2020
DOI: 10.1007/978-3-030-59016-1_45
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Similar solutions may be found in fog computing [77], edge computing [78], and 5G, 6G networks [79], [80]. Viewing the blockchain as a trusted ledger that records all service attributes, a blockchain-based service recommendation system [81] and an auditing solution to protect 5G consumer data [82] are prominent.…”
Section: A Service-level Agreementsmentioning
confidence: 88%
“…Similar solutions may be found in fog computing [77], edge computing [78], and 5G, 6G networks [79], [80]. Viewing the blockchain as a trusted ledger that records all service attributes, a blockchain-based service recommendation system [81] and an auditing solution to protect 5G consumer data [82] are prominent.…”
Section: A Service-level Agreementsmentioning
confidence: 88%
“…The authors in Ref. [56] proposed a blockchain based privacy preserved network slicing SLA audit scheme, aiming to preserve data privacy and integrity. Conventional SLA audit process faces threats of data leakage and alterations in the audit report.…”
Section: Dlt Powered Network Slicing In Verticalsmentioning
confidence: 99%
“…Realize SLA trust automation management [60], [64], [68], [69], [70] Authenticity Control the access to network slices [66] Availability Resist DoS attacks [67] Trust Establish trust relationship between multiple [60], [62], [63], [65], [68], [69] Privacy Ensure privacy between network slices [67], [56] nect with the network slice. The authors in Ref.…”
Section: Integritymentioning
confidence: 99%