{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T18:35:17Z","timestamp":1775154917436,"version":"3.50.1"},"reference-count":38,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2017,8,18]],"date-time":"2017-08-18T00:00:00Z","timestamp":1503014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004083","name":"Ministry of Science ICT and Future Planning","doi-asserted-by":"publisher","award":["IITP-2017-2014-0-00720"],"award-info":[{"award-number":["IITP-2017-2014-0-00720"]}],"id":[{"id":"10.13039\/501100004083","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Blockchain has drawn attention as the next-generation financial technology due to its security that suits the informatization era. In particular, it provides security through the authentication of peers that share virtual cash, encryption, and the generation of hash value. According to the global financial industry, the market for security-based blockchain technology is expected to grow to about USD 20 billion by 2020. In addition, blockchain can be applied beyond the Internet of Things (IoT) environment; its applications are expected to expand. Cloud computing has been dramatically adopted in all IT environments for its efficiency and availability. In this paper, we discuss the concept of blockchain technology and its hot research trends. In addition, we will study how to adapt blockchain security to cloud computing and its secure solutions in detail.<\/jats:p>","DOI":"10.3390\/sym9080164","type":"journal-article","created":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T04:12:17Z","timestamp":1503288737000},"page":"164","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":247,"title":["Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions"],"prefix":"10.3390","volume":"9","author":[{"given":"Jin","family":"Park","sequence":"first","affiliation":[{"name":"Department of Computer Science, School of Software, SoongSil University, Seoul 06978, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1831-0309","authenticated-orcid":false,"given":"Jong","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Seoul National University of Science and Technology, (SeoulTech) Seoul 01811, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2017,8,18]]},"reference":[{"key":"ref_1","unstructured":"Il-Kwon, L., Young-Hyuk, K., Jae-Gwang, L., and Jae-Pil, L. (July, January 30). The Analysis and Countermeasures on Security Breach of Bitcoin. Proceedings of the International Conference on Computational Science and Its Applications, Guimar\u00e3es, Portugal."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Beikverdi, A., and JooSeok, S. (2015, January 1\u20133). Trend of centralization in Bitcoin\u2019s distributed network. Proceedings of the 2015 16th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD), Takamatsu, Japan.","DOI":"10.1109\/SNPD.2015.7176229"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., and Felten, E.W. (2015, January 17\u201321). Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. Proceedings of the 2015 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2015.14"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","article-title":"Blockchains and Smart Contracts for the Internet of Things","volume":"4","author":"Christidis","year":"2016","journal-title":"IEEE Access"},{"key":"ref_5","unstructured":"Huang, H., Chen, X., Wu, Q., Huang, X., and Shen, J. (2016). Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Huh, S., Sangrae, C., and Soohyung, K. (2017, January 19\u201322). Managing IoT devices using blockchain platform. Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, Korea.","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Conti, M., Schunter, M., and Askoxylakis, I. (2015). Ripple: Overview and Outlook. Trust and Trustworthy Computing, Springer International Publishing.","DOI":"10.1007\/978-3-319-22846-4"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Vasek, M., and Moore, T. (2015, January 26\u201330). There\u2019s No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. Proceedings of the International Conference on Financial Cryptography and Data Security, San Juan, Puerto Rico.","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"9239","DOI":"10.1109\/ACCESS.2016.2645904","article-title":"A Secure System For Pervasive Social Network-based Healthcare","volume":"4","author":"Zhang","year":"2016","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.jnca.2016.09.002","article-title":"A survey on cloud computing security: Issues, threats, and solutions","volume":"75","author":"Singh","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_11","unstructured":"Kaskaloglu, K. (2014, January 24\u201326). Near zero Bitcoin transaction fees cannot last forever. Proceedings of the International Conference on Digital Security and Forensics (DigitalSec2014), The Society of Digital Information and Wireless Communication, Ostrava, Czech Republic."},{"key":"ref_12","unstructured":"Ziegeldorf, J.H., Matzutt, R., Henze, M., Grossmann, F., and Wehrle, K. (2016). Secure and anonymous decentralized Bitcoin mixing. Future Gener. Comput. Syst."},{"key":"ref_13","unstructured":"Aitzhan, N.Z., and Davor, S. (2016). Security and Privacy in Decentralized Energy Trading through Multi-signatures, Blockchain and Anonymous Messaging Streams. IEEE Trans. Dependable Secur. Comput., 99."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Heilman, E., Foteini, B., and Sharon, G. (2016, January 22\u201326). Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions. Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados.","DOI":"10.1007\/978-3-662-53357-4_4"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Natoli, C., and Gramoli, V. (November, January 31). The blockchain anomaly. Proceedings of the 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA.","DOI":"10.1109\/NCA.2016.7778635"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1186\/s40854-016-0045-6","article-title":"A new proof-of-work mechanism for bitcoin","volume":"2","author":"Shi","year":"2016","journal-title":"Financ. Innov."},{"key":"ref_17","unstructured":"Swan, M. (2015). Blockchain: Blueprint for a New Economy, O\u2019Reilly Media, Inc."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","article-title":"Bitcoin and beyond: A technical survey on decentralized digital currencies","volume":"18","author":"Tschorsch","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Wressnegger, C., Freeman, K., Yamaguchi, F., and Rieck, K. (2017, January 02\u201306). Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, UAE.","DOI":"10.1145\/3052973.3053002"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Decker, C., and Roger, W. (2013, January 9\u201311). Information propagation in the bitcoin network. Proceedings of the 2013 IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P), Trento, Italy.","DOI":"10.1109\/P2P.2013.6688704"},{"key":"ref_21","unstructured":"Nakamoto, S. (2017, June 29). Bitcoin: A peer-to-peer electronic cash system. Available online: https:\/\/bitcoin.org\/en\/bitcoin-paper."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Bozic, N., Guy, P., and Stefano, S. (2016). A tutorial on blockchain and applications to secure network control-planes. SCNS IEEE.","DOI":"10.1109\/SCNS.2016.7870552"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(13)70101-5","article-title":"The problem with Bitcoin","volume":"11","author":"Bradbury","year":"2013","journal-title":"Comput. Fraud Secur."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Paul, G., Sarkar, P., and Mukherjee, S. (2014, January 16\u201320). Towards a more democratic mining in bitcoins. Proceedings of the International Conference on Information Systems Security, Hyderabad, India.","DOI":"10.1007\/978-3-319-13841-1_11"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Mauw, S., and Jensen, C. (2014). BlueWallet: The Secure BitcoinWallet. Security and Trust Management, Springer International Publishing.","DOI":"10.1007\/978-3-319-11851-2"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Anceaume, E., Lajoie-Mazenc, T., Ludinard, R., and Sericola, B. (November, January 31). Safety analysis of Bitcoin improvement proposals. Proceedings of the 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA.","DOI":"10.1109\/NCA.2016.7778636"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Upadhyaya, R., and Jain, A. (2016, January 29\u201330). Cyber ethics and cybercrime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet. Proceedings of the 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, India.","DOI":"10.1109\/CCAA.2016.7813706"},{"key":"ref_28","unstructured":"Haber, S., and Stornetta, W.S. (1990, January 8\u201311). How to time-stamp a digital document. Proceedings of the Conference on the Theory and Application of Cryptography, Sydney, NSW, Australia."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Eyal, I., and Emin, G.S. (2014, January 3\u20137). Majority is not enough: Bitcoin mining is vulnerable. Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados.","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Petersen, K., Feldt, R., Mujtaba, S., and Mattsson, M. (2008, January 26\u201327). Systematic Mapping Studies in Software Engineering. Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering (EASE), Bari, Italy.","DOI":"10.14236\/ewic\/EASE2008.8"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Mann, C., and Loebenberger, D. (2015). Two-factor authentication for the Bitcoin protocol. International Workshop on Security and Trust Management, Springer International Publishing.","DOI":"10.1007\/978-3-319-24858-5_10"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Yuan, Y., and Wang, F.-Y. (2016, January 1\u20134). Towards blockchain-based intelligent transportation systems. Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil.","DOI":"10.1109\/ITSC.2016.7795984"},{"key":"ref_33","unstructured":"Kogias, E.K., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., and Ford, B. (2016, January 10\u201312). \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL). Enhancing bitcoin security and performance with strong consistency via collective signing. Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Vasek, M., Thornton, M., and Moore, T. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 3\u20137 March 2014.","DOI":"10.1007\/978-3-662-44774-1_5"},{"key":"ref_35","unstructured":"Bastiaan, M. (2017, June 29). Preventing the 51%-Attack: A Stochastic Analysis of Two Phase Proof of Work in Bitcoin. Available online: http:\/\/referaat.cs.utwente.nl\/conference\/22\/paper\/7473\/preventingthe-51-attack -a-stochastic-analysis-of-two-phase-proof-of-work-in-bitcoin.pdf."},{"key":"ref_36","unstructured":"Kroll, J.A., Davey, I.C., and Felten, E.W. (2013). The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. Proc. WEIS., 2013."},{"key":"ref_37","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G., and van Renesse, R. (2016, January 2). Bitcoin-ng: A scalable blockchain protocol. Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), Santa Clara, CA, USA."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Karame, G.O., Elli, A., and Srdjan, C. (2012, January 16\u201318). Double-spending fast payments in bitcoin. Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, CA, USA.","DOI":"10.1145\/2382196.2382292"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/9\/8\/164\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:42:45Z","timestamp":1760208165000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/9\/8\/164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,18]]},"references-count":38,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2017,8]]}},"alternative-id":["sym9080164"],"URL":"https:\/\/doi.org\/10.3390\/sym9080164","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,18]]}}}