Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System

2020 ◽  
Vol 10 (2) ◽  
pp. 77-92 ◽  
Author(s):  
M. Sumathi ◽  
S. Sangeetha

In earlier banking systems, the data owners were unable to access or update their financial information. Nowadays, user financial information is stored in Cloud storage instead of traditional storage, but security risks are high in financial sectors. Sometimes, Cloud services providers and public auditors modify the user sensitive attribute values. Hence, the decentralized storage system is required for providing better security and integrity of user sensitive attribute values. Blockchain is a decentralized technology for providing tamper-proof storage for sensitive attribute values. Hence, the account holder information is segregated as sensitive and non-sensitive attributes. Before storing into off-chain mode of blocks, the sensitive attributes are grouped into ‘n' number of groups and encrypted by separate group key. The non-encrypted, non-sensitive attributes are stored in cloud storage. The access information is stored in the on-chain mode of the block for easy monitoring. Hence, the security and integrity of sensitive information are preserved.

Webology ◽  
2021 ◽  
Vol 18 (Special Issue 01) ◽  
pp. 288-301
Author(s):  
G. Sujatha ◽  
Dr. Jeberson Retna Raj

Data storage is one of the significant cloud services available to the cloud users. Since the magnitude of information outsourced grows extremely high, there is a need of implementing data deduplication technique in the cloud storage space for efficient utilization. The cloud storage space supports all kind of digital data like text, audio, video and image. In the hash-based deduplication system, cryptographic hash value should be calculated for all data irrespective of its type and stored in the memory for future reference. Using these hash value only, duplicate copies can be identified. The problem in this existing scenario is size of the hash table. To find a duplicate copy, all the hash values should be checked in the worst case irrespective of its data type. At the same time, all kind of digital data does not suit with same structure of hash table. In this study we proposed an approach to have multiple hash tables for different digital data. By having dedicated hash table for each digital data type will improve the searching time of duplicate data.


2018 ◽  
Vol 7 (S1) ◽  
pp. 16-19
Author(s):  
B. Rasina Begum ◽  
P. Chithra

Cloud computing provides a scalable platform for large amount of data and processes that work on various applications and services by means of on-demand service. The storage services offered by clouds have become a new profit growth by providing a comparable cheaper, scalable, location-independent platform for managing users’ data. The client uses the cloud storage and enjoys the high end applications and services from a shared group of configurable computing resources using cloud services. It reduces the difficulty of local data storage and maintenance. But it gives severe security issues toward users’ outsourced data. Data Redundancy promotes the data reliability in Cloud Storage. At the same time, it increases storage space, Bandwidth and Security threats due to some server vulnerability. Data Deduplication helps to improve storage utilization. Backup is also less which means less Hardware and Backup media. But it has lots of security issues. Data reliability is a very risky issue in a Deduplication storage system because there is single copy for each file stored in the server which is shared by all the data owners. If such a shared file/chunk was missing, large amount of data becomes unreachable. The main aim of this work is to implement Deduplication System without sacrificing Security in cloud storage. It combines both Deduplication and convergent key cryptography with reduced overhead.


2021 ◽  
Author(s):  
Priyadharshini Kaliyamoorthy ◽  
Aroul Canessane Ramalingam

Abstract In recent years, numerous research works have been established to obtain secure data in the cloud storage system. But the data privacy regarding information outsourcing on cloud services is considered a crucial problem. In order to provide secure data, it is necessary to encrypt the information before storing it in the public cloud storage system. To provide security and data integrity during encryption and decryption, this paper proposes a global mutation-based novel artificial immune network optimization algorithm for RSA cryptosystem. Here, the Global Mutation Based Novel Artificial Immune Network Optimization (GM-NAINO) Algorithm is employed to attain optimal generation of keys thereby enhancing safe and secure data transmission and improving the data integrity during the transmission of data. Thus, the proposed GM-NAINO based RSA framework provides an effective system in improving data integrity. In addition to this, to determine the effectiveness of the proposed GM-NAINO algorithm seven benchmark functions are utilized in this paper. The performance evaluation and the comparative analysis are carried out and the proposed GM-NAINO based RSA framework outperforms other approaches.


Author(s):  
R. Rajan ◽  
◽  
Dr. C. Sunitha Ram ◽  

Cloud computing the technology which have the capability of modifying the method computing strongly, and storage resources will be accessed shortly. User Identification is an entity to detect the user who using the system or website. In information technology the protection of information consistently become a major issue to handle. The data might place in various locations in the world since it become particularly serious. The two main factors regarding cloud technology are information protection and security. The cloud operators can easily reach the sensitive information that affects the data security and protection measures. Therefore, this research protocol mainly focuses on secure data storage that always been a significant feature of quality of service. To guarantee the ‘rightness of users’ information in cloud storage system a Protection Aware User Identity and Data Storage (PAUIDS) algorithm is proposed that separates the document and independently stores the user information in the cloud storage servers. The proposed algorithm reduces the encryption and decryption time in a cloud storage system and providing secure and efficient data storage in cloud environments.


Author(s):  
P. NagaRaju ◽  
N. Nagamalleswara Rao

Cloud computing (CC) is one amongst the developing technologies, which get more attention from academia as well as industries. It offers diverse benefits like sharing computing resources, service flexibility, reducing costs, etc. The Cloud Services Provider (CSP) is accountable for the data that are delivered to the cloud. The threat of seeing the stored data and using sensitive raw data by strangers is the main barrier in the utilization of cloud services. So, Data Security (DS) along with privacy is the chief issue, which is an obstacle while adopting the CC. Countless techniques are existent for ensuring data confidentiality, but they do not completely give protection to the data. To trounce these drawbacks, this paper introduces the Obfuscation (OB) based Modified Elliptical Curve Cryptography (MECC) algorithm for protecting data as of malicious attacks, which is termed as OB-MECC. Primarily, the proposed method obfuscates the data before they are uploaded to the cloud. For the OB of the data, the proposed work employs methods like substitution cipher (SC), position update, Ceaser cipher, binary conversion, 8-bit binary conversion, decimal(),  two complex(), and ASCII(). Then, encryption of the obfuscated data is done with the utilization of the MECC algorithm. After encryption, the data on the cloud is retrieved. The retrieved data is then decrypted by reversing the OB and encryption process to get the actual data. The outcomes corroborate that the confidentiality and security level are maximum for the proposed OB-MECC when contrasted to the existing approaches.


Sign in / Sign up

Export Citation Format

Share Document