Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges

Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar, Huaqun Wang, Kkwang Raymond Choo

Research output: Contribution to journalReview articlepeer-review

9 Scopus citations

Abstract

Cloud computing is a network model of on-demand access for sharing configurable computing resource pools. Compared with conventional service architectures, cloud computing introduces new security challenges in secure service management and control, privacy protection, data integrity protection in distributed databases, data backup, and synchronization. Blockchain can be leveraged to address these challenges, partly due to the underlying characteristics such as transparency, traceability, decentralization, security, immutability, and automation. We present a comprehensive survey of how blockchain is applied to provide security services in the cloud computing model and we analyze the research trends of blockchain-related techniques in current cloud computing models. During the reviewing, we also briefly investigate how cloud computing can affect blockchain, especially about the performance improvements that cloud computing can provide for the blockchain. Our contributions include the following: (i) summarizing the possible architectures and models of the integration of blockchain and cloud computing and the roles of cloud computing in blockchain; (ii) classifying and discussing recent, relevant works based on different blockchain-based security services in the cloud computing model; (iii) simply investigating what improvements cloud computing can provide for the blockchain; (iv) introducing the current development status of the industry/major cloud providers in the direction of combining cloud and blockchain; (v) analyzing the main barriers and challenges of integrated blockchain and cloud computing systems; and (vi) providing recommendations for future research and improvement on the integration of blockchain and cloud systems.

Original languageEnglish
Article number160
JournalACM Computing Surveys
Volume54
Issue number8
DOIs
StatePublished - Nov 2022

Bibliographical note

Funding Information:
The work was supported by the National Key Research and Development Program of China (No. 2019QY0800), the Blockchain Core Technology Strategic Research Program of Ministry of Education of China (No. 2020KJ010301), the Shandong Provincial Key Research and Development Program (No. 2020CXGC010107), the National Natural Science Foundation of China (Nos. 61972294, 61932016, 61872192), the Special Project on Science and Technology Program of Hubei Provience (No. 2020AEA013), the Natural Science Foundation of Hubei Province (No. 2020CFA052), and the Wuhan Municipal Science and Technology Project (No. 2020010601012187). The work of K.-K. R. Choo was supported only by National Science Foundation CREST under Grant HRD-1736209, and the Cloud Technology Endowed Professorship.

Funding Information:
The work was supported by the National Key Research and Development Program of China (No. 2019QY0800), the Blockchain Core Technology Strategic Research Program of Ministry of Education of China (No. 2020KJ010301), the Shan-dong Provincial Key Research and Development Program (No. 2020CXGC010107), the National Natural Science Foundation of China (Nos. 61972294, 61932016, 61872192), the Special Project on Science and Technology Program of Hubei Provience (No. 2020AEA013), the Natural Science Foundation of Hubei Province (No. 2020CFA052), and the Wuhan Municipal Science and Technology Project (No. 2020010601012187). The work of K.-K. R. Choo was supported only by National Science Foundation CREST under Grant HRD-1736209, and the Cloud Technology Endowed Professorship. Authors’ addresses: J. Zou and D. He (corresponding author), School of Cyber Science and Engineering, Wuhan University, Wuhan, China, 430072 and Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, Shanghai, China, 201204; emails: cielozou@foxmail.com, hedebiao@163.com; S. Zeadally, College of Communication and Information, University of Kentucky, Lexington, KY, 40506-0224; email: szeadally@uky.edu; N. Kumar, Department of Computer Science and Engineering, Thapar University, Patiala, India, 147004; email: neeraj.kumar@ thapar.edu; H. Wang, College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China, 210003; email: wanghuaqun@aliyun.com; K.-K. R. Choo, Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX 78249; email: raymond.choo@fulbrightmail.org. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2021 Association for Computing Machinery. 0360-0300/2021/10-ART160 $15.00 https://doi.org/10.1145/3456628

Publisher Copyright:
© 2021 Association for Computing Machinery.

Keywords

  • Blockchain
  • cloud computing
  • security service

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science (all)

Fingerprint

Dive into the research topics of 'Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges'. Together they form a unique fingerprint.

Cite this