ArticlePDF Available

A Novel Approach for Cloud Exchanger Problem Using Blockchain Based Solution

Authors:

Abstract

Modern industry is shifting toward innovative solutions from old web-based solutions. IoT, big data analytics, Blockchain and cloud computing are technologies that change industries decorum. Since IoT devices have a shortfall of computational and electric power, they need to help with other technologies. Cloud computing provides its services not only for high computing power devices but also for pervasive devices of IoT. Since many cloud service providers exist in the market, there need to decide which cloud service provider service is needed. Cloud Exchange is a novel approach that helps industries choose exemplary cloud services for their needs. Cloud Exchange and its benefits also suffer from potential challenges such as security, decision making capability and many more. This research proposed a novel solution to cloud exchange panics. This research will present blockchain technology as a solution for cloud exchange potential problems.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
m@International Research Journal of Modernization in Engineering, Technology
and Science
[1]
A Novel Approach for Cloud Exchanger Problem Using Blockchain Based
Solution
Mr. Gopala Krishna Sriram*1
*1 Software Architect, EdgeSoft Corp, McKinney, TX USA
ABSTRACT
Modern industry is shifting toward innovative solutions from old web-based solutions. IoT, big data analytics,
Blockchain and cloud computing are technologies that change industries decorum. Since IoT devices have a
shortfall of computational and electric power, they need to help with other technologies. Cloud computing
provides its services not only for high computing power devices but also for pervasive devices of IoT. Since many
cloud service providers exist in the market, there need to decide which cloud service provider service is needed.
Cloud Exchange is a novel approach that helps industries choose exemplary cloud services for their needs. Cloud
Exchange and its benefits also suffer from potential challenges such as security, decision making capability and
many more. This research proposed a novel solution to cloud exchange panics. This research will present
blockchain technology as a solution for cloud exchange potential problems.
Keywords: Cloud computing, Cloud Computing security, cloud computing security threats, cloud
computing security challenges., Etc.
I. Introduction
The modern industry paradigm has shifted from conventional web-based circumstances to new solutions
such as IoT, big data analytics and blockchain technology. Industry IoT (IIOT) has gained the most popular
among other technologies. IIOT infrastructure consists of many pervasive devices such as sensors, actuators
and other embedded devices. Pervasive devices have battery dependencies, a lack of computational
capability, and other limitations. IIOT leverage other cloud computing and fog computing services to
overcome those limitations[1]. Cloud computing has gained the most industry attention because of its
specific benefits. According to a survey, the cloud computing industry will acquire up to 300 dollars by
2021[2].In Cloud Computing, there are many computer system resources, computing power, data storage
available on-demand to many users. Generally, over the Network provides services using hardware and
software called Cloud computing. With Cloud Computing, users use applications and can access files via any
device to access the Internet[3]. Different Cloud services providers by which people purchase the cloud
services. Those different Cloud service providers have their cloud marketplaces [4]. Therefore the consumers
have to struggle to find cost-effective and appropriate cloud services. In the interim, the single service
providers can not accomplish or satisfy the deploying demands of cloud services for any company over the
world[5].
Then the Idea of Cloud Exchange(Cloud EX) is the Solution of single cloud services provision [2]. The Cloud
Exchange facilitates the process of provisioning and making connections with different cloud services rather
load on the consumer. The results of the centralized platform of Cloud Exchange removed several
complications such as vulnerability, dishonest cloud providers and Transection disagreement between the
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[2]
service provider and consumer. In this situation, a Block chain was introduced to solve the problems of
conventional exchange platforms. The term Blockchain contains several blocks in a sequence in which every
block holds a proper list of records. Blockchain is separate itself from others with its unique properties or
characteristics such as Decentralized, Fraud free, Immutable, Secure, Auditability and User anonymity[2].
Fig 1: Cloud Exchange model
II. Problem statement
Cloud Exchange provides several benefits to its customers. Since cloud exchange technology is at the armature
stage, it faces numerous challenges. In this section, we will diagnose different challenges of Cloud Exchange.
There are different challenges of Cloud Exchange as follows that Blockchain overcame:
Less security and privacy:
Confidentiality in its core refers to the fact that data and services should only be available to the right
authorized person [6]. Confidentiality is essential for the cloud computing environment since organizations
store their data on cloud servers based on their trust in the service provider. Cloud servers need to make
organizations information confidential from sources other than data owners. Confidentiality needs to be
guaranteed throughout the life cycle of cloud data from data generation to transition and from storage to
destruction.
Reputation systems problem:
Reputation systems are used between parties to trust each other to make Transactions with a higher score. But
different problems take place through this
Self-promoting attack:
A person or organization can use this type of attack to make a bad score and give wrong feedback. Attackers can
intrigue together to make feedback.
Whitewashing attack:
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[3]
This malicious can profit through false reputation to reach the underlying cloud exchange. After the attack, the
attacker comes with their new identity. Anonymous is an example of this attack.
Slandering attack:
It comes with affecting other reputations and making false feedback about them.
Transaction discussion and problems:
During a transaction, if some problem occurs, it is difficult to find out whom to blame, first user, second user, or
third party. The negotiation between users, third party and service providers occur called service level
agreement. So, in case of violation of data or funds, they do not know whom to blame.
As shown in the figures above, the users who send their data to cloud servers need to ensure that their data is not
being seen or used by any unauthorized party.
III. Methodology
The problem discussed above that are in the Cloud Exchange platform, here Block chain provide Solution for
those complications or as follows:
For security and privacy purposes, bit AV is an anti-malware environment, presented so that decentralization
can be made to update and maintain. This protocol gathers data from the user's mobile, and a key is used on
Blockchain so that data can be used when it is authorized.
A scheme connects bitcoin payments and its service for recovering attacks, and three outputs are used. One is
for change, the other is for service providers, and the last is with zero services. Using this reputation can be
easily calculated not to have any tarnished reputation.
Each blockchain node has a full copy of it, and service is only provided to the trusted middleman—furthermore,
Blockchain helps prevent tampering of data. Sampling is used, and hypotheses are made based on blockchain
technology.
IV. Conclusion
Cloud exchange is an emerging technology that helps industries make decisions about cloud services. Along
with its numerous benefits, Cloud Exchange also suffers from several challenges. This paper presents a novel
approach for the Cloud Exchange problem using blockchain technology. Blockchain provides decentralization
solutions for cloud exchanges. There is no need for a third party for services. We use decentralized consensus
protocol with Blockchain technology, providing a Cloud Exchange platform that reduces leakage risks and
viruses. We believe that our proposed Solution will become a milestone in the life of Cloud Exchange. Still, much
work is needed to improve the paradigm of Blockchain and Cloud Exchange.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[4]
V. REFERENCES
X
   !"#$
$%&%'()
' *++#,-.,/012%""$"/3"#4/5
Computers & Electrical Engineering, 56()7')'('(
8 2  1  2/      /%    /    -/  -%/&#  &#     ICT and Crical
Infrastructure: Proceedings of the 48th Annual Convenon of Computer Society of India-Vol I '(94
#)(70)'
9 :; <"#-/-%/&#4/-#Turkish Journal of Computer
and Mathemacs Educaon (TURCOMAT), 5''8(==08(69'('
7 20-/-%/&#0!%0 5>- '((=
7)07= ?4@@///@//@ A
$/"B CD"EB=)98()DFEB=)98>""
) ,%1#-/-%/&#4"/!</'((
... These security methods are also sometimes overhead in the development process. DevSecOps security experts should adopt agile and fast-paced security techniques so that they do not hinder existing DevOps operations [34]. ...
Article
DevOps revolutionize the software development lifecycle by providing agile and fast-paced solutions. DevOps ignores security prospects since it focuses only on increasing development and speed. DevSecOp is a notion of implanting Security into DevOps operation without distressing its agile nature by discovering contemporary security practices. This research aims to reveal a comprehensive overview of DevSecOp. Here we presented a brief overview of the research methodology. Afterward, it presented the method of gathering the required information. This research paper is distributed in the following section. Section II presented the research methodology, while section III provided results from this study. In the end, we conclude our research In this study, we discover essential DevSecOp concepts, leverages of DevSecOp, and potential research challenges in implementing it. We used a Multivocal literature review to explore the aforementioned subjects. For this Multivocal literature review, we searched grey data and, after processed that data, found answers to our research questions. This review concluded that DevSecOp, although challenging to implement, can be a constructive addition to the DevOps paradigm. DevSecOp is a relatively new concept that is not even fully concise in its name and definition. The key idea of DevSecOp is to implant security into DevOps procedures to make them more secure. We presented MLR on DevSecOp, keeping in mind pre-designed research questions. Since DevSecOp is not as popular and does not contain enough academic literature, we had to include grey data for our literature review. This MLR concluded that DevSecOp is mainly defined as integrating Security into DevOps
... An XML document can be modeled as an ordered labeled tree [2]. There is considerable previous works on finding edit distances between trees [3][4][5][6][7][8][9][10][11]. Most algorithms in this category are direct descendants of the dynamic programming techniques for finding the edit distance between strings [12]. ...
Conference Paper
Full-text available
XML documents on the web are often found without DTDs, particularly when these documents have been created from legacy HTML. Yet having knowledge of the DTD can be valuable in querying and manipulating such documents. Recent work (cf. [1]) has given us a means to (re-)construct a DTD to describe the structure common to given set of document instances. However, given a collection of documents with unknown DTDs, it may not be appropriate to construct a single DTD to describe every document in the collection. Instead, we would wish to partition the collection into smaller sets of "similar" documents, and then induce a separate DTD for each such set. It is this partitioning problem that we address in this paper. Given two XML documents, how can one measure structural (DTD) similarity between the two? We develop a dynamic programming algorithm to find this distance for any pair of documents. We validate our proposed distance measure experimentally. Given a collection of documents derived from multiple DTDs, we can compute pair-wise distances between documents in the collection, and then use these distances to cluster the documents.
... Valiant defines cognitive computing as a linkage of cognitive psychology, neurobiology and artificial intelligence [1]. Braisel et al says that cognitive computing is a technology stimulated by human nerves system, human reasoning and decision making capabilities [2]. According to Preiessl, cognitive computing is the pursuit for resembling human brain functions that have low power and small in volume [3]. ...
Article
Full-text available
Cognitive computing presents a computational model on the base of the human brain particularly it's neurobiological functioning. The cognitive computing model aims to provide computers with ability of thinking, know and feel abilities. This research will reveal different aspects of cognitive computing from its definition to its applications in different fields. Furthermore, this research will classify cognitive computing by current research areas.
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
Conference Paper
Waste control is a primary problem that the sector faces, irrespective of whether or not a rustic is advanced or developing. The essential trouble with trash control is that garbage boxes in public locations overflow nicely earlier than the following cleansing operation begins. It then reasons distinct risks to that location, which includes unsightly odour and ugliness, which can be the basis motive of the unfold of many diseases. This attempt is primarily based totally on a clever waste machine to keep away from any doubtlessly risky eventualities and to make certain public cleanliness and health. This system is facilitated via way of means of an ultrasonic sensor this is related to an Arduino UNO and assessments the extent of waste withinside the dustbin earlier than sending an alert to the municipal internet server. With the usage of an RFID Tag, the motive force recognizes the paintings of discarding the garbage after cleansing the dustbin. RFID is a computing generation this is used for verification and, in addition, it improves the clever rubbish alert machine via way of means of routinely figuring out garbage stuffed withinside the dustbin and sending the popularity of clean-as much as the server, confirming that the paintings has been completed. An embedded module with RFID and IoT facilitation underpins the whole operation. An Android utility is advanced and connected to an internet server to ship warnings from the microcontroller to the town workplace and to carry out far flung tracking of the cleansing system done via way of means of the workers, putting off the guide tracking and verification procedure. The concept got here to us while we observed that the rubbish truck used to run across the metropolis two times an afternoon gathering strong waste. Although this method changed into comprehensive, it changed into inefficient. Let's say road A is a hectic road, and we note that the garbage bin fills up quickly, while road B's bin isn't always even 1/2 of complete after days. This instance is primarily based totally on real-existence events, which brought about the "Eureka" moment!
ResearchGate has not been able to resolve any references for this publication.