2017 IEEE International Symposium on Parallel and Distributed Processing With Applications and 2017 IEEE International Conferen 2017
DOI: 10.1109/ispa/iucc.2017.00024
|View full text |Cite
|
Sign up to set email alerts
|

Cssp: The Consortium Blockchain Model for Improving the Trustworthiness of Network Software Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…In the cloud computing department, the authors Zhou et al proposed a Clean-room Security Service Protocol based on a consortium blockchain that monitors the implementation of illegal software on the user's end in a cloud computing setting. The authors claim that their protocol reduces the security threats of the network and has major potential in trusted network computing systems [29]. Next on, the authors Sharma et al proposed a blockchain-overcloud solution designed for cloud service operators so they can share their computing resources through smart contracts implementation [30].…”
Section: A Blockchain and Network Architecturementioning
confidence: 99%
“…In the cloud computing department, the authors Zhou et al proposed a Clean-room Security Service Protocol based on a consortium blockchain that monitors the implementation of illegal software on the user's end in a cloud computing setting. The authors claim that their protocol reduces the security threats of the network and has major potential in trusted network computing systems [29]. Next on, the authors Sharma et al proposed a blockchain-overcloud solution designed for cloud service operators so they can share their computing resources through smart contracts implementation [30].…”
Section: A Blockchain and Network Architecturementioning
confidence: 99%
“…Obviously, an untrusted computing environment cannot ensure a safe transaction. To deploy and use software in a secure and tamper-resistant manner, Zhou et al [73] proposed a Cleanroom Security Service Protocol (CSSP), which is actually a bilateral agreement based on a consortium blockchain framework, show in Fig. 8.…”
Section: Blockchain-based Cloud Transactionsmentioning
confidence: 99%
“…However, it depends on users' own subjective judgment to decide whether the obtained services are secure or not, thereby causing many subjective controversies. Zhou et al [24] proposed a protocol named CSSP (cleanroom security service protocol) based on the consortium blockchain to provide network software services. Instead of using the PoW algorithm, it uses an arbitration node to mediate and record transactions which saves a lot in mining.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, the rise of blockchain technologies [18,19] inspires researchers for brand new solutions. With the excellent features of openness, decentralization, and tamper resistance, the blockchain techniques have been used as the underlying security fabric for a bunch of emerging service provisioning and sharing systems [20][21][22][23][24][25][26][27][28][29]. These approaches leverage the blockchain to release service information so as to ensure that the clients can obtain services correctly.…”
Section: Introductionmentioning
confidence: 99%