{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:30:46Z","timestamp":1772119846712,"version":"3.50.1"},"reference-count":169,"publisher":"Association for Computing Machinery (ACM)","issue":"8","license":[{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2019QY0800"],"award-info":[{"award-number":["2019QY0800"]}]},{"name":"Blockchain Core Technology Strategic Research Program of Ministry of Education of China","award":["2020KJ010301"],"award-info":[{"award-number":["2020KJ010301"]}]},{"name":"Shandong Provincial Key Research and Development Program","award":["2020CXGC010107"],"award-info":[{"award-number":["2020CXGC010107"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972294, 61932016, and 61872192"],"award-info":[{"award-number":["61972294, 61932016, and 61872192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Special Project on Science and Technology Program of Hubei Provience","award":["2020AEA013"],"award-info":[{"award-number":["2020AEA013"]}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"crossref","award":["2020CFA052"],"award-info":[{"award-number":["2020CFA052"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Wuhan Municipal Science and Technology Project","award":["2020010601012187"],"award-info":[{"award-number":["2020010601012187"]}]},{"name":"National Science Foundation CREST","award":["HRD-1736209"],"award-info":[{"award-number":["HRD-1736209"]}]},{"name":"Cloud Technology Endowed Professorship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2022,11,30]]},"abstract":"<jats:p>Cloud computing is a network model of on-demand access for sharing configurable computing resource pools. Compared with conventional service architectures, cloud computing introduces new security challenges in secure service management and control, privacy protection, data integrity protection in distributed databases, data backup, and synchronization. Blockchain can be leveraged to address these challenges, partly due to the underlying characteristics such as transparency, traceability, decentralization, security, immutability, and automation. We present a comprehensive survey of how blockchain is applied to provide security services in the cloud computing model and we analyze the research trends of blockchain-related techniques in current cloud computing models. During the reviewing, we also briefly investigate how cloud computing can affect blockchain, especially about the performance improvements that cloud computing can provide for the blockchain. Our contributions include the following: (i) summarizing the possible architectures and models of the integration of blockchain and cloud computing and the roles of cloud computing in blockchain; (ii) classifying and discussing recent, relevant works based on different blockchain-based security services in the cloud computing model; (iii) simply investigating what improvements cloud computing can provide for the blockchain; (iv) introducing the current development status of the industry\/major cloud providers in the direction of combining cloud and blockchain; (v) analyzing the main barriers and challenges of integrated blockchain and cloud computing systems; and (vi) providing recommendations for future research and improvement on the integration of blockchain and cloud systems.<\/jats:p>","DOI":"10.1145\/3456628","type":"journal-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T00:42:42Z","timestamp":1633394562000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges"],"prefix":"10.1145","volume":"54","author":[{"given":"Jinglin","family":"Zou","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University and Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, Shanghai, China"}]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University and Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, Shanghai, China"}]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"College of Communication and Information, University of Kentucky, Lexington, KY, USA"}]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Thapar University, Patiala, India"}]},{"given":"Huaqun","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"given":"Kkwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,4]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930715"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIAS.2018.8540564"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.044"},{"key":"e_1_2_2_4_1","volume-title":"Md Zakirul Alam Bhuiyan, and Hai Jiang","author":"Ali Saqib","year":"2018","unstructured":"Saqib Ali , Guojun Wang , Md Zakirul Alam Bhuiyan, and Hai Jiang . 2018 . Secure data provenance in cloud-centric internet of things via blockchain smart contracts. In Proceedings of the 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People, and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI'18). IEEE , 991\u2013998. Saqib Ali, Guojun Wang, Md Zakirul Alam Bhuiyan, and Hai Jiang. 2018. Secure data provenance in cloud-centric internet of things via blockchain smart contracts. In Proceedings of the 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People, and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI'18). IEEE, 991\u2013998."},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.10.005"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996590"},{"key":"e_1_2_2_7_1","first-page":"26","article-title":"Application and usability of blockchain in cloud computing","volume":"6","author":"Anand Abhineet","year":"2019","unstructured":"Abhineet Anand and Achintya Jha . 2019 . Application and usability of blockchain in cloud computing . J. Cloud Comput. 6 , 2 (2019), 26 . Abhineet Anand and Achintya Jha. 2019. Application and usability of blockchain in cloud computing. J. Cloud Comput. 6, 2 (2019), 26.","journal-title":"J. Cloud Comput."},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.35"},{"key":"e_1_2_2_9_1","volume-title":"Proceedings of the European Conference on Smart Objects, Systems and Technologies (Smart SysTech'18)","author":"Barenji Ali Vatankhah","unstructured":"Ali Vatankhah Barenji , Zhi Li , and W. M. Wang . 2018. Blockchain cloud manufacturing: Shop floor and machine level . In Proceedings of the European Conference on Smart Objects, Systems and Technologies (Smart SysTech'18) . VDE, 1\u20136. Ali Vatankhah Barenji, Zhi Li, and W. M. Wang. 2018. Blockchain cloud manufacturing: Shop floor and machine level. In Proceedings of the European Conference on Smart Objects, Systems and Technologies (Smart SysTech'18). VDE, 1\u20136."},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211890.3211915"},{"key":"e_1_2_2_11_1","volume-title":"Proceedings of the 40th IEEE International Conference on Distributed Computing Systems (ICDCS'20)","author":"Belotti Marianna","year":"2020","unstructured":"Marianna Belotti , Stefano Moretti , Maria Potop-Butucaru , and Stefano Secci . 2020 . Game theoretical analysis of atomic cross-chain swaps . In Proceedings of the 40th IEEE International Conference on Distributed Computing Systems (ICDCS'20) . Marianna Belotti, Stefano Moretti, Maria Potop-Butucaru, and Stefano Secci. 2020. Game theoretical analysis of atomic cross-chain swaps. In Proceedings of the 40th IEEE International Conference on Distributed Computing Systems (ICDCS'20)."},{"key":"e_1_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Keltoum Bendiab Nicholas Kolokotronis Stavros Shiaeles and Samia Boucherkha. 2018. WiP: A novel blockchain-based trust model for cloud identity management. In Proceedings of the IEEE 16th International Conference on Dependable Autonomic and Secure Computing the 16th International Conference on Pervasive Intelligence and Computing and the 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech'18). IEEE 724\u2013729.  Keltoum Bendiab Nicholas Kolokotronis Stavros Shiaeles and Samia Boucherkha. 2018. WiP: A novel blockchain-based trust model for cloud identity management. In Proceedings of the IEEE 16th International Conference on Dependable Autonomic and Secure Computing the 16th International Conference on Pervasive Intelligence and Computing and the 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech'18). IEEE 724\u2013729.","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00126"},{"key":"e_1_2_2_13_1","first-page":"2","volume-title":"Ipfs-content addressed, versioned","author":"Benet Juan","year":"2014","unstructured":"Juan Benet . 2014. Ipfs-content addressed, versioned , p 2 p file system. CoRR abs\/1407.3561 ( 2014 ). http:\/\/arxiv.org\/abs\/1407.3561. Juan Benet. 2014. Ipfs-content addressed, versioned, p2p file system. CoRR abs\/1407.3561 (2014). http:\/\/arxiv.org\/abs\/1407.3561."},{"key":"e_1_2_2_14_1","volume-title":"Proceedings of the 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE'20)","author":"Bishnoi Monika","year":"2020","unstructured":"Monika Bishnoi . 2020 . Interoperability solutions for blockchain . In Proceedings of the 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE'20) . 381\u2013385. https:\/\/doi.org\/10.1109\/ICSTCEE49637.2020.9277054 Monika Bishnoi. 2020. Interoperability solutions for blockchain. In Proceedings of the 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE'20). 381\u2013385. https:\/\/doi.org\/10.1109\/ICSTCEE49637.2020.9277054"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.02.038"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2018.8615063"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.4018\/jghpc.2011040101"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319889"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211933.3211950"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.02967"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2018.00014"},{"key":"e_1_2_2_24_1","volume-title":"Proceedings of the 25th European Symposium on Research in Computer Security Computer Security (ESORICS'20)","volume":"12309","author":"Duong Tuyet","year":"2016","unstructured":"Tuyet Duong , Lei Fan , and Hong-Sheng Zhou . 2016 . 2-hop blockchain: Combining proof-of-work and proof-of-stake securely . In Proceedings of the 25th European Symposium on Research in Computer Security Computer Security (ESORICS'20) . Lecture Notes in Computer Science , Vol. 12309 . Springer, 697\u2013712. Tuyet Duong, Lei Fan, and Hong-Sheng Zhou. 2016. 2-hop blockchain: Combining proof-of-work and proof-of-stake securely. In Proceedings of the 25th European Symposium on Research in Computer Security Computer Security (ESORICS'20). Lecture Notes in Computer Science, Vol. 12309. Springer, 697\u2013712."},{"key":"e_1_2_2_25_1","volume-title":"Encyclopedia of Cryptography and Security. 338\u2013340.","author":"Dwork Cynthia","unstructured":"Cynthia Dwork . 2011. Differential privacy . In Encyclopedia of Cryptography and Security. 338\u2013340. Cynthia Dwork. 2011. Differential privacy. In Encyclopedia of Cryptography and Security. 338\u2013340."},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0818-9_19"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.020"},{"key":"e_1_2_2_28_1","unstructured":"Andr\u00e9 Figueira. 2018. Secure Framework for Cloud Data Sharing Based on Blockchain. Master's thesis. Universidade de \u00c9vora.  Andr\u00e9 Figueira. 2018. Secure Framework for Cloud Data Sharing Based on Blockchain. Master's thesis. Universidade de \u00c9vora."},{"key":"e_1_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Shaojing Fu Chao Zhang and Weijun Ao. 2020. Searchable encryption scheme for multiple cloud storage using double-layer blockchain. Concurr. Comput.: Pract. Exper. (2020) 1\u201312. https:\/\/doi.org\/10.1002\/cpe.586  Shaojing Fu Chao Zhang and Weijun Ao. 2020. Searchable encryption scheme for multiple cloud storage using double-layer blockchain. Concurr. Comput.: Pract. Exper. (2020) 1\u201312. https:\/\/doi.org\/10.1002\/cpe.586","DOI":"10.1002\/cpe.586"},{"key":"e_1_2_2_31_1","volume-title":"Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS'19)","author":"Fu Xiaoyuan","year":"2019","unstructured":"Xiaoyuan Fu , F. Richard Yu , Jingyu Wang , Qi Qi , and Jianxin Liao . 2019 . Resource allocation for blockchain-enabled distributed network function virtualization (NFV) with mobile edge cloud (MEC) . In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS'19) . 1\u20136. Xiaoyuan Fu, F. Richard Yu, Jingyu Wang, Qi Qi, and Jianxin Liao. 2019. Resource allocation for blockchain-enabled distributed network function virtualization (NFV) with mobile edge cloud (MEC). In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS'19). 1\u20136."},{"key":"e_1_2_2_32_1","volume-title":"Blockchain-based database to ensure data integrity in cloud computing environments. 816","author":"Gaetani Edoardo","year":"2017","unstructured":"Edoardo Gaetani , Leonardo Aniello , Roberto Baldoni , Federico Lombardi , Andrea Margheri , and Vladimiro Sassone . 2017. Blockchain-based database to ensure data integrity in cloud computing environments. 816 ( 2017 ), 146\u2013155. Edoardo Gaetani, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, and Vladimiro Sassone. 2017. Blockchain-based database to ensure data integrity in cloud computing environments. 816 (2017), 146\u2013155."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.064181116"},{"key":"e_1_2_2_34_1","volume-title":"Proceedings of the International Conference on Information Security and Cryptology. Springer, 274\u2013288","author":"Guo Jiale","year":"2018","unstructured":"Jiale Guo , Wenzhuo Yang , Kwok-Yan Lam , and Xun Yi . 2018 . Using blockchain to control access to cloud data . In Proceedings of the International Conference on Information Security and Cryptology. Springer, 274\u2013288 . Jiale Guo, Wenzhuo Yang, Kwok-Yan Lam, and Xun Yi. 2018. Using blockchain to control access to cloud data. In Proceedings of the International Conference on Information Security and Cryptology. Springer, 274\u2013288."},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2007.09.001"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212734.3212736"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485890"},{"key":"e_1_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Longxia Huang Gongxuan Zhang Shui Yu Anmin Fu and John Yearwood. 2017. SeShare: Secure cloud data sharing based on blockchain and public auditing. Concurr. Comput.: Pract. Exp. (2017) e4359.  Longxia Huang Gongxuan Zhang Shui Yu Anmin Fu and John Yearwood. 2017. SeShare: Secure cloud data sharing based on blockchain and public auditing. Concurr. Comput.: Pract. Exp. (2017) e4359.","DOI":"10.1002\/cpe.4359"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3390566.3391661"},{"key":"e_1_2_2_40_1","volume-title":"Proceedings of the IEEE 39th International Conference on Distributed Computing Systems (ICDCS'19)","author":"Suhan","year":"2019","unstructured":"Suhan iang, Xinyi Li , and Jie Wu . 2019 . Hierarchical edge-cloud computing for mobile blockchain mining game . In Proceedings of the IEEE 39th International Conference on Distributed Computing Systems (ICDCS'19) . 1327\u20131336. Suhan iang, Xinyi Li, and Jie Wu. 2019. Hierarchical edge-cloud computing for mobile blockchain mining game. In Proceedings of the IEEE 39th International Conference on Distributed Computing Systems (ICDCS'19). 1327\u20131336."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211933.3211946"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2900238"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800064"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00120"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489365"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.84"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.652"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.87"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314433"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0136-7"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2018.00071"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101079"},{"key":"e_1_2_2_56_1","volume-title":"Can blockchain strengthen the internet of things?IT Prof. 19, 4","author":"Kshetri Nir","year":"2017","unstructured":"Nir Kshetri . 2017. Can blockchain strengthen the internet of things?IT Prof. 19, 4 ( 2017 ), 68\u201372. Nir Kshetri. 2017. Can blockchain strengthen the internet of things?IT Prof. 19, 4 (2017), 68\u201372."},{"key":"e_1_2_2_58_1","volume-title":"Reji Thomas, and Tai-Hoon Kim.","author":"Kumar Gulshan","year":"2019","unstructured":"Gulshan Kumar , Rahul Saha , Mritunjay Kumar Rai , Reji Thomas, and Tai-Hoon Kim. 2019 . Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics. IEEE IoT J. ( 2019). Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, Reji Thomas, and Tai-Hoon Kim. 2019. Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics. IEEE IoT J. (2019)."},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI48184.2020.9142954"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2011.5716422"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8060602"},{"key":"e_1_2_2_62_1","volume-title":"Encyclopedia of Library and Information Sciences, 4020\u20134030.","author":"Lee Christopher A.","unstructured":"Christopher A. Lee . 2010. Open archival information system (OAIS) reference model . In Encyclopedia of Library and Information Sciences, 4020\u20134030. Christopher A. Lee. 2010. Open archival information system (OAIS) reference model. In Encyclopedia of Library and Information Sciences, 4020\u20134030."},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00012-7_31"},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.071"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2922-7_36"},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2018.05.011"},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2018.03.004"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2018.1539774"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.8"},{"key":"e_1_2_2_70_1","first-page":"653","article-title":"A survey of blockchain security issues and challenges.IJ Netw","volume":"19","author":"Lin Iuon-Chang","year":"2017","unstructured":"Iuon-Chang Lin and Tzu-Chun Liao . 2017 . A survey of blockchain security issues and challenges.IJ Netw . Secur. 19 , 5 (2017), 653 \u2013 659 . Iuon-Chang Lin and Tzu-Chun Liao. 2017. A survey of blockchain security issues and challenges.IJ Netw. Secur. 19, 5 (2017), 653\u2013659.","journal-title":"Secur."},{"key":"e_1_2_2_71_1","volume-title":"Int. J. Netw. Secur. 19","author":"Lin Iuon Chang","year":"2017","unstructured":"Iuon Chang Lin and Tzu Chun Liao . 2017. A survey of blockchain security issues and challenges . Int. J. Netw. Secur. 19 ( 2017 ). Iuon Chang Lin and Tzu Chun Liao. 2017. A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19 (2017)."},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700344"},{"key":"e_1_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148864"},{"key":"e_1_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/NANA.2018.8648778"},{"key":"e_1_2_2_75_1","first-page":"186","article-title":"Blockchain-based database to ensure data integrity in cloud forensics","volume":"3","author":"Reddy Chintha Madhumohan","year":"2018","unstructured":"Chintha Madhumohan Reddy and G. Raghavendra . 2018 . Blockchain-based database to ensure data integrity in cloud forensics . International Journal of Scientific Research in Computer Science, Engineering and Information Technology 3 , 4 (2018), 186 \u2013 193 . Chintha Madhumohan Reddy and G. Raghavendra. 2018. Blockchain-based database to ensure data integrity in cloud forensics. International Journal of Scientific Research in Computer Science, Engineering and Information Technology 3, 4 (2018), 186\u2013193.","journal-title":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology"},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23330"},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.5555\/3288339.3288359"},{"key":"e_1_2_2_78_1","volume-title":"Letaief","author":"Mao Yuyi","year":"2017","unstructured":"Yuyi Mao , Changsheng You , Jun Zhang , Kaibin Huang , and Khaled B . Letaief . 2017 . Mobile edge computing: Survey and research outlook. arXiv:1701.01090. Retrieved from https:\/\/arxiv.org\/abs\/1701.01090. Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief. 2017. Mobile edge computing: Survey and research outlook. arXiv:1701.01090. Retrieved from https:\/\/arxiv.org\/abs\/1701.01090."},{"key":"e_1_2_2_79_1","volume-title":"Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance","author":"Mather Tim","unstructured":"Tim Mather , Subra Kumaraswamy , and Shahed Latif . 2009. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance . O'Reilly Media, Inc. Tim Mather, Subra Kumaraswamy, and Shahed Latif. 2009. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O'Reilly Media, Inc."},{"key":"e_1_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013153"},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8123011"},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851322.1851334"},{"key":"e_1_2_2_83_1","first-page":"288","article-title":"Securing cognitive radio vehicular ad hoc network with fog node based distributed blockchain cloud architecture","volume":"10","author":"Nadeem Sara","year":"2019","unstructured":"Sara Nadeem , Muhammad Rizwan , Fahad Ahmad , and Jaweria Manzoor . 2019 . Securing cognitive radio vehicular ad hoc network with fog node based distributed blockchain cloud architecture . Int. J Adv. Comput. Sci. Appl. 10 , 1 (2019), 288 \u2013 295 . Sara Nadeem, Muhammad Rizwan, Fahad Ahmad, and Jaweria Manzoor. 2019. Securing cognitive radio vehicular ad hoc network with fog node based distributed blockchain cloud architecture. Int. J Adv. Comput. Sci. Appl. 10, 1 (2019), 288\u2013295.","journal-title":"Int. J Adv. Comput. Sci. Appl."},{"key":"e_1_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.10.008"},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3915-1"},{"key":"e_1_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00121"},{"key":"e_1_2_2_87_1","volume-title":"Proceedings of the International Workshop on Enterprise Modeling and Information Systems Architectures (EMISA'18)","author":"Neidhardt Nils","year":"2018","unstructured":"Nils Neidhardt , Carsten K\u00f6hler , and Markus N\u00fcttgens . 2018 . Cloud service billing and service level agreement monitoring based on blockchain . In Proceedings of the International Workshop on Enterprise Modeling and Information Systems Architectures (EMISA'18) . 65\u201369. Nils Neidhardt, Carsten K\u00f6hler, and Markus N\u00fcttgens. 2018. Cloud service billing and service level agreement monitoring based on blockchain. In Proceedings of the International Workshop on Enterprise Modeling and Information Systems Architectures (EMISA'18). 65\u201369."},{"key":"e_1_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917555"},{"key":"e_1_2_2_89_1","unstructured":"Dinh C. Nguyen Pubudu N. Pathirana Ming Ding and Aruna Seneviratne. 2019. Integration of blockchain and cloud of things: Architecture applications and challenges. arXiv:1908.09058. Retrieved from https:\/\/arxiv.org\/abs\/1908.09058.  Dinh C. Nguyen Pubudu N. Pathirana Ming Ding and Aruna Seneviratne. 2019. Integration of blockchain and cloud of things: Architecture applications and challenges. arXiv:1908.09058. Retrieved from https:\/\/arxiv.org\/abs\/1908.09058."},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522980"},{"key":"e_1_2_2_91_1","volume-title":"Ogiela and Lidia Ogiela","author":"Marek","year":"2017","unstructured":"Marek R. Ogiela and Lidia Ogiela . 2017 . Secure data and services management in distributed structures and in the cloud with application of blockchain technologies. In Proceedings of the International Symposium on Mobile Internet Security. Springer , 110\u2013119. Marek R. Ogiela and Lidia Ogiela. 2017. Secure data and services management in distributed structures and in the cloud with application of blockchain technologies. In Proceedings of the International Symposium on Mobile Internet Security. Springer, 110\u2013119."},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2019.8702008"},{"key":"e_1_2_2_93_1","volume-title":"et\u00a0al","author":"Muata Kweku","year":"2018","unstructured":"Kweku Muata , A. Osei-Bryson , et\u00a0al . 2018 . A blockchain-based security-oriented framework for cloud federation. In KSU proceeding on Cybersecurity Education, Research and Practice . 1\u201318. Kweku Muata, A. Osei-Bryson, et\u00a0al. 2018. A blockchain-based security-oriented framework for cloud federation. In KSU proceeding on Cybersecurity Education, Research and Practice. 1\u201318."},{"key":"e_1_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18082575"},{"key":"e_1_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSST.2018.8632193"},{"key":"e_1_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2018.00019"},{"key":"e_1_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.5220\/0007765605230527"},{"key":"e_1_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0118-0_15"},{"key":"e_1_2_2_99_1","doi-asserted-by":"crossref","unstructured":"Xuanmei Qin Yongfeng Huang Zhen Yang and Xing Li. 2020. A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J. Syst. Arch. (2020) 101854.  Xuanmei Qin Yongfeng Huang Zhen Yang and Xing Li. 2020. A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J. Syst. Arch. (2020) 101854.","DOI":"10.1016\/j.sysarc.2020.101854"},{"key":"e_1_2_2_100_1","volume-title":"Networking integrated cloud-edge-end in IoT: A blockchain-assisted collective q-learning approach","author":"Qiu Chao","year":"2020","unstructured":"Chao Qiu , Xiaofei Wang , Haipeng Yao , Jianbo Du , F. Richard Yu , and Song Guo . 2020. Networking integrated cloud-edge-end in IoT: A blockchain-assisted collective q-learning approach . IEEE IoT J. ( 2020 ), 1\u20131. Chao Qiu, Xiaofei Wang, Haipeng Yao, Jianbo Du, F. Richard Yu, and Song Guo. 2020. Networking integrated cloud-edge-end in IoT: A blockchain-assisted collective q-learning approach. IEEE IoT J. (2020), 1\u20131."},{"key":"e_1_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7561-3_6"},{"key":"e_1_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01221-x"},{"key":"e_1_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00009-7_57"},{"key":"e_1_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.02967"},{"key":"e_1_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2006.3"},{"key":"e_1_2_2_106_1","first-page":"34","article-title":"Blockchain-based distributed cloud storage digital forensics: Where's the beef?IEEE Secur","volume":"17","author":"Ricci Joseph","year":"2019","unstructured":"Joseph Ricci , Ibrahim Baggili , and Frank Breitinger . 2019 . Blockchain-based distributed cloud storage digital forensics: Where's the beef?IEEE Secur . Priv. 17 , 1 (2019), 34 \u2013 42 . Joseph Ricci, Ibrahim Baggili, and Frank Breitinger. 2019. Blockchain-based distributed cloud storage digital forensics: Where's the beef?IEEE Secur. Priv. 17, 1 (2019), 34\u201342.","journal-title":"Priv."},{"key":"e_1_2_2_107_1","volume-title":"42nd IEEE Conference on Local Computer Networks 2017 (LCN'17)","author":"Rodrigues Bruno","year":"2017","unstructured":"Bruno Rodrigues , Thomas Bocek , and Burkhard Stiller . 2017 . Enabling a cooperative, multi-domain DDoS defense by a blockchain signaling system (BloSS) . In 42nd IEEE Conference on Local Computer Networks 2017 (LCN'17) . 1\u20133. Bruno Rodrigues, Thomas Bocek, and Burkhard Stiller. 2017. Enabling a cooperative, multi-domain DDoS defense by a blockchain signaling system (BloSS). In 42nd IEEE Conference on Local Computer Networks 2017 (LCN'17). 1\u20133."},{"key":"e_1_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3350546.3352561"},{"key":"e_1_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751476"},{"key":"e_1_2_2_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3201584"},{"key":"e_1_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"e_1_2_2_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_2_2_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757955"},{"key":"e_1_2_2_114_1","volume-title":"Disruptive Technologies in Sensors and Sensor Systems","volume":"10206","author":"Shetty Sachin","year":"2017","unstructured":"Sachin Shetty , Val Red , Charles Kamhoua , Kevin Kwiat , and Laurent Njilla . 2017 . Data provenance assurance in the cloud using blockchain . In Disruptive Technologies in Sensors and Sensor Systems , Vol. 10206 . International Society for Optics and Photonics, 1\u201311. https:\/\/doi.org\/10.1117\/12.2266994 Sachin Shetty, Val Red, Charles Kamhoua, Kevin Kwiat, and Laurent Njilla. 2017. Data provenance assurance in the cloud using blockchain. In Disruptive Technologies in Sensors and Sensor Systems, Vol. 10206. International Society for Optics and Photonics, 1\u201311. https:\/\/doi.org\/10.1117\/12.2266994"},{"key":"e_1_2_2_115_1","doi-asserted-by":"crossref","unstructured":"Yun Shu Jian Yu and Wei Qi Yan. 2019. Blockchain for security of cloud-based online auction. In Exploring Security in Software Architecture and Design. IGI Global 189\u2013210.  Yun Shu Jian Yu and Wei Qi Yan. 2019. Blockchain for security of cloud-based online auction. In Exploring Security in Software Architecture and Design. IGI Global 189\u2013210.","DOI":"10.4018\/978-1-5225-6313-6.ch008"},{"key":"e_1_2_2_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/1084805.1084812"},{"key":"e_1_2_2_117_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"e_1_2_2_118_1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719844159"},{"key":"e_1_2_2_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926880"},{"key":"e_1_2_2_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373017.3373027"},{"key":"e_1_2_2_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPTCOMM.2017.8169748"},{"key":"e_1_2_2_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2018.8317400"},{"key":"e_1_2_2_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911732"},{"key":"e_1_2_2_124_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03596-9_10"},{"key":"e_1_2_2_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"e_1_2_2_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00152"},{"key":"e_1_2_2_127_1","doi-asserted-by":"publisher","DOI":"10.1177\/0954405411405575"},{"key":"e_1_2_2_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00038"},{"key":"e_1_2_2_129_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.08.020"},{"key":"e_1_2_2_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00045"},{"key":"e_1_2_2_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2892222"},{"key":"e_1_2_2_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.111"},{"key":"e_1_2_2_133_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95168-3_12"},{"key":"e_1_2_2_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/3070617.3070634"},{"key":"e_1_2_2_135_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0994-6"},{"key":"e_1_2_2_136_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21373-2_29"},{"key":"e_1_2_2_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929205"},{"key":"e_1_2_2_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943153"},{"key":"e_1_2_2_139_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2730843"},{"key":"e_1_2_2_140_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106526"},{"key":"e_1_2_2_141_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2203-7_3"},{"key":"e_1_2_2_142_1","doi-asserted-by":"crossref","unstructured":"Cipai Xing Zhuorong Chen Lexin Chen Xiaojie Guo Zibin Zheng and Jin Li. 2020. A new scheme of vulnerability analysis in smart contract with machine learning. Wireless Netw. (2020) 1\u201310. https:\/\/doi.org\/10.1007\/s11276-020-02379-z  Cipai Xing Zhuorong Chen Lexin Chen Xiaojie Guo Zibin Zheng and Jin Li. 2020. A new scheme of vulnerability analysis in smart contract with machine learning. Wireless Netw. (2020) 1\u201310. https:\/\/doi.org\/10.1007\/s11276-020-02379-z","DOI":"10.1007\/s11276-020-02379-z"},{"key":"e_1_2_2_143_1","first-page":"4585","article-title":"Cloud\/fog computing resource management and pricing for blockchain networks","volume":"6","author":"Xiong Zehui","year":"2018","unstructured":"Zehui Xiong , Shaohan Feng , Wenbo Wang , Dusit Niyato , Ping Wang , and Zhu Han . 2018 . Cloud\/fog computing resource management and pricing for blockchain networks . IEEE IoT J. 6 , 3 (2018), 4585 \u2013 4600 . https:\/\/doi.org\/10.1109\/JIOT.2018.2871706 Zehui Xiong, Shaohan Feng, Wenbo Wang, Dusit Niyato, Ping Wang, and Zhu Han. 2018. Cloud\/fog computing resource management and pricing for blockchain networks. IEEE IoT J. 6, 3 (2018), 4585\u20134600. https:\/\/doi.org\/10.1109\/JIOT.2018.2871706","journal-title":"IEEE IoT J."},{"key":"e_1_2_2_144_1","first-page":"356","article-title":"Cloud\/edge computing service management in blockchain networks: Multi-leader multi-follower game-based ADMM for pricing","volume":"13","author":"Xiong Zehui","year":"2019","unstructured":"Zehui Xiong , Jiawen Kang , Dusit Niyato , Ping Wang , and H. Vincent Poor . 2019 . Cloud\/edge computing service management in blockchain networks: Multi-leader multi-follower game-based ADMM for pricing . IEEE Trans. Serv. Comput. 13 , 2 (2019), 356 \u2013 367 . Zehui Xiong, Jiawen Kang, Dusit Niyato, Ping Wang, and H. Vincent Poor. 2019. Cloud\/edge computing service management in blockchain networks: Multi-leader multi-follower game-based ADMM for pricing. IEEE Trans. Serv. Comput. 13, 2 (2019), 356\u2013367.","journal-title":"IEEE Trans. Serv. Comput."},{"key":"e_1_2_2_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.1081060"},{"key":"e_1_2_2_146_1","first-page":"8547","article-title":"On cloud storage optimization of blockchain with a clustering-based genetic algorithm","volume":"7","author":"Xu Mengtian","year":"2020","unstructured":"Mengtian Xu , Guorui Feng , Yanli Ren , and Xinpeng Zhang . 2020 . On cloud storage optimization of blockchain with a clustering-based genetic algorithm . IEEE IoT J. 7 , 9 (2020), 8547 \u2013 8558 . Mengtian Xu, Guorui Feng, Yanli Ren, and Xinpeng Zhang. 2020. On cloud storage optimization of blockchain with a clustering-based genetic algorithm. IEEE IoT J. 7, 9 (2020), 8547\u20138558.","journal-title":"IEEE IoT J."},{"key":"e_1_2_2_147_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.11.011"},{"key":"e_1_2_2_148_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOCN.2017.8121598"},{"key":"e_1_2_2_149_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.064181122"},{"key":"e_1_2_2_150_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2019.00039"},{"key":"e_1_2_2_151_1","doi-asserted-by":"publisher","DOI":"10.1080\/0951192X.2019.1571234"},{"key":"e_1_2_2_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2018.8644863"},{"key":"e_1_2_2_153_1","doi-asserted-by":"publisher","DOI":"10.14778\/3397230.3397231"},{"key":"e_1_2_2_154_1","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.130"},{"key":"e_1_2_2_155_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600896"},{"key":"e_1_2_2_156_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40253-6_32"},{"key":"e_1_2_2_157_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.018"},{"key":"e_1_2_2_158_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01950-1_1"},{"key":"e_1_2_2_159_1","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8322979"},{"key":"e_1_2_2_160_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2908400"},{"key":"e_1_2_2_161_1","first-page":"2923222","article-title":"Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage","volume":"2019","author":"Zhang Yuan","year":"2019","unstructured":"Yuan Zhang , Chunxiang Xu , Jianbing Ni , Hongwei Li , and Xuemin Sherman Shen . 2019 . Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage . IEEE Trans. Cloudhttps:\/\/doi.org\/10.1109\/TCC. 2019 . 2923222 Yuan Zhang, Chunxiang Xu, Jianbing Ni, Hongwei Li, and Xuemin Sherman Shen. 2019. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Trans. Cloudhttps:\/\/doi.org\/10.1109\/TCC.2019.2923222","journal-title":"IEEE Trans. Cloudhttps:\/\/doi.org\/10.1109\/TCC."},{"key":"e_1_2_2_162_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2861944"},{"key":"e_1_2_2_163_1","volume-title":"bcBIM: A blockchain-based big data model for BIM modification audit and provenance in mobile cloud. Math. Probl. Eng","author":"Zheng Rongyue","year":"2019","unstructured":"Rongyue Zheng , Jianlin Jiang , Xiaohan Hao , Wei Ren , Feng Xiong , and Yi Ren . 2019. bcBIM: A blockchain-based big data model for BIM modification audit and provenance in mobile cloud. Math. Probl. Eng . 2019 , (03 2019), 1\u201313. https:\/\/doi.org\/10.1155\/2019\/5349538 Rongyue Zheng, Jianlin Jiang, Xiaohan Hao, Wei Ren, Feng Xiong, and Yi Ren. 2019. bcBIM: A blockchain-based big data model for BIM modification audit and provenance in mobile cloud. Math. Probl. Eng. 2019, (03 2019), 1\u201313. https:\/\/doi.org\/10.1155\/2019\/5349538"},{"key":"e_1_2_2_164_1","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2018.8531125"},{"key":"e_1_2_2_165_1","doi-asserted-by":"publisher","DOI":"10.5555\/3292946.3292948"},{"key":"e_1_2_2_166_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom2018.2018.00057"},{"key":"e_1_2_2_167_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737580"},{"key":"e_1_2_2_168_1","doi-asserted-by":"publisher","DOI":"10.1109\/NANA.2018.8648712"},{"key":"e_1_2_2_169_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.019"},{"key":"e_1_2_2_170_1","volume-title":"Blockchain based consensus checking in decentralized cloud storage. Simul. Model. Pract. Theory","author":"Zhu Zhiqin","year":"2019","unstructured":"Zhiqin Zhu , Guanqiu Qi , Mingyao Zheng , Jian Sun , and Yi Chai . 2019. Blockchain based consensus checking in decentralized cloud storage. Simul. Model. Pract. Theory ( 2019 ), 101987. Zhiqin Zhu, Guanqiu Qi, Mingyao Zheng, Jian Sun, and Yi Chai. 2019. Blockchain based consensus checking in decentralized cloud storage. Simul. Model. Pract. Theory (2019), 101987."},{"key":"e_1_2_2_171_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"e_1_2_2_172_1","volume-title":"Xuan-Bach D. Le, Xin Xia, Yang Feng, Zhenyu Chen, and Baowen Xu.","author":"Zou Weiqin","year":"2019","unstructured":"Weiqin Zou , David Lo , Pavneet Singh Kochhar , Xuan-Bach D. Le, Xin Xia, Yang Feng, Zhenyu Chen, and Baowen Xu. 2019 . Smart contract development: Challenges and opportunities. IEEE Trans. Softw. Eng . (2019). https:\/\/doi.org\/10.1109\/TSE.2019.2942301 Weiqin Zou, David Lo, Pavneet Singh Kochhar, Xuan-Bach D. Le, Xin Xia, Yang Feng, Zhenyu Chen, and Baowen Xu. 2019. Smart contract development: Challenges and opportunities. IEEE Trans. Softw. Eng. (2019). https:\/\/doi.org\/10.1109\/TSE.2019.2942301"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3456628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3456628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:46:55Z","timestamp":1750193215000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3456628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,4]]},"references-count":169,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,11,30]]}},"alternative-id":["10.1145\/3456628"],"URL":"https:\/\/doi.org\/10.1145\/3456628","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,4]]},"assertion":[{"value":"2020-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}