Analyze Cyber Attacks in Cloud Cryptography and Short Comings in Blockchain Cryptocurrency Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.5281/zenodo.5854692
Technological improvements have happened in companies digitalizing various elements of their actions. The threat landscape of cyber-attacks is rapidly changing. The possible consequence of such attacks is unknown because there is a lack of useful metrics, tools and frameworks to explain and evaluate the harm industries suffer from cyber-attacks. Cyber-attacks are not new to IoT, but as IoT will be strongly mixed in our days and communities, it is becoming important to step up and take cyber security severely. Hence, there is a real need to secure IoT, resulting in a need to comprehensively recognize the warnings and attacks on IoT infrastructure. The paper's main objective is to investigate the impact of the cyber-attacks in the common cyber framework and analyze the blockchain crypto-currency architecture to evaluate the weaknesses and safety representation. The security of cryptocurrency heavily relies on the incentive-compatible Proof of Authority (PoA) based on distributed consensus protocol; a consensus algorithm type based on the reputation of trusted parties in a blockchain network. This paper introduces Proof of Authority (PoA) based distributed consensus protocol and a novel blockchain-based decentralized federation model that embodies quality verification for cloud providers who lease computing resources from each other. Keywords: Blockchain security, Cryptocurrency, Internet of Things, Cloud service, Proof of Authority.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.5281/zenodo.5854692
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4220872294
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4220872294Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5281/zenodo.5854692Digital Object Identifier
- Title
-
Analyze Cyber Attacks in Cloud Cryptography and Short Comings in Blockchain CryptocurrencyWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-01-15Full publication date if available
- Authors
-
C.P. Ravikumar, Isha Batra, Dr Arun MalikList of authors in order
- Landing page
-
https://doi.org/10.5281/zenodo.5854692Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5281/zenodo.5854692Direct OA link when available
- Concepts
-
Blockchain, Cryptocurrency, Computer security, Computer science, Cloud computing, Cryptography, Internet privacy, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4220872294 |
|---|---|
| doi | https://doi.org/10.5281/zenodo.5854692 |
| ids.doi | https://doi.org/10.5281/zenodo.5854692 |
| ids.openalex | https://openalex.org/W4220872294 |
| fwci | 0.0 |
| type | article |
| title | Analyze Cyber Attacks in Cloud Cryptography and Short Comings in Blockchain Cryptocurrency |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10270 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.7979000210762024 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Blockchain Technology Applications and Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2779687700 |
| concepts[0].level | 2 |
| concepts[0].score | 0.9158062934875488 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q20514253 |
| concepts[0].display_name | Blockchain |
| concepts[1].id | https://openalex.org/C180706569 |
| concepts[1].level | 2 |
| concepts[1].score | 0.8587623834609985 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q13479982 |
| concepts[1].display_name | Cryptocurrency |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.7160924077033997 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.570002019405365 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C79974875 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5604105591773987 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[4].display_name | Cloud computing |
| concepts[5].id | https://openalex.org/C178489894 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5486711263656616 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[5].display_name | Cryptography |
| concepts[6].id | https://openalex.org/C108827166 |
| concepts[6].level | 1 |
| concepts[6].score | 0.37798139452934265 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q175975 |
| concepts[6].display_name | Internet privacy |
| concepts[7].id | https://openalex.org/C111919701 |
| concepts[7].level | 1 |
| concepts[7].score | 0.10563233494758606 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[7].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/blockchain |
| keywords[0].score | 0.9158062934875488 |
| keywords[0].display_name | Blockchain |
| keywords[1].id | https://openalex.org/keywords/cryptocurrency |
| keywords[1].score | 0.8587623834609985 |
| keywords[1].display_name | Cryptocurrency |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.7160924077033997 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.570002019405365 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/cloud-computing |
| keywords[4].score | 0.5604105591773987 |
| keywords[4].display_name | Cloud computing |
| keywords[5].id | https://openalex.org/keywords/cryptography |
| keywords[5].score | 0.5486711263656616 |
| keywords[5].display_name | Cryptography |
| keywords[6].id | https://openalex.org/keywords/internet-privacy |
| keywords[6].score | 0.37798139452934265 |
| keywords[6].display_name | Internet privacy |
| keywords[7].id | https://openalex.org/keywords/operating-system |
| keywords[7].score | 0.10563233494758606 |
| keywords[7].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.5281/zenodo.5854692 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400562 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[0].source.host_organization | https://openalex.org/I67311998 |
| locations[0].source.host_organization_name | European Organization for Nuclear Research |
| locations[0].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | |
| locations[0].raw_type | article-journal |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | False |
| locations[0].is_published | |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.5281/zenodo.5854692 |
| indexed_in | datacite |
| authorships[0].author.id | https://openalex.org/A5036733255 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-0809-5545 |
| authorships[0].author.display_name | C.P. Ravikumar |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I110360157 |
| authorships[0].affiliations[0].raw_affiliation_string | Computer Science and Engineering, Lovely Professional University, Punjab, India. |
| authorships[0].institutions[0].id | https://openalex.org/I110360157 |
| authorships[0].institutions[0].ror | https://ror.org/00et6q107 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I110360157 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Lovely Professional University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Ravikumar Ch |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Computer Science and Engineering, Lovely Professional University, Punjab, India. |
| authorships[1].author.id | https://openalex.org/A5006189884 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-2958-214X |
| authorships[1].author.display_name | Isha Batra |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I110360157 |
| authorships[1].affiliations[0].raw_affiliation_string | Computer Science and Engineering, Lovely Professional University, Punjab, India. |
| authorships[1].institutions[0].id | https://openalex.org/I110360157 |
| authorships[1].institutions[0].ror | https://ror.org/00et6q107 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I110360157 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Lovely Professional University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Dr. Isha Batra |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Computer Science and Engineering, Lovely Professional University, Punjab, India. |
| authorships[2].author.id | https://openalex.org/A5003925451 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Dr Arun Malik |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I110360157 |
| authorships[2].affiliations[0].raw_affiliation_string | Computer Science and Engineering, Lovely Professional University, Punjab, India. |
| authorships[2].institutions[0].id | https://openalex.org/I110360157 |
| authorships[2].institutions[0].ror | https://ror.org/00et6q107 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I110360157 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Lovely Professional University |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Dr Arun Malik |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Computer Science and Engineering, Lovely Professional University, Punjab, India. |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5281/zenodo.5854692 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Analyze Cyber Attacks in Cloud Cryptography and Short Comings in Blockchain Cryptocurrency |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10270 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.7979000210762024 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Blockchain Technology Applications and Security |
| related_works | https://openalex.org/W4210406818, https://openalex.org/W4306779889, https://openalex.org/W4386732777, https://openalex.org/W3211706803, https://openalex.org/W4382775358, https://openalex.org/W4246942721, https://openalex.org/W3209862047, https://openalex.org/W4304136894, https://openalex.org/W2989851257, https://openalex.org/W4303984095 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5281/zenodo.5854692 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400562 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| best_oa_location.source.host_organization | https://openalex.org/I67311998 |
| best_oa_location.source.host_organization_name | European Organization for Nuclear Research |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | |
| best_oa_location.raw_type | article-journal |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.5281/zenodo.5854692 |
| primary_location.id | doi:10.5281/zenodo.5854692 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400562 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| primary_location.source.host_organization | https://openalex.org/I67311998 |
| primary_location.source.host_organization_name | European Organization for Nuclear Research |
| primary_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | |
| primary_location.raw_type | article-journal |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.5281/zenodo.5854692 |
| publication_date | 2022-01-15 |
| publication_year | 2022 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 32, 83, 91, 151, 163, 178 |
| abstract_inverted_index.as | 57 |
| abstract_inverted_index.be | 60 |
| abstract_inverted_index.in | 5, 63, 90, 115, 162 |
| abstract_inverted_index.is | 18, 27, 31, 69, 82, 107 |
| abstract_inverted_index.it | 68 |
| abstract_inverted_index.of | 10, 16, 24, 34, 112, 135, 143, 159, 170, 203, 208 |
| abstract_inverted_index.on | 100, 139, 147, 156 |
| abstract_inverted_index.to | 40, 54, 72, 86, 93, 108, 126 |
| abstract_inverted_index.up | 74 |
| abstract_inverted_index.IoT | 58, 101 |
| abstract_inverted_index.The | 13, 21, 103, 133 |
| abstract_inverted_index.and | 38, 42, 66, 75, 98, 120, 130, 177 |
| abstract_inverted_index.are | 51 |
| abstract_inverted_index.but | 56 |
| abstract_inverted_index.for | 188 |
| abstract_inverted_index.new | 53 |
| abstract_inverted_index.not | 52 |
| abstract_inverted_index.our | 64 |
| abstract_inverted_index.the | 44, 96, 110, 113, 116, 122, 128, 140, 157 |
| abstract_inverted_index.who | 191 |
| abstract_inverted_index.IoT, | 55, 88 |
| abstract_inverted_index.This | 166 |
| abstract_inverted_index.days | 65 |
| abstract_inverted_index.each | 196 |
| abstract_inverted_index.from | 48, 195 |
| abstract_inverted_index.harm | 45 |
| abstract_inverted_index.have | 3 |
| abstract_inverted_index.lack | 33 |
| abstract_inverted_index.main | 105 |
| abstract_inverted_index.need | 85, 92 |
| abstract_inverted_index.real | 84 |
| abstract_inverted_index.step | 73 |
| abstract_inverted_index.such | 25 |
| abstract_inverted_index.take | 76 |
| abstract_inverted_index.that | 184 |
| abstract_inverted_index.type | 154 |
| abstract_inverted_index.will | 59 |
| abstract_inverted_index.(PoA) | 145, 172 |
| abstract_inverted_index.Cloud | 205 |
| abstract_inverted_index.Proof | 142, 169, 207 |
| abstract_inverted_index.based | 146, 155, 173 |
| abstract_inverted_index.cloud | 189 |
| abstract_inverted_index.cyber | 77, 118 |
| abstract_inverted_index.lease | 192 |
| abstract_inverted_index.mixed | 62 |
| abstract_inverted_index.model | 183 |
| abstract_inverted_index.novel | 179 |
| abstract_inverted_index.paper | 167 |
| abstract_inverted_index.their | 11 |
| abstract_inverted_index.there | 30, 81 |
| abstract_inverted_index.tools | 37 |
| abstract_inverted_index.Hence, | 80 |
| abstract_inverted_index.common | 117 |
| abstract_inverted_index.impact | 111 |
| abstract_inverted_index.relies | 138 |
| abstract_inverted_index.safety | 131 |
| abstract_inverted_index.secure | 87 |
| abstract_inverted_index.suffer | 47 |
| abstract_inverted_index.threat | 14 |
| abstract_inverted_index.useful | 35 |
| abstract_inverted_index.Things, | 204 |
| abstract_inverted_index.analyze | 121 |
| abstract_inverted_index.attacks | 26, 99 |
| abstract_inverted_index.because | 29 |
| abstract_inverted_index.explain | 41 |
| abstract_inverted_index.heavily | 137 |
| abstract_inverted_index.paper's | 104 |
| abstract_inverted_index.parties | 161 |
| abstract_inverted_index.quality | 186 |
| abstract_inverted_index.rapidly | 19 |
| abstract_inverted_index.trusted | 160 |
| abstract_inverted_index.unknown | 28 |
| abstract_inverted_index.various | 8 |
| abstract_inverted_index.Internet | 202 |
| abstract_inverted_index.actions. | 12 |
| abstract_inverted_index.becoming | 70 |
| abstract_inverted_index.elements | 9 |
| abstract_inverted_index.embodies | 185 |
| abstract_inverted_index.evaluate | 43, 127 |
| abstract_inverted_index.happened | 4 |
| abstract_inverted_index.metrics, | 36 |
| abstract_inverted_index.network. | 165 |
| abstract_inverted_index.possible | 22 |
| abstract_inverted_index.protocol | 176 |
| abstract_inverted_index.security | 78, 134 |
| abstract_inverted_index.service, | 206 |
| abstract_inverted_index.strongly | 61 |
| abstract_inverted_index.warnings | 97 |
| abstract_inverted_index.Abstract: | 0 |
| abstract_inverted_index.Authority | 144, 171 |
| abstract_inverted_index.Keywords: | 198 |
| abstract_inverted_index.algorithm | 153 |
| abstract_inverted_index.changing. | 20 |
| abstract_inverted_index.companies | 6 |
| abstract_inverted_index.computing | 193 |
| abstract_inverted_index.consensus | 149, 152, 175 |
| abstract_inverted_index.framework | 119 |
| abstract_inverted_index.important | 71 |
| abstract_inverted_index.landscape | 15 |
| abstract_inverted_index.objective | 106 |
| abstract_inverted_index.protocol; | 150 |
| abstract_inverted_index.providers | 190 |
| abstract_inverted_index.recognize | 95 |
| abstract_inverted_index.resources | 194 |
| abstract_inverted_index.resulting | 89 |
| abstract_inverted_index.security, | 200 |
| abstract_inverted_index.severely. | 79 |
| abstract_inverted_index.Authority. | 209 |
| abstract_inverted_index.Blockchain | 199 |
| abstract_inverted_index.blockchain | 123, 164 |
| abstract_inverted_index.federation | 182 |
| abstract_inverted_index.frameworks | 39 |
| abstract_inverted_index.industries | 46 |
| abstract_inverted_index.introduces | 168 |
| abstract_inverted_index.other.<br> | 197 |
| abstract_inverted_index.reputation | 158 |
| abstract_inverted_index.weaknesses | 129 |
| abstract_inverted_index.consequence | 23 |
| abstract_inverted_index.distributed | 148, 174 |
| abstract_inverted_index.investigate | 109 |
| abstract_inverted_index.architecture | 125 |
| abstract_inverted_index.communities, | 67 |
| abstract_inverted_index.digitalizing | 7 |
| abstract_inverted_index.improvements | 2 |
| abstract_inverted_index.verification | 187 |
| abstract_inverted_index.Cyber-attacks | 50 |
| abstract_inverted_index.Technological | 1 |
| abstract_inverted_index.cyber-attacks | 17, 114 |
| abstract_inverted_index.decentralized | 181 |
| abstract_inverted_index.cryptocurrency | 136 |
| abstract_inverted_index.cyber-attacks. | 49 |
| abstract_inverted_index.Cryptocurrency, | 201 |
| abstract_inverted_index.comprehensively | 94 |
| abstract_inverted_index.crypto-currency | 124 |
| abstract_inverted_index.infrastructure. | 102 |
| abstract_inverted_index.representation. | 132 |
| abstract_inverted_index.blockchain-based | 180 |
| abstract_inverted_index.incentive-compatible | 141 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.02790667 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |