2021
DOI: 10.1007/978-3-030-70501-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Computing in Blockchain Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 45 publications
0
7
0
Order By: Relevance
“…Individual resources are split into shards and allocated (with replication to ensure availability) to different nodes in such systems. In some related research [1][2][3][4], blockchain is shown to be a secure and distributed ledger that can assist in overcoming many of the difficulties associated with centralization. However, their main goal was to provide insights into the use of security services for current applications, highlight the innovative techniques currently used to offer numerous benefits, describe their challenges, and discuss how blockchain technology can resolve them.…”
Section: Cloud Computing and Blockchain Technology Backgroundmentioning
confidence: 99%
See 4 more Smart Citations
“…Individual resources are split into shards and allocated (with replication to ensure availability) to different nodes in such systems. In some related research [1][2][3][4], blockchain is shown to be a secure and distributed ledger that can assist in overcoming many of the difficulties associated with centralization. However, their main goal was to provide insights into the use of security services for current applications, highlight the innovative techniques currently used to offer numerous benefits, describe their challenges, and discuss how blockchain technology can resolve them.…”
Section: Cloud Computing and Blockchain Technology Backgroundmentioning
confidence: 99%
“…Cloud computing is costeffective, and all IT areas are migrating to it. However, the considerable development and demand for cloud computing have resulted in significant concerns about its security and privacy, defined by the rules, regulations, and technologies required to secure information, applications, and the cloud computing infrastructure [3]. Data protection, transparency, and availability are the three pillars of traditional data security.…”
Section: Cloud Computingmentioning
confidence: 99%
See 3 more Smart Citations