.C.: A comparative study of message digest 5(MD5) and SHA256 algorithm. J. Phys.: Conf. Ser. 978, 012116 (2018). https:\/\/doi.org\/10.1088\/1742-6596\/978\/1\/012116","DOI":"10.1088\/1742-6596\/978\/1\/012116"},{"key":"8_CR41","doi-asserted-by":"publisher","unstructured":"Rani, B.K., Rani, B.P., Babu, A.V.: Cloud computing and inter-clouds - types, topologies and research issues. Procedia Comput. Sci. 50, 24\u201329 (2015). https:\/\/doi.org\/10.1016\/j.procs.2015.04.006. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050915005074. Big Data, Cloud and Computing Challenges","DOI":"10.1016\/j.procs.2015.04.006"},{"key":"8_CR42","unstructured":"Reeb, J.E., Leavengood, S.A.: Using the simplex method to solve linear programming maximization problems (1998)"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Saad, M., et al.: Exploring the attack surface of blockchain: a systematic overview. arXiv abs\/1904.03487 (2019)","DOI":"10.1002\/9781119519621.ch3"},{"key":"8_CR44","doi-asserted-by":"publisher","unstructured":"Tasca, P., Tessone, C.: A taxonomy of blockchain technologies: principles of identification and classification. Ledger 4 (2019). https:\/\/doi.org\/10.5195\/ledger.2019.140. https:\/\/ledgerjournal.org\/ojs\/index.php\/ledger\/article\/view\/140","DOI":"10.5195\/ledger.2019.140"},{"key":"8_CR45","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1177\/1094342015594518","volume":"31","author":"M Taufer","year":"2015","unstructured":"Taufer, M., Rosenberg, A.: Scheduling DAG-based workflows on single cloud instances: high-performance and cost effectiveness with a static scheduler. Int. J. High Perform. Comput. Appl. 31, 19\u201331 (2015). https:\/\/doi.org\/10.1177\/1094342015594518","journal-title":"Int. J. High Perform. Comput. Appl."},{"key":"8_CR46","doi-asserted-by":"publisher","unstructured":"Vuji\u010di\u0107, D., Jagodi\u0107, D., Randi\u0107, S.: Blockchain technology, bitcoin, and ethereum: a brief overview. In: 2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH), pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/INFOTEH.2018.8345547","DOI":"10.1109\/INFOTEH.2018.8345547"},{"key":"8_CR47","doi-asserted-by":"publisher","unstructured":"Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., Wang, F.Y.: Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans. Syst. Man Cybern.: Syst. 49, 2266\u20132277 (2019). https:\/\/doi.org\/10.1109\/TSMC.2019.2895123","DOI":"10.1109\/TSMC.2019.2895123"},{"key":"8_CR48","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-319-73767-6_7","volume-title":"Modeling and Simulation in HPC and Cloud Systems","author":"A Wilczy\u0144ski","year":"2018","unstructured":"Wilczy\u0144ski, A., Ko\u0142odziej, J.: Virtualization model for processing of the sensitive mobile data. In: Ko\u0142odziej, J., Pop, F., Dobre, C. (eds.) Modeling and Simulation in HPC and Cloud Systems. SBD, vol. 36, pp. 121\u2013133. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-73767-6_7"},{"key":"8_CR49","unstructured":"Wilczy\u0144ski, A.: Blockchain-based task scheduling in computational clouds. Ph.D. thesis, AGH University of Science and Technology (2020). https:\/\/doktoraty.iet.agh.edu.pl\/_media\/2020:awilcz:phd_thesis_aw.pdf"},{"key":"8_CR50","doi-asserted-by":"publisher","unstructured":"Wilczy\u0144ski, A., Ko\u0142odziej, J.: Modelling and simulation of security-aware task scheduling in cloud computing based on blockchain technology. Simul. Model. Pract. Theory 102038 (2019). https:\/\/doi.org\/10.1016\/j.simpat.2019.102038. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1569190X19301698","DOI":"10.1016\/j.simpat.2019.102038"},{"key":"8_CR51","doi-asserted-by":"publisher","unstructured":"Wilczy\u0144ski, A., Ko\u0142odziej, J., Grzonka, D.: Security aspects in blockchain-based scheduling in mobile multi-cloud computing. In: 2021 IEEE\/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid), pp. 696\u2013703 (2021). https:\/\/doi.org\/10.1109\/CCGrid51090.2021.00084","DOI":"10.1109\/CCGrid51090.2021.00084"},{"key":"8_CR52","doi-asserted-by":"publisher","unstructured":"Wilczy\u0144ski, A., Wid\u0142ak, A.: Blockchain networks - security aspects and consensus models. J. Telecommun. Inf. Technol. 2, 46\u201352 (2019). https:\/\/doi.org\/10.26636\/jtit.2019.132019","DOI":"10.26636\/jtit.2019.132019"},{"key":"8_CR53","unstructured":"Xoxa, N., Zotaj, M., Tafa, I., Fejzaj, J.: Simulation of first come first served (FCFS) and shortest job first (SJF) algorithms (2014)"},{"key":"8_CR54","doi-asserted-by":"publisher","unstructured":"Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview. NIST Interagency\/Internal Report (NISTIR) - 8202 (2018). https:\/\/doi.org\/10.6028\/NIST.IR.8202","DOI":"10.6028\/NIST.IR.8202"},{"key":"8_CR55","doi-asserted-by":"publisher","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557\u2013564 (2017). https:\/\/doi.org\/10.1109\/BigDataCongress.2017.85","DOI":"10.1109\/BigDataCongress.2017.85"}],"container-title":["Lecture Notes in Computer Science","Cybersecurity of Digital Service Chains"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-04036-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T17:57:30Z","timestamp":1726941450000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-04036-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031040351","9783031040368"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-04036-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}