{"id":"https://openalex.org/W4391250754","doi":"https://doi.org/10.1109/ic3i59117.2023.10397883","title":"Enhancing Trust and Privacy in Edge and Cloud Computing Through Blockchain Technology","display_name":"Enhancing Trust and Privacy in Edge and Cloud Computing Through Blockchain Technology","publication_year":2023,"publication_date":"2023-09-14","ids":{"openalex":"https://openalex.org/W4391250754","doi":"https://doi.org/10.1109/ic3i59117.2023.10397883"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i59117.2023.10397883","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i59117.2023.10397883","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066637194","display_name":"Manish Shashi","orcid":"https://orcid.org/0000-0003-0164-5073"},"institutions":[{"id":"https://openalex.org/I80046288","display_name":"Walden University","ror":"https://ror.org/02qp2hh41","country_code":"US","type":"education","lineage":["https://openalex.org/I80046288"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Manish Shashi","raw_affiliation_strings":["Supply Chain Leader and Researcher, Walden University,MN,USA","Supply Chain Leader and Researcher, Walden University, MN, USA"],"affiliations":[{"raw_affiliation_string":"Supply Chain Leader and Researcher, Walden University,MN,USA","institution_ids":["https://openalex.org/I80046288"]},{"raw_affiliation_string":"Supply Chain Leader and Researcher, Walden University, MN, USA","institution_ids":["https://openalex.org/I80046288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102891160","display_name":"Amit Saxena","orcid":"https://orcid.org/0000-0003-1785-7708"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Amit Saxena","raw_affiliation_strings":["University of Technology,Jaipur","University of Technology, Jaipur"],"affiliations":[{"raw_affiliation_string":"University of Technology,Jaipur","institution_ids":[]},{"raw_affiliation_string":"University of Technology, Jaipur","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088898694","display_name":"Dipesh Vaya","orcid":"https://orcid.org/0000-0003-2498-4828"},"institutions":[{"id":"https://openalex.org/I94511900","display_name":"Sir Padampat Singhania University","ror":"https://ror.org/03mhsvf98","country_code":"IN","type":"education","lineage":["https://openalex.org/I94511900"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dipesh Vaya","raw_affiliation_strings":["Sir Padampat Singhania University,Udaipur","Sir Padampat Singhania University, Udaipur"],"affiliations":[{"raw_affiliation_string":"Sir Padampat Singhania University,Udaipur","institution_ids":["https://openalex.org/I94511900"]},{"raw_affiliation_string":"Sir Padampat Singhania University, Udaipur","institution_ids":["https://openalex.org/I94511900"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009805746","display_name":"N. Rajesh Pillai","orcid":null},"institutions":[{"id":"https://openalex.org/I177463362","display_name":"University of West London","ror":"https://ror.org/03e5mzp60","country_code":"GB","type":"education","lineage":["https://openalex.org/I177463362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Neetu Pillai","raw_affiliation_strings":["Lecture University of West London,UAE","Lecture University of West London, UAE"],"affiliations":[{"raw_affiliation_string":"Lecture University of West London,UAE","institution_ids":["https://openalex.org/I177463362"]},{"raw_affiliation_string":"Lecture University of West London, UAE","institution_ids":["https://openalex.org/I177463362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068818102","display_name":"Sunil S. Chavan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sunil S. Chavan","raw_affiliation_strings":["Smt. Indira Gandhi College of Engineering,Ghansoli Navi Mumbai,Maharashtra,India","Smt. Indira Gandhi College of Engineering, Ghansoli Navi Mumbai, Maharashtra, India"],"affiliations":[{"raw_affiliation_string":"Smt. Indira Gandhi College of Engineering,Ghansoli Navi Mumbai,Maharashtra,India","institution_ids":[]},{"raw_affiliation_string":"Smt. Indira Gandhi College of Engineering, Ghansoli Navi Mumbai, Maharashtra, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114174349","display_name":"C. Balarama Krishna","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"C. Balarama Krishna","raw_affiliation_strings":["School of Science SR University,Warangal,Telangana,India","School of Science SR University, Warangal, Telangana, India"],"affiliations":[{"raw_affiliation_string":"School of Science SR University,Warangal,Telangana,India","institution_ids":[]},{"raw_affiliation_string":"School of Science SR University, Warangal, Telangana, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5066637194"],"corresponding_institution_ids":["https://openalex.org/I80046288"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34460678,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":null,"first_page":"1812","last_page":"1816"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7834131717681885},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7815723419189453},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7616195678710938},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7016438245773315},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6999252438545227},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.6332510113716125},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5371142029762268},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5100508332252502},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5007760524749756},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4980175495147705},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.46643757820129395},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44258710741996765},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.42925482988357544},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.4268590807914734},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4164980947971344},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20741671323776245},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10148561000823975}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7834131717681885},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7815723419189453},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7616195678710938},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7016438245773315},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6999252438545227},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.6332510113716125},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5371142029762268},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5100508332252502},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5007760524749756},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4980175495147705},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.46643757820129395},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44258710741996765},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.42925482988357544},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.4268590807914734},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4164980947971344},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20741671323776245},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10148561000823975},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i59117.2023.10397883","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i59117.2023.10397883","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2755096749","https://openalex.org/W2766401293","https://openalex.org/W2803371618","https://openalex.org/W2891713004","https://openalex.org/W2898082692","https://openalex.org/W2920581164","https://openalex.org/W2942094488","https://openalex.org/W2954123346","https://openalex.org/W2998841584","https://openalex.org/W3010556515","https://openalex.org/W3083365377","https://openalex.org/W3131963651","https://openalex.org/W6790958333"],"related_works":["https://openalex.org/W2372678089","https://openalex.org/W2695299078","https://openalex.org/W2355956995","https://openalex.org/W2390768934","https://openalex.org/W2350048275","https://openalex.org/W2086874776","https://openalex.org/W2168345601","https://openalex.org/W2028268185","https://openalex.org/W2377235694","https://openalex.org/W2001281341"],"abstract_inverted_index":{"Edge":[0],"and":[1,18,27,35,62,106,120,124,163,202,212],"cloud":[2,164],"computing":[3,165],"environment":[4],"is":[5,85,179,191,210],"currently":[6],"employed":[7],"in":[8,92,122,135,161,217],"a":[9,53,141,150,158],"variety":[10],"of":[11,48,50,97,149,157],"fields,":[12],"yet":[13,187],"despite":[14],"their":[15],"growing":[16],"prominence":[17],"advantages,":[19],"it":[20,178],"faces":[21],"certain":[22],"difficulties,":[23],"including":[24],"data":[25,36,118],"privacy":[26,119],"trust.":[28],"Intruder":[29],"assaults":[30],"ought":[31,38],"to":[32,39,42,56,73,77,104,116,133,174,182],"be":[33,40,67,74,114],"avoided,":[34],"storage":[37,123],"restricted":[41],"authorized":[43],"individuals":[44],"only.":[45],"The":[46,198],"majority":[47],"methods":[49],"authentication":[51],"use":[52],"trusted":[54,71,90,152],"group":[55,72,153],"go":[57],"through":[58,154],"the":[59,70,82,101,129,147,155,176,188,196,207,218],"procedure.":[60],"Consumers":[61],"computer":[63],"systems":[64],"must":[65],"both":[66],"enrolled":[68],"with":[69,108],"granted":[75],"authorization":[76,189],"authenticate":[78],"other":[79],"individuals.":[80],"Because":[81],"whole":[83,102],"framework":[84,160],"dependent":[86],"on":[87],"just":[88],"one":[89,95],"group,":[91],"this":[93,138],"case,":[94],"point":[96],"collapse":[98],"may":[99],"trigger":[100],"structure":[103],"malfunction,":[105],"problems":[107,130],"scalability":[109],"exist.":[110],"Blockchain":[111],"innovation":[112],"can":[113],"used":[115],"ensure":[117],"trust":[121],"trading":[125],"procedures.":[126],"To":[127],"tackle":[128],"that":[131,144,206,215],"continue":[132],"arise":[134],"current":[136],"platforms,":[137],"work":[139],"discusses":[140],"decentralized":[142],"method":[143],"involves":[145],"removing":[146],"idea":[148],"single":[151],"implementation":[156],"blockchain":[159],"edge":[162],"where":[166],"any":[167],"moment":[168],"an":[169],"individual":[170],"or":[171],"server":[172],"desires":[173],"access":[175],"framework,":[177],"not":[180],"required":[181],"enter":[183],"itself":[184],"by":[185],"hand,":[186],"procedure":[190],"executed":[192],"out":[193],"autonomously":[194],"during":[195],"framework.":[197],"findings":[199],"from":[200],"experiments":[201],"performance":[203],"examination":[204],"show":[205],"suggested":[208],"design":[209],"advantageous":[211],"surpasses":[213],"those":[214],"exist":[216],"relevant":[219],"field.":[220]},"counts_by_year":[],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
