Open Access Journal

ISSN : 2456-1304 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Science Engineering and Management (IJSEM)

Monthly Journal for Science Engineering and Management

ISSN : 2456-1304 (Online)

Data Safety Using Attribute Oriented Cryptosystem and Blockchain System in Cloud Computing

Author : J. Kingsleen Solomon Doss 1 Dr. S. Kamalakkannan 2

Date of Publication :24th June 2021

Abstract: Large surplus data warehouse and connectivity in system 4.0 atmospheres have problems of low reliability, expense and ease of corruption. To fix these problems, a stable data warehouse and improvement approach in a blockchain oriented system is suggested by that the decentralization, tamper-proof, live control and administration of warehouse systems so that the architecture supports dynamic warehouse, rapid re-engineering and upgrading of shared data in an industrial point data warehouse framework. Neighbourhood restored program system is utilized to update and save data among failed joints while maintaining confidentiality of user data. In other words, when the data stored is found to be corrupted, various neighbourhood revamp units created by vector program will concurrently and effectively re-engineer multiple mutual data warehouse joints. Depending on the exclusive chain warehouse configuration, such as the data agreement method and the smart contract, the warehouse configuration of blockchain shared coding not only easily revamps the neighbourhood restored programs in the blockchain and further reduces the operating cost factor in the data warehouse functions of industrial joints. The Output proves that the suggested approach raises the remodeling speed of multi-joint data by 9 per cent and the data warehouse speed rises by 8.6 per cent, suggesting increased protection and real-time functionality.

Reference :

    1. A. Shamir. Identity-oriented cryptosystems and signature methods. Crypto.1984, 84: 47-53. 
    2. R. Johnson, D. Molnar, D. Song, et al. Homomorphic signature methods.CT-RSA. 2002, 2271: 244- 262.
    3. Z. Huang, S. Liu, X. Mao, K. Chen, and J. Li. Insight of the Protection for Data Safety under Selective Opening Attacks. Data Sciences, 2017, Volumes 412-413: 223-241
    4. J. Li, X. Chen, M. Li, J. Li, P. Lee, W. Lou. Secure Deduplication with Efficient and Reliable Convergent Key Administration. IEEE Communications on Parallel and Shared Systems, 2014, 25(6): 1615-1625.
    5.  W. Chen, L. Peng, J. Wang, F. Li, M. Tang, W. Xiong, S. Wang. Inapproximability Results for the Minimum Integral Solution Problem with Preprocedureing over infinity Norm. Theoretical Computer Science, Volume 478, 25 March 2013, Pages 127-131.
    6. W. Chen, L. Peng, J. Wang, F. Li, M. Tang, W. Xiong, S. Wang. An Improved Lower Bound for Approximating the Minimum Integral Solution Problem with Preprocedureing over infinity Norm. Journal of Combinatorial Optimization, 2015, 30(3): 447-455
    7. D. Freeman. Improved safety for linearly homomorphic signatures: A generic framework. In Public Key Cryptography-PKC 2012, Springer, 2012: 697-714.
    8.  D. Boneh, D. Freeman, J. Katz, et al. Signing a linear subspace: Signature methods for system coding. Public Key Cryptography. 2009,5443: 68-87.
    9. J. Li, Y. Li, X. Chen, P. Lee, W. Lou. A Hybrid Cloud Approach for Secure Authorized Deduplication. IEEE Communications on Parallel and Shared Systems. 2015, 26(5): 1206-1216.
    10.  A. S. Rawat et al., “Programs with neighbourhood restoration and erasure correction,” Optimal neighbourhoodly repairable and secure programs for distributed warehouse systems, vol. 60, no. 1, pp. 212–236, 2014

Recent Article