Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 18

Proceedings of the 2019 Federated Conference on Computer Science and Information Systems

Using Blockchain to Access Cloud Services: A Case of Financial Service Application

, ,

DOI: http://dx.doi.org/10.15439/2019F296

Citation: Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 18, pages 565568 ()

Full text

Abstract. Most cloud providers use centralized servers to manage data. However, centralized servers still suffer the risks of single point of failure and data theft. We add a blockchain to the cloud service and propose a new architecture to manage data. Using blockchain as a connector to utilize the tamperproof, traceable, and data-sharing features of the blockchain to ensure that the transaction data are properly stored in each node. We use the stock simulation trading service to extend and divide the research design into two levels, namely, system and application services. First, we directly write the data into the blockchain. Second, we alternatively store the data in the cloud and then write it into the blockchain. Finally, the two versions are compared and analyzed to investigate their feasibility and performance. At the application service, we implement the smart contract for the existing stock transaction process to achieve real-time settlement.

References

  1. J. Gibson and R. Rondeau and D. Eveleigh and Q. Tan , “Benefits and challenges of three cloud computing service models,” in 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN) IEEE, 2012, pp. 198–205. http://dx.doi.org/10.1109/CA-SoN.2012.6412402
  2. H. Tianfield , “Security issues in cloud computing,” in 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC) IEEE 2012, pp. 1082–1089. http://dx.doi.org/10.1109/ICSMC.2012.6377874
  3. W.A. Jansen , “Cloud hooks: Security and privacy issues in cloud computing,” in 2011 44th Hawaii International Conference on System Sciences IEEE 2011, pp. 1–10. http://dx.doi.org/10.1109/HICSS.2011.103
  4. A. Kirar and A.K. Yadav and S. Maheswari, “An efficient architecture and algorithm to prevent data leakage in Cloud Computing using multi-tier security approach,” in 2016 International Conference System Modeling & Advancement in Research Trends (SMART) IEEE 2016, pp. 271–279. http://dx.doi.org/10.1109/SYSMART.2016.7894534
  5. M. Dai and S. Zhang and H. Wang and S. Jin, “A low storage room requirement framework for distributed ledger in blockchain,” IEEE Access, vol. 6, 2018, pp. 22970–22975. http://dx.doi.org/10.1109/ACCESS.2018.2814624
  6. C.-W. Wang and S.E. Chang, “Cloud service in stock trading game: Service virtualization, integration and financial application,” in 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN) IEEE, 2016, pp. 857–862. http://dx.doi.org/10.1109/ICUFN.2016.7537158
  7. S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008, Retrieved Nov 20, 2018 from https://bitcoin.org/bitcoin.pdf
  8. M. Swan, Blockchain: Blueprint for a new economy, 2015, " O’Reilly Media, Inc."
  9. N. Szabo, Smart contracts, 1994, unpublished. Retrieved Dec 15, 2018 from http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html
  10. V. Buterin, “A next-generation smart contract and decentralized application platform,” white paper, 2014.
  11. F. B. Schneider, “Implementing fault-tolerant services using the state machine approach: A tutorial,” ACM Computing Surveys (CSUR), vol. 22, no. 4, 1990, pp. 299–319. http://dx.doi.org/10.1145/98163.98167
  12. L. Lamport, R. Shostak, and M. Pease, “The Byzantine generals problem,” ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 4, no. 3, 1982, pp. 382–401. http://dx.doi.org/10.1145/357172.357176
  13. X. Xu et al., “The blockchain as a software connector,” in 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), IEEE 2016, pp. 182–191. http://dx.doi.org/10.1109/WICSA.2016.21
  14. D. Drescher, “Blockchain Basics: A Non-technical Introduction in 25 Steps,” 1st edn, Apress, Frankfurt am Main, 2017
  15. K.-H. Huang, Application of blockchain in the field of securities trading: settlement delivery, 2017, Retrieved March 3, 2019 from http://www1.cof.nkfust.edu.tw/ezfiles/12/1012/img/1938/729871942.pdf
  16. N. Herbaut and N. Negru, “A model for collaborative blockchain-based video delivery relying on advanced network services chains,” IEEE Communications Magazine, vol. 55, no. 9, 2018, pp. 70–76. http://dx.doi.org/10.1109/MCOM.2017.1700117