How to cite this paper
Alshinwan, M., Shdefat, A., Mostafa, N., AlSokkar, A., Alsarhan, T & Almajali, D. (2023). Integrated cloud computing and blockchain systems: A review.International Journal of Data and Network Science, 7(2), 941-956.
Refrences
A Blockchain Platform for the Enterprise: Hyperledger Fabric. (2020). https://hyperledger-fabric.readthedocs.io/en/release-1.2/whatis.html
Abuaddous, H. Y., Al Sokkar, A. A. M., & Abualodous, B. I. (2018). The impact of knowledge management on organizational performance. International Journal of Advanced Computer Science and Applications, 9(4).
Abualigah, L., Gandomi, A. H., Elaziz, M. A., Hamad, H. Al, Omari, M., Alshinwan, M., & Khasawneh, A. M. (2021). Advances in meta-heuristic optimization algorithms in big data text clustering. Electronics, 10(2), 101.
Abualigah, L., Shehab, M., Alshinwan, M., & Alabool, H. (2020). Salp swarm algorithm: a comprehensive survey. Neural Computing and Applications, 32(15), 11195–11215.
Abualigah, L., Shehab, M., Alshinwan, M., Alabool, H., Abuaddous, H. Y., Khasawneh, A. M., & Al Diabat, M. (2020). Ts-gwo: Iot tasks scheduling in cloud computing using grey wolf optimizer. In Swarm intelligence for cloud computing (pp. 127–152). Chapman and Hall/CRC.
AL-Sous, N., Alsokkar, A., Majali, T., Mansour, A., Alsherideh, A., Masadeh, R., Dahali, Z., & others. (2022). Antecedents of e-commerce on intention to use the international trade center: An Exploratory Study in Jordan. International Journal of Data and Network Science, 6(4), 1531–1542.
Al Shinwan, M., Abualigah, L., Huy, T.-D., Younes Shdefat, A., Altalhi, M., Kim, C., El-Sappagh, S., Abd Elaziz, M., & Kwak, K. S. (2022). An Efficient 5G Data Plan Approach Based on Partially Distributed Mobility Architecture. Sensors, 22(1), 349.
Al Shinwan, M., Abualigah, L., Le, N. D., Kim, C., & Khasawneh, A. M. (2021). An intelligent long-lived TCP based on real-time traffic regulation. Multimedia Tools and Applications, 80(11), 16763–16780.
Alias, J. S., Manasa, M., Pallavi Krishna, B. R., & Asha Rani, M. (2018). Security System for Cloud Based Services. 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics, 132.
Alibab Cloud Blockchain as a Service. (2020). http://docs-aliyun.cn-hangzhou.oss.aliyun-inc.com/pdf/baas-product_intro-intl-en-2020-04-28.pdf
Alsokkar, A., Law, E., Almajali, D., & Alshinwan, M. (2023). The effect of multimodality on customers’ decision-making and experiencing: A comparative study. International Journal of Data and Network Science, 7(1), 1–14.
Altamimi, A., Al-Bashayreh, M., AL-Oudat, M., & Almajali, D. (2022). Blockchain technology adoption for sustainable learning. International Journal of Data and Network Science, 6(3), 983–994.
AWS blockchain platform. (2020). https://aws.amazon.com/blockchain/templates/
AWS Blockchain Templates. (2020). https://docs.aws.amazon.com/blockchain-templates/latest/developerguide/blockchain-templates-dg.pdf#what-are-blockchain-templates
Azure Blockchain Service security. (2020). https://docs.microsoft.com/en-us/azure/blockchain/service/data-security
Baliga, A. (2017). Understanding blockchain consensus models. Persistent, 4, 1–14.
Blockchain and the Internet of Things: the IoT blockchain picture. (2018). https://www.iscoop.eu/blockchain-distributed-ledger-technology/blockchain-iot/
Chandrasekaran, K. (2014). Essentials of cloud computing. CrC Press.
Coutinho, E. F., Paulo, D. E., Abreu, A. W., & Carla, I. M. B. (2020). Towards Cloud Computing and Blockchain Integrated Applications. 2020 IEEE International Conference on Software Architecture Companion (ICSA-C), 139–142.
Decentralized financial system CREDITS. (2018). White Paper. http://195.58.33.24:8080/Content/Docs/TechnicalWhitePaperCREDITSEng.pdf
Dillon, T., Wu, C., & Chang, E. (2010). Cloud computing: issues and challenges. 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 27–33.
Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2017). Blockchain-based database to ensure data integrity in cloud computing environments.
Haber, S., & Stornetta, W. S. (1990). How to time-stamp a digital document. Conference on the Theory and Application of Cryptography, 437–455.
Harshavardhan, A., Vijayakumar, T., & Mugunthan, S. R. (2018). Blockchain Technology in Cloud Computing to Overcome Security Vulnerabilities. 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2018 2nd International Conference On, 408–414.
IBM Blockchain Platform. (2020). https://www.ibm.com/blockchain/platform
Ingole, M. K. R., & Yamde, M. S. (2018). Blockchain Technology in Cloud Computing: A Systematic Review.
Ismail, L., Hameed, H., AlShamsi, M., AlHammadi, M., & AlDhanhani, N. (2019). Towards a blockchain deployment at uae university: Performance evaluation and blockchain taxonomy. Proceedings of the 2019 International Conference on Blockchain Technology, 30–38.
Jimi, S. (2018). Blockchain: How Mining Works and Transactions are Processed in Seven Steps.
Khan, A. A., Shaikh, Z. A., Baitenova, L., Mutaliyeva, L., Moiseev, N., Mikhaylov, A., Laghari, A. A., Idris, S. A., & Alshazly, H. (2021). QoS-ledger: smart contracts and metaheuristic for secure quality-of-service and cost-efficient scheduling of medical-data processing. Electronics, 10(24), 3083.
KSI Blockchain Technology. (2018). https://guardtime.com/technology/ksitechnology
Kuebler, R. G. (2018). Application of Blockchain for Authentication, Verification of Identity and Cloud Computing. Utica College.
Leelavimolsilp, T., Tran-Thanh, L., & Stein, S. (2018). On the preliminary investigation of selfish mining strategy with multiple selfish miners. ArXiv Preprint ArXiv:1802.02218.
Lin, I.-C., & Liao, T.-C. (2017). A survey of blockchain security issues and challenges. IJ Network Security, 19(5), 653–659.
Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., & Leaf, D. (2011). NIST cloud computing reference architecture. NIST Special Publication, 500(2011), 1–28.
Lokhandwala, F. A. (2018). A Heuristic Approach to Improve Task Scheduling in Cloud Computing using Blockchain technology. Dublin, National College of Ireland.
Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., & Saxena, P. (2016). A secure sharding protocol for open blockchains. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 17–30.
Lynch, N. A., Fischer, M. J., & Fowler, R. (1982). A Simple and Efficient Byzantine Generals Algorithm.
Macdonald, M., Liu-Thorrold, L., & Julien, R. (2017). The blockchain: A comparison of platforms and their uses beyond bitcoin. COMS4507-Adv. Computer and Network Security.
Macrinici, D., Cartofeanu, C., & Gao, S. (2018). Smart contract applications within blockchain technology: A systematic mapping study. Telematics and Informatics, 35(8), 2337–2354.
Mashal, I., Alsaryrah, O., Chung, T.-Y., Yang, C.-Z., Kuo, W.-H., & Agrawal, D. P. (2015). Choices for interaction with things on Internet and underlying issues. Ad Hoc Networks, 28, 68–90.
Merkle, R. C. (1987). A digital signature based on a conventional encryption function. Conference on the Theory and Application of Cryptographic Techniques, 369–378.
Nakamoto, S., & Bitcoin, A. (2008). A peer-to-peer electronic cash system. Bitcoin.--URL: Https://Bitcoin. Org/Bitcoin. Pdf.
Novotny, P., Zhang, Q., Hull, R., Baset, S., Laredo, J., Vaculin, R., Ford, D. L., & Dillenberger, D. N. (2018). Permissioned blockchain technologies for academic publishing. Information Services \& Use, 38(3), 159–171.
Oracle Autonomous Blockchain Cloud Service. (2020). https://www.oracle.com/a/ocom/docs/blockchain-cloud-service-data-sheet.pdf
Park, J. H., & Park, J. H. (2017). Blockchain security in cloud computing: Use cases, challenges, and solutions. Symmetry, 9(8), 164.
Pen, L. Z., Xian Xian, K., Yew, C. F., Hau, O. S., Sumari, P., Abualigah, L., Ezugwu, A. E., Shinwan, M. Al, Gul, F., & Mughaid, A. (2023). Artocarpus Classification Technique Using Deep Learning Based Convolutional Neural Network. In Classification Applications with Deep Learning and Machine Learning Technologies (pp. 1–21). Springer, Cham.
Prianga, S., Sagana, R., & Sharon, E. (2018). Evolutionary Survey On Data Security In Cloud Computing Using Blockchain. 2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA), 1–6.
Qutqut, M. H., Al-Sakran, A., Almasalha, F., & Hassanein, H. S. (2018). Comprehensive survey of the IoT open-source OSs. IET Wireless Sensor Systems, 8(6), 323–339.
Raul, A., Kalyanaraman, S., Yerande, K., & Devadkar, K. (2019). Blockchain Technology for Decentralized Data Storage on P2P Network. In Soft Computing and Signal Processing (pp. 101–110). Springer.
Revanesh, M., & Sridhar, V. (2021). A trusted distributed routing scheme for wireless sensor networks using blockchain and meta-heuristics-based deep learning technique. Transactions on Emerging Telecommunications Technologies, 32(9), e4259.
Reyna, A., Martín, C., Chen, J., Soler, E., & Díaz, M. (2018). On blockchain and its integration with IoT. Challenges and opportunities. Future generation computer systems, 88, 173-190.
Saad, M., Spaulding, J., Njilla, L., Kamhoua, C., Shetty, S., Nyang, D., & Mohaisen, A. (2019). Exploring the attack surface of blockchain: A systematic overview. ArXiv Preprint ArXiv:1904.03487.
Sanghi, N., Bhatnagar, R., Kaur, G., & Jain, V. (2018). BlockCloud: Blockchain with Cloud Computing. 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 430–434.
Schiavo, F. P., Sassone, V., Nicoletti, L., & Margheri, A. (2016). Faas: Federation-as-a-service. ArXiv Preprint ArXiv:1612.03937.
Sharma, S. G., Ahuja, L., & Goyal, D. P. (2018). Building secure infrastructure for cloud computing using blockchain. 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), 1985–1988.
Shehab, M., Abualigah, L., Al Hamad, H., Alabool, H., Alshinwan, M., & Khasawneh, A. M. (2020). Moth--flame optimization algorithm: variants and applications. Neural Computing and Applications, 32(14), 9859–9884.
Syafruddin, W. A., Dadkhah, S., & Köppen, M. (2019). Blockchain scheme based on evolutionary proof of work. 2019 IEEE Congress on Evolutionary Computation (CEC), 771–776.
Taneja, A. (2018). In blockchain we trust? Testing the promise of blockchain as a means of identity management against the challenges raised by Aadhaar.
Tran, A. B., Xu, X., Weber, I., Staples, M., & Rimba, P. (2017). Regerator: a Registry Generator for Blockchain. CAiSE-Forum-DC, 81–88.
Treleaven, P., Brown, R. G., & Yang, D. (2017). Blockchain technology in finance. Computer, 50(9), 14–17.
Tsai, W.-T., Blower, R., Zhu, Y., & Yu, L. (2016). A system view of financial blockchains. 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE), 450–457.
Uriarte, R. B., & DeNicola, R. (2018). Blockchain-Based Decentralized Cloud/Fog Solutions: Challenges, Opportunities, and Standards. IEEE Communications Standards Magazine, 2(3), 22–28.
Vacca, J. R. (2016). Cloud computing security: foundations and challenges. CRC Press.
Van Mölken, R. (2018). Blockchain across Oracle: Understand the details and implications of the Blockchain for Oracle developers and customers. Packt Publishing Ltd.
What is Azure Blockchain Service? (2020). https://docs.microsoft.com/en-us/azure/blockchain/service/overview#publish-blockchain-data
Wood, G., (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151(2014), 1–32.
Xie, S., Zheng, Z., Chen, W., Wu, J., Dai, H.-N., & Imran, M. (2020). Blockchain for cloud exchange: A survey. Computers \& Electrical Engineering, 81, 106526.
Zheng, W., Zheng, Z., Chen, X., Dai, K., Li, P., & Chen, R. (2019). NutBaaS: A Blockchain-as-a-Service Platform. IEEE Access, 7, 134422–134433.
Abuaddous, H. Y., Al Sokkar, A. A. M., & Abualodous, B. I. (2018). The impact of knowledge management on organizational performance. International Journal of Advanced Computer Science and Applications, 9(4).
Abualigah, L., Gandomi, A. H., Elaziz, M. A., Hamad, H. Al, Omari, M., Alshinwan, M., & Khasawneh, A. M. (2021). Advances in meta-heuristic optimization algorithms in big data text clustering. Electronics, 10(2), 101.
Abualigah, L., Shehab, M., Alshinwan, M., & Alabool, H. (2020). Salp swarm algorithm: a comprehensive survey. Neural Computing and Applications, 32(15), 11195–11215.
Abualigah, L., Shehab, M., Alshinwan, M., Alabool, H., Abuaddous, H. Y., Khasawneh, A. M., & Al Diabat, M. (2020). Ts-gwo: Iot tasks scheduling in cloud computing using grey wolf optimizer. In Swarm intelligence for cloud computing (pp. 127–152). Chapman and Hall/CRC.
AL-Sous, N., Alsokkar, A., Majali, T., Mansour, A., Alsherideh, A., Masadeh, R., Dahali, Z., & others. (2022). Antecedents of e-commerce on intention to use the international trade center: An Exploratory Study in Jordan. International Journal of Data and Network Science, 6(4), 1531–1542.
Al Shinwan, M., Abualigah, L., Huy, T.-D., Younes Shdefat, A., Altalhi, M., Kim, C., El-Sappagh, S., Abd Elaziz, M., & Kwak, K. S. (2022). An Efficient 5G Data Plan Approach Based on Partially Distributed Mobility Architecture. Sensors, 22(1), 349.
Al Shinwan, M., Abualigah, L., Le, N. D., Kim, C., & Khasawneh, A. M. (2021). An intelligent long-lived TCP based on real-time traffic regulation. Multimedia Tools and Applications, 80(11), 16763–16780.
Alias, J. S., Manasa, M., Pallavi Krishna, B. R., & Asha Rani, M. (2018). Security System for Cloud Based Services. 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics, 132.
Alibab Cloud Blockchain as a Service. (2020). http://docs-aliyun.cn-hangzhou.oss.aliyun-inc.com/pdf/baas-product_intro-intl-en-2020-04-28.pdf
Alsokkar, A., Law, E., Almajali, D., & Alshinwan, M. (2023). The effect of multimodality on customers’ decision-making and experiencing: A comparative study. International Journal of Data and Network Science, 7(1), 1–14.
Altamimi, A., Al-Bashayreh, M., AL-Oudat, M., & Almajali, D. (2022). Blockchain technology adoption for sustainable learning. International Journal of Data and Network Science, 6(3), 983–994.
AWS blockchain platform. (2020). https://aws.amazon.com/blockchain/templates/
AWS Blockchain Templates. (2020). https://docs.aws.amazon.com/blockchain-templates/latest/developerguide/blockchain-templates-dg.pdf#what-are-blockchain-templates
Azure Blockchain Service security. (2020). https://docs.microsoft.com/en-us/azure/blockchain/service/data-security
Baliga, A. (2017). Understanding blockchain consensus models. Persistent, 4, 1–14.
Blockchain and the Internet of Things: the IoT blockchain picture. (2018). https://www.iscoop.eu/blockchain-distributed-ledger-technology/blockchain-iot/
Chandrasekaran, K. (2014). Essentials of cloud computing. CrC Press.
Coutinho, E. F., Paulo, D. E., Abreu, A. W., & Carla, I. M. B. (2020). Towards Cloud Computing and Blockchain Integrated Applications. 2020 IEEE International Conference on Software Architecture Companion (ICSA-C), 139–142.
Decentralized financial system CREDITS. (2018). White Paper. http://195.58.33.24:8080/Content/Docs/TechnicalWhitePaperCREDITSEng.pdf
Dillon, T., Wu, C., & Chang, E. (2010). Cloud computing: issues and challenges. 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 27–33.
Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2017). Blockchain-based database to ensure data integrity in cloud computing environments.
Haber, S., & Stornetta, W. S. (1990). How to time-stamp a digital document. Conference on the Theory and Application of Cryptography, 437–455.
Harshavardhan, A., Vijayakumar, T., & Mugunthan, S. R. (2018). Blockchain Technology in Cloud Computing to Overcome Security Vulnerabilities. 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2018 2nd International Conference On, 408–414.
IBM Blockchain Platform. (2020). https://www.ibm.com/blockchain/platform
Ingole, M. K. R., & Yamde, M. S. (2018). Blockchain Technology in Cloud Computing: A Systematic Review.
Ismail, L., Hameed, H., AlShamsi, M., AlHammadi, M., & AlDhanhani, N. (2019). Towards a blockchain deployment at uae university: Performance evaluation and blockchain taxonomy. Proceedings of the 2019 International Conference on Blockchain Technology, 30–38.
Jimi, S. (2018). Blockchain: How Mining Works and Transactions are Processed in Seven Steps.
Khan, A. A., Shaikh, Z. A., Baitenova, L., Mutaliyeva, L., Moiseev, N., Mikhaylov, A., Laghari, A. A., Idris, S. A., & Alshazly, H. (2021). QoS-ledger: smart contracts and metaheuristic for secure quality-of-service and cost-efficient scheduling of medical-data processing. Electronics, 10(24), 3083.
KSI Blockchain Technology. (2018). https://guardtime.com/technology/ksitechnology
Kuebler, R. G. (2018). Application of Blockchain for Authentication, Verification of Identity and Cloud Computing. Utica College.
Leelavimolsilp, T., Tran-Thanh, L., & Stein, S. (2018). On the preliminary investigation of selfish mining strategy with multiple selfish miners. ArXiv Preprint ArXiv:1802.02218.
Lin, I.-C., & Liao, T.-C. (2017). A survey of blockchain security issues and challenges. IJ Network Security, 19(5), 653–659.
Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., & Leaf, D. (2011). NIST cloud computing reference architecture. NIST Special Publication, 500(2011), 1–28.
Lokhandwala, F. A. (2018). A Heuristic Approach to Improve Task Scheduling in Cloud Computing using Blockchain technology. Dublin, National College of Ireland.
Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., & Saxena, P. (2016). A secure sharding protocol for open blockchains. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 17–30.
Lynch, N. A., Fischer, M. J., & Fowler, R. (1982). A Simple and Efficient Byzantine Generals Algorithm.
Macdonald, M., Liu-Thorrold, L., & Julien, R. (2017). The blockchain: A comparison of platforms and their uses beyond bitcoin. COMS4507-Adv. Computer and Network Security.
Macrinici, D., Cartofeanu, C., & Gao, S. (2018). Smart contract applications within blockchain technology: A systematic mapping study. Telematics and Informatics, 35(8), 2337–2354.
Mashal, I., Alsaryrah, O., Chung, T.-Y., Yang, C.-Z., Kuo, W.-H., & Agrawal, D. P. (2015). Choices for interaction with things on Internet and underlying issues. Ad Hoc Networks, 28, 68–90.
Merkle, R. C. (1987). A digital signature based on a conventional encryption function. Conference on the Theory and Application of Cryptographic Techniques, 369–378.
Nakamoto, S., & Bitcoin, A. (2008). A peer-to-peer electronic cash system. Bitcoin.--URL: Https://Bitcoin. Org/Bitcoin. Pdf.
Novotny, P., Zhang, Q., Hull, R., Baset, S., Laredo, J., Vaculin, R., Ford, D. L., & Dillenberger, D. N. (2018). Permissioned blockchain technologies for academic publishing. Information Services \& Use, 38(3), 159–171.
Oracle Autonomous Blockchain Cloud Service. (2020). https://www.oracle.com/a/ocom/docs/blockchain-cloud-service-data-sheet.pdf
Park, J. H., & Park, J. H. (2017). Blockchain security in cloud computing: Use cases, challenges, and solutions. Symmetry, 9(8), 164.
Pen, L. Z., Xian Xian, K., Yew, C. F., Hau, O. S., Sumari, P., Abualigah, L., Ezugwu, A. E., Shinwan, M. Al, Gul, F., & Mughaid, A. (2023). Artocarpus Classification Technique Using Deep Learning Based Convolutional Neural Network. In Classification Applications with Deep Learning and Machine Learning Technologies (pp. 1–21). Springer, Cham.
Prianga, S., Sagana, R., & Sharon, E. (2018). Evolutionary Survey On Data Security In Cloud Computing Using Blockchain. 2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA), 1–6.
Qutqut, M. H., Al-Sakran, A., Almasalha, F., & Hassanein, H. S. (2018). Comprehensive survey of the IoT open-source OSs. IET Wireless Sensor Systems, 8(6), 323–339.
Raul, A., Kalyanaraman, S., Yerande, K., & Devadkar, K. (2019). Blockchain Technology for Decentralized Data Storage on P2P Network. In Soft Computing and Signal Processing (pp. 101–110). Springer.
Revanesh, M., & Sridhar, V. (2021). A trusted distributed routing scheme for wireless sensor networks using blockchain and meta-heuristics-based deep learning technique. Transactions on Emerging Telecommunications Technologies, 32(9), e4259.
Reyna, A., Martín, C., Chen, J., Soler, E., & Díaz, M. (2018). On blockchain and its integration with IoT. Challenges and opportunities. Future generation computer systems, 88, 173-190.
Saad, M., Spaulding, J., Njilla, L., Kamhoua, C., Shetty, S., Nyang, D., & Mohaisen, A. (2019). Exploring the attack surface of blockchain: A systematic overview. ArXiv Preprint ArXiv:1904.03487.
Sanghi, N., Bhatnagar, R., Kaur, G., & Jain, V. (2018). BlockCloud: Blockchain with Cloud Computing. 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 430–434.
Schiavo, F. P., Sassone, V., Nicoletti, L., & Margheri, A. (2016). Faas: Federation-as-a-service. ArXiv Preprint ArXiv:1612.03937.
Sharma, S. G., Ahuja, L., & Goyal, D. P. (2018). Building secure infrastructure for cloud computing using blockchain. 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), 1985–1988.
Shehab, M., Abualigah, L., Al Hamad, H., Alabool, H., Alshinwan, M., & Khasawneh, A. M. (2020). Moth--flame optimization algorithm: variants and applications. Neural Computing and Applications, 32(14), 9859–9884.
Syafruddin, W. A., Dadkhah, S., & Köppen, M. (2019). Blockchain scheme based on evolutionary proof of work. 2019 IEEE Congress on Evolutionary Computation (CEC), 771–776.
Taneja, A. (2018). In blockchain we trust? Testing the promise of blockchain as a means of identity management against the challenges raised by Aadhaar.
Tran, A. B., Xu, X., Weber, I., Staples, M., & Rimba, P. (2017). Regerator: a Registry Generator for Blockchain. CAiSE-Forum-DC, 81–88.
Treleaven, P., Brown, R. G., & Yang, D. (2017). Blockchain technology in finance. Computer, 50(9), 14–17.
Tsai, W.-T., Blower, R., Zhu, Y., & Yu, L. (2016). A system view of financial blockchains. 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE), 450–457.
Uriarte, R. B., & DeNicola, R. (2018). Blockchain-Based Decentralized Cloud/Fog Solutions: Challenges, Opportunities, and Standards. IEEE Communications Standards Magazine, 2(3), 22–28.
Vacca, J. R. (2016). Cloud computing security: foundations and challenges. CRC Press.
Van Mölken, R. (2018). Blockchain across Oracle: Understand the details and implications of the Blockchain for Oracle developers and customers. Packt Publishing Ltd.
What is Azure Blockchain Service? (2020). https://docs.microsoft.com/en-us/azure/blockchain/service/overview#publish-blockchain-data
Wood, G., (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151(2014), 1–32.
Xie, S., Zheng, Z., Chen, W., Wu, J., Dai, H.-N., & Imran, M. (2020). Blockchain for cloud exchange: A survey. Computers \& Electrical Engineering, 81, 106526.
Zheng, W., Zheng, Z., Chen, X., Dai, K., Li, P., & Chen, R. (2019). NutBaaS: A Blockchain-as-a-Service Platform. IEEE Access, 7, 134422–134433.