Blockchain meets cloud computing: A survey

K Gai, J Guo, L Zhu, S Yu - IEEE Communications Surveys & …, 2020 - ieeexplore.ieee.org
Blockchain technology has been deemed to be an ideal choice for strengthening existing
computing systems in varied manners. As one of the network-enabled technologies, cloud …

Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability

X Liang, S Shetty, D Tosh, C Kamhoua… - 2017 17th IEEE/ACM …, 2017 - ieeexplore.ieee.org
Cloud data provenance is metadata that records the history of the creation and operations
performed on a cloud data object. Secure data provenance is crucial for data accountability …

[HTML][HTML] Blockchain supported BIM data provenance for construction projects

Y Celik, I Petri, M Barati - Computers in Industry, 2023 - Elsevier
The management of construction projects requires adequate techniques to support the
continual exchange of information across disciplines. Recent advances in Building …

Trustworthy {Whole-System} provenance for the linux kernel

A Bates, DJ Tian, KRB Butler, T Moyer - 24th USENIX Security …, 2015 - usenix.org
In a provenance-aware system, mechanisms gather and report metadata that describes the
history of each object being processed on the system, allowing users to understand how …

Lightweight distributed provenance model for complex real–world environments

R Wittner, C Mascia, M Gallo, F Frexia, H Müller… - Scientific Data, 2022 - nature.com
Provenance is information describing the lineage of an object, such as a dataset or
biological material. Since these objects can be passed between organizations, each …

CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud

D Tosh, S Shetty, P Foytik… - 2018 IEEE 11Th …, 2018 - ieeexplore.ieee.org
Maintaining data provenance in cloud in a tamper-resistant manner that cannot be breached
by malicious parties is a necessity from the current security standpoint. Blockchain …

Provusb: Block-level provenance-based data protection for usb storage devices

D Tian, A Bates, KRB Butler… - Proceedings of the 2016 …, 2016 - dl.acm.org
Defenders of enterprise networks have a critical need to quickly identify the root causes of
malware and data leakage. Increasingly, USB storage devices are the media of choice for …

A provenance-based access control model for dynamic separation of duties

D Nguyen, J Park, R Sandhu - 2013 Eleventh Annual …, 2013 - ieeexplore.ieee.org
Dynamic Separation of Duties (DSOD) is a well-known and important concept in cyber
security, which has been extensively studied in the literature. The published literature mostly …

Adopting provenance-based access control in openstack cloud iaas

D Nguyen, J Park, R Sandhu - … : 8th International Conference, NSS 2014, Xi …, 2014 - Springer
Abstract Provenance-based Access Control (PBAC) has recently risen as an effective
access control approach that can utilize readily provided history information of underlying …

Consent verification monitoring

M Robol, TD Breaux, E Paja, P Giorgini - ACM Transactions on Software …, 2023 - dl.acm.org
Advances in personalization of digital services are driven by low-cost data collection and
processing, in addition to the wide variety of third-party frameworks for authentication …