Cloud Privacy Protection using BlockChain - A Comparative Analysis

Authors

  • Prof. Jenita J  Department of Computer Science, HKBK college of Engineering, Bangalore, Karnataka, India
  • Archit Gaur  Department of Computer Science, HKBK college of Engineering, Bangalore, Karnataka, India
  • Joshua William Paul  Department of Computer Science, HKBK college of Engineering, Bangalore, Karnataka, India
  • Mohammad Ahmad Usmani  Department of Computer Science, HKBK college of Engineering, Bangalore, Karnataka, India

DOI:

https://doi.org//10.32628/IJSRSET22929

Keywords:

Regional Unemployment, Labor Supply Demand, GWR Panel

Abstract

This study aims to analyze the determinants of the regional unemployment rates in West Java Province in the period 2010-2019. Due to the diversity of characteristics between regions, this study uses Geographically Weighted Panel Regression (GWPR) analysis. The results showed that all the independent variables used had a significant effect on the regional unemployment rate in West Java. It is recommended that the government encourage efforts to reduce unemployment in their regions by investing more in real sector development, attracting investors in the manufacturing and service sectors, and improving education and skills.

References

  1. Yang, Caixia & Liang, Tan & Shi, Na & Xu, Bolei & Cao, Yang & Yu, Keping. (2020). AuthPrivacyChain: A Blockchain-Based Access Control Framework With Privacy Protection in Cloud. IEEE Access. PP. 1-1. 10.1109/ACCESS.2020.2985762.
  2. J. Li, J. Wu, and L. Chen, "Block-secure: Blockchain based scheme for secure P2P cloud storage," Inf. Sci., vol. 465, pp. 219_231, Oct. 2018, doi: 10.1016/j.ins.2018.06.071.
  3. G. Edoardo, A. Leonardo, B. Roberto, L. Federico, M. Andrea, and V. Sassone, "Blockchain-based database to ensure data integrity in cloud computing environments," in Proc. Italian Conf. Cybersecur., Venice, Italy, Jan. 2017.
  4. H. G. Do andW. K. Ng, "Blockchain-based system for secure data storage with private keyword search," in Proc. IEEE World Congr. Services (SER¬VICES), Jun. 2017, pp. 90_93, doi: 10.1109/SERVICES.2017.23.
  5. D. K. Tosh, S. Shetty, X. Liang, C. Kamhoua, and L. Njilla, "Consensus protocols for blockchain-based data provenance: Challenges and opportunities," in Proc. IEEE 8th Annu. Ubiquitous Comput., Electron. Mobile Commun. Conf. (UEMCON), Oct. 2017, pp. 469_474, doi: 10.1109/ UEMCON.2017.8249088.
  6. X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, and L. Njilla, "ProvChain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability," in Proc. 17th IEEE/ACM Int. Symp. Cluster, Cloud Grid Comput. (CCGRID). Piscataway, NJ, USA: IEEE Press, May 2017, pp. 468_477.
  7. D. Tosh, S. Shetty, P. Foytik, C. Kamhoua, and L. Njilla, "CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud," in Proc. IEEE 11th Int. Conf. Cloud Comput. (CLOUD), Jul. 2018, pp. 302_309, doi: 10.1109/CLOUD.2018.00045.
  8. Y. Liu, Y. Zhou, R. Lan, and C. Tang, "Blockchain-based veri_cation scheme for deletion operation in cloud," in J. Comput. Res. Develop., vol. 66, no. 10, pp. 2199_2207, 2018.
  9. F. Huang, L. Xu, and X. Yang, "Blockchain Model of Cloud Forensics," J. Beijing Univ. Posts Telecommun., vol. 40, no. 6, pp. 120_124, 2017.
  10. Y. Zhang, S. Wu, B. Jin, and J. Du, "A blockchain-based process provenance for cloud forensics," in Proc. 3rd IEEE Int. Conf. Comput. Commun. (ICCC), Dec. 2017, pp. 2470_2473.
  11. Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du, and M. Guizani, "MeDShare: Trust-less medical data sharing among cloud service providers via blockchain," IEEE Access, vol. 5, pp. 14757_14767, 2017, doi: 10.1109/ACCESS.2017.2730843.
  12. I. Sukhodolskiy and S. Zapechnikov, "A blockchain-based access control system for cloud storage," in Proc. IEEE Conf. Russian Young Researchers Electr. Electron. Eng. (EIConRus), Jan. 2018, pp. 1575_1578, doi: 10.1109/EIConRus.2018.8317400.
  13. S. Cui, M. R. Asghar, and G. Russello, "Towards blockchain-based scalableand trustworthy _le sharing," in Proc. 27th Int. Conf. Comput. Com¬mun. Netw. (ICCCN), Jul. 2018, pp. 1_2.

Downloads

Published

2022-04-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. Jenita J, Archit Gaur, Joshua William Paul, Mohammad Ahmad Usmani, " Cloud Privacy Protection using BlockChain - A Comparative Analysis, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 9, Issue 2, pp.75-78, March-April-2022. Available at doi : https://doi.org/10.32628/IJSRSET22929