Over the last two decades, Internet of Things (IoT) networks have grown exponentially. Although the devices have relatively low memory, resource, and processing capability, the trend is that nodes generate a large volume of data. That is where cloud technology comes into play to provide storage space. Because of its centralized nature and robustness, a large network operating with cloud assistance may be vulnerable. Due to rigid access control policies, the devices may be vulnerable to malicious activity. On the other hand, cloud technology provides a platform for such a security system to operate. A centralized secure architecture fails to consider mobile and edge devices within the context of these criteria. This raises numerous concerns about trusting third-party cloud intermediaries, which cause security and privacy leaks. The goal of this research is to look into the problem of blockchain consensus algorithms and their applicability in IoT with cloud-native infrastructure in the E ....