{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:51:34Z","timestamp":1772041894898,"version":"3.50.1"},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004595","name":"Universiti Sains Malaysia","doi-asserted-by":"publisher","award":["LRGS\/MRUN: 203.PKOMP.6777005"],"award-info":[{"award-number":["LRGS\/MRUN: 203.PKOMP.6777005"]}],"id":[{"id":"10.13039\/501100004595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3077123","type":"journal-article","created":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T20:34:26Z","timestamp":1620074066000},"page":"69513-69526","source":"Crossref","is-referenced-by-count":70,"title":["An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3007-142X","authenticated-orcid":false,"given":"Ruba","family":"Awadallah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9981-7958","authenticated-orcid":false,"given":"Azman","family":"Samsudin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5571-4148","authenticated-orcid":false,"given":"Je Sen","family":"Teh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4107-5845","authenticated-orcid":false,"given":"Mishal","family":"Almazrooie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","year":"2014","journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger&#x2014;Byzantium Version"},{"key":"ref72","year":"2021","journal-title":"Ethereum Price Index"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.180817"},{"key":"ref70","year":"2020","journal-title":"Luno Website"},{"key":"ref39","year":"2020","journal-title":"IBM Blockchain Platform"},{"key":"ref38","year":"2020","journal-title":"Announcing General Availability of Amazon Managed Blockchain"},{"key":"ref33","first-page":"3826","article-title":"A survey of homomorphic encryption for outsourced big data computation","volume":"10","author":"fun","year":"2016","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"ref31","first-page":"254","article-title":"Overdrive2k: Efficient secure MPC over $Z_{2}^{k}$\n from somewhat homomorphic encryption","author":"orsini","year":"2019","journal-title":"Proc Cryptographers&#x2019; Track RSA Conf"},{"key":"ref30","article-title":"A fully homomorphic encryption scheme","author":"gentry","year":"2009"},{"key":"ref37","article-title":"Blockchain technology overview","author":"yaga","year":"2019","journal-title":"arXiv 1906 11078"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.064181116"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5958\/2250-0499.2019.00025.9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_30"},{"key":"ref60","article-title":"Feedback based reputation on top of the bitcoin blockchain","author":"carboni","year":"2015","journal-title":"arXiv 1502 01504"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_23"},{"key":"ref61","author":"antonopoulos","year":"2014","journal-title":"Mastering Bitcoin Unlocking Digital Cryptocurrencies"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_14"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"ref65","year":"2020","journal-title":"Ethereum Wallets"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1080\/0194262X.2018.1474838"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.33"},{"key":"ref68","year":"2021","journal-title":"Bitcoin Price Index"},{"key":"ref69","year":"0"},{"key":"ref2","year":"2017","journal-title":"Security Guidance V4 0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-2071-6_10"},{"key":"ref20","first-page":"316","article-title":"Homomorphic encryption as a service for outsourced images in mobile cloud computing environment","author":"mouhib","year":"2020","journal-title":"Cryptography Breakthroughs in Research and Practice"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3055031.3055080"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8639-7_53"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904303"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757955"},{"key":"ref26","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Found Secure Comput"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.8"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4847-8_4"},{"key":"ref59","article-title":"Tendermint: Byzantine fault tolerance in the age of blockchains","author":"buchman","year":"2016"},{"key":"ref58","author":"badr","year":"2018","journal-title":"Blockchain by Example A Developer&#x2019;s Guide to Creating Decentralized Applications Using Bitcoin Ethereum and Hyperledger"},{"key":"ref57","first-page":"11","article-title":"Agreements between cloud service providers and their clients: A review of contract terms","author":"mclelland","year":"2014","journal-title":"Proc Arxius i Industries Culturals"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2017.8342866"},{"key":"ref55","article-title":"Wallet contracts on Ethereum&#x2014;Identification, types, usage, and profiles","author":"di angelo","year":"2020","journal-title":"arXiv 2001 06909"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6_4"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_35"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0801-72"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0208-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-012-0831-5"},{"key":"ref40","year":"2020","journal-title":"Ethereum Blockchain as a Service on Azure"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-292"},{"key":"ref13","first-page":"1458","article-title":"Survey on security concerns in cloud computing","author":"madhubala","year":"2015","journal-title":"Proc Int Conf Green Comput Internet Things (ICGCIoT)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.111"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1109\/TPDS.2011.252","article-title":"A secure erasure code-based cloud storage system with secure data forwarding","volume":"23","author":"lin","year":"2012","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-014-9140-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382227"},{"key":"ref18","first-page":"800","article-title":"Modern encryption techniques for cloud computing randomness and performance testing","author":"eletriby","year":"2012","journal-title":"Proc 3rd Int Conf Commun Inf Technol (ICCIT)"},{"key":"ref19","first-page":"211","article-title":"Review of cryptography in cloud computing","volume":"9","author":"zaineldeen","year":"2020","journal-title":"Int J Comput Sci Mobile Comput"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7298r2"},{"key":"ref3","year":"2020","journal-title":"Top Threats to Cloud Computing Egregious Eleven"},{"key":"ref6","year":"2016","journal-title":"Top Threats Research"},{"key":"ref5","year":"2013","journal-title":"Practices for Secure Development of Cloud Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/782174"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.05.002"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-802117-0.00002-3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.11.006"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41987-5_1"},{"key":"ref48","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.33166\/AETiC.2018.01.001"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1186\/s40852-018-0086-3"},{"key":"ref41","year":"2020","journal-title":"About R3"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.202"},{"key":"ref43","first-page":"276","article-title":"Collisions and other non-random properties for step-reduced SHA-256","author":"indesteege","year":"2008","journal-title":"Proc Int Workshop Sel Areas Cryptogr"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09420703.pdf?arnumber=9420703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:55Z","timestamp":1639770955000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9420703\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":73,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3077123","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}