ber of CSC request. The more the number of re-
quest, more the size of the blockchain and with the
increased number of blocks the time required to final-
ize the same and add it to the main chain using the
PoS (Baliga, 2017) consensus method increases. An
effort has been made here (as mentioned in the previ-
ous sections) to balance the number of transactions by
following a user defined periodic update method. This
avoids unnecessary immediate transactions involving
blockchain write.
Future work is geared towards the development of
an automated tool based on the proposed methodol-
ogy. Another aspect that can be considered as fu-
ture work is enactment of the security issues related
to virtual machine instances for multi-provider feder-
ated clouds. The model, in its current form, considers
only single CSP set-ups.
REFERENCES
Abbadi, M. I. (2011). Clouds’ infrastructure taxonomy,
properties, and management services. In Advances in
Computing and Communications, Part IV, edited by
A. Abraham, J. L. Mauri, J. Buford, J. Suzuki, and S.
M. Thampi, Heidelberg: Springer-Verlag, 406-420.
Anonymous (2019). Local and state solidity vari-
ables and use of parameters. BitDegree Learn.
https://www.bitdegree.org/learn/solidity-variables,
Accessed 30 September 2019.
Baliga, A. (2017). Understanding blockchain consensus
models. InPersistent. https://www.persistent.com/wp-
content/uploads/2018/02/wp-understanding-
blockchain-consensus-models.pdf, Accessed April
2017.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., and
Brandic, I. (2009). Cloud computing and emerging
it platforms: Vision, hype, and reality for delivering
computing as the 5th utility. Future Generation com-
puter systems, 25(6), 599-616.
Conti, M., Kuma, E. S., Lal, C., and Ruj, S. (2018). A
survey on security and privacy issues of bitcoin. IEEE
Communications Surveys and Tutorials. 20(4), 3416-
3452.
Dannen, C. (2017). Introducing ethereum and solidity.
In: Dannen, C. (eds.) (Vol. 1), Berkeley: Apress, pp.
1–185. Springer Nature Switzerland.
Ferris, J. M. (2014). Red hat inc.: Load balancing in cloud-
based networks. U.S. Patent 8,849,971.
Halpin., H. and Piekarska, M. (2017). Introduction to se-
curity and privacy on the blockchain. In 2017 IEEE
European Symposium on Security and Privacy Work-
shops (EuroS and PW), pp. 1-3, IEEE.
Hashizume, K., Rosado, D. G., Fern´andez-Medina, E., and
Fernandez, E. B. (2013). An analysis of security is-
sues for cloud computing. In Journal of internet ser-
vices and applications. SPRINGER.
Hussein, R. K., Alenezi, A., Wills, G. B., and Walters, R. J.
(2016). A framework to secure the virtual machine
image in cloud computing. In 2016 IEEE international
conference on smart cloud (SmartCloud), pp. 35-40,
IEEE.
Kazim, M., Masood, R., and Shibli, M. A. (2013). Secur-
ing the virtual machine images in cloud computing.
In Proceedings of the 6th International Conference on
Security of Information and Networks, pp. 425-428.
Macrinici, D., Cartofeanu, C., and Gao, S. (2018). Smart
contract applications within blockchain technology: A
systematic mapping study. Telematics and Informat-
ics, 35(8), 2337-2354.
Marr, M. D. and Kowalski, M. P. (2014). Amazon tech-
nologies inc. scaling a virtual machine instance. U.S.
Patent 8,825,550.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic
cash system. https://bitcoin.org/bitcoin.pdf.
Sahli, H., Belala, F., and Bouanaka, C. (2014). Model-
checking cloud systems using bigmc. In 8th Inter-
national Workshop on Verification and Evaluation of
Computer and Communication Systems, pp. 25-33.
Schwarzkopf, R. (2015). Virtual machine lifecy-
cle management in grid and cloud computing.
https://doi.org/10.17192/z2015.0407.
Wan, Z. and Jiang, X. (2010). Hypersafe: a lightweight ap-
proach to provide lifetime hypervisor control-flow in-
tegrity. In IEEE Symposium on Security and Privacy,
pp. 380-395, IEE.
Wang, W., Hoang, D., Hu, P., Xiong, Z., Niyato, D., Wang,
P., Wen, Y., and Kim, D. I. (2019). A survey on
consensus mechanisms and mining strategy manage-
ment in blockchain networks. IEEE Access. 7, 22328-
22370.
Wei, J., Zhang, X., Ammons, G., Bala, V., and Ning, P.
(2009). Managing security of virtual machine images
in a cloud environment. In Proceedings of the 2009
ACM workshop on Cloud computing security, pp. 91-
96.
Wood, G. (2014). Ethereum: A secure decentralised gen-
eralised transaction ledger. Ethereum project yellow
paper, 151, 1-32.
Yann300 (2020). Remix documentation. Re-
lease 1, https://readthedocs.org/projects/remix-
ide/downloads/pdf/latest/.