To see the other types of publications on this topic, follow the link: Decentralized Cloud Storage.

Journal articles on the topic 'Decentralized Cloud Storage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Decentralized Cloud Storage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Phatangare, Sheetal Atul, Sangita Maheshwar Jaybhaye, Vaishali Savale, Aryan Vimal, Avish Agrawal, and Raghav Bajaj. "DStore: Blockchain-Powered Decentralized Cloud Mesh." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (2023): 291–301. http://dx.doi.org/10.17762/ijritcc.v11i11s.8101.

Full text
Abstract:
Data is a critical asset for any company, as well as for any individual as well, but it is also vulnerable to attack. In the last few years, we have seen an alarming increase in data breaches that have compromised millions of accounts and resulted in billions of dollars lost. But how do you protect something so sensitive? In response to this, we propose our Project. This project focuses on developing a Decentralized Cloud Storage to store and secure data. You don't access data simply specifying 'where it is' in Decentralised Cloud Storage. Instead, you define 'what it is'. Because data is dist
APA, Harvard, Vancouver, ISO, and other styles
2

Shalom, G. Richa, and Ganesh Rohit Nirogi. "Decentralized Cloud Storage Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 1294–300. http://dx.doi.org/10.22214/ijraset.2022.46810.

Full text
Abstract:
Abstract: Because of its accessibility and ease of use, cloud storage has become the most widely used type of storage on the market in recent years. However, the privacy and data security of cloud storage are at risk. The protection of data security and privacy is the main topic of this essay. We suggest a blockchain-based decentralised storage system. Since blockchain is a distributed peer-to-peer system, any processing node connected to the internet can join and build peers' networks, maximising resource usage. Blockchain protects data security. The user's file is encrypted and shared among
APA, Harvard, Vancouver, ISO, and other styles
3

Babu, P. Suresh, and Dr Madhavi Kasa. "Reduction of Spatial Overhead in Decentralized Cloud Storage using IDA." International Journal of Engineering and Advanced Technology 10, no. 3 (2021): 176–79. http://dx.doi.org/10.35940/ijeat.c2275.0210321.

Full text
Abstract:
Decentralized cloud storage reflects a significant change in large-scale storage performance and economy. Removing central control enables users to store and exchange data without depending on third-party storage [16] providers. Decentralization reduces the possibility of data failures and outages while increasing object storage protection and privacy at the same time. Decentralized cloud storage is where individuals or groups encouraged to enter, store, and keep data available are stored on a decentralized network through several locations. The servers used, rather than a single organization,
APA, Harvard, Vancouver, ISO, and other styles
4

P, Suresh Babu, and Madhavi K. "Reduction of Spatial Overhead in Decentralized Cloud Storage using IDA." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 3 (2021): 176–79. https://doi.org/10.35940/ijeat.C2275.0210321.

Full text
Abstract:
Decentralized cloud storage reflects a significant change in large-scale storage performance and economy. Removing central control enables users to store and exchange data without depending on third-party storage [16] providers. Decentralization reduces the possibility of data failures and outages while increasing object storage protection and privacy at the same time. Decentralized cloud storage is where individuals or groups encouraged to enter, store, and keep data available are stored on a decentralized network through several locations. The servers used, rather than a single organization,
APA, Harvard, Vancouver, ISO, and other styles
5

Bacis, Enrico, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, and Pierangela Samarati. "Securing Resources in Decentralized Cloud Storage." IEEE Transactions on Information Forensics and Security 15 (2020): 286–98. http://dx.doi.org/10.1109/tifs.2019.2916673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

M B, Dr Suresh. "Decentralized file storage using Blockchain." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32275.

Full text
Abstract:
Amidst the exponential growth in data volumes and growing apprehensions regarding centralized control, decentralized cloud storage systems have emerged as a beacon of promise. This study presents a comprehensive examination of these systems, delving into their structural intricacies, benefits, and hurdles. The essence of decentralized cloud storage lies in dispersing data across a network of nodes, obviating the necessity for a central governing entity. Through the utilization of blockchain technology and cryptographic methods, information is encrypted, fragmented, and dispersed among myriad n
APA, Harvard, Vancouver, ISO, and other styles
7

Hussein, Asma Ibrahim, Mohammed Ibraheem Hussein, and Ohood Saadoon Hlail. "AI-generated privacy-preserving protocols for cross-cloud data sharing and collaboration." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 4-B (2025): 1265–79. https://doi.org/10.47974/jdmsc-2265.

Full text
Abstract:
With the rapid evolution of cloud computing, individuals and organizations are managing data storage and collaboration in an entirely new way. Using blockchain technology, this paper introduces CloudShare, a new framework for sharing and collaborating across clouds using a secure, decentralized ecosystem. As a result of the proposed system,storage costs and upload bandwidth requirements are significantly reduced while data confidentiality and consistency are maintained. With CloudShare, you can encrypt and deduplicate data without relying on centralized authorities to protect your privacy. Sim
APA, Harvard, Vancouver, ISO, and other styles
8

Shinde, Smita. "D-Drive: Decentralized Storage Space using Blockchain and IPFS Protocol." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1899–904. http://dx.doi.org/10.22214/ijraset.2023.50478.

Full text
Abstract:
Abstract: Centralized cloud-based storage has received great attention and has been extensively used by many companies in recent years. However, these cloud based storage are not secure because of the involvement of a centralized entity or a third party. On the other hand, there is a need for blockchain based decentralized storage to maximize data privacy and security. This paper proposed D-Drive, an IPFS-based decentralized storage space to solve the problem. D-Drive is a software solution trying to prove that centralized cloud-based storage applications can be decentralized, more secure, and
APA, Harvard, Vancouver, ISO, and other styles
9

Abhilash, P. K., Chidananda K., K. Sandeep, Nikhil Reddy Molaka, Yogesh Kumar Awasthi, and Samanthakurthi Rajabhishek. "Secure and Sustainable Decentralized Cloud Using IPFS." E3S Web of Conferences 430 (2023): 01097. http://dx.doi.org/10.1051/e3sconf/202343001097.

Full text
Abstract:
Our paper focuses on the implementation of a decentralized cloud storage system using the IPFS (InterPlanetary File System) technology. The project aims to provide an alternative to centralized cloud storage by decentralization, enhanced security, and user control over data which is a more sustainable solution than the existing system. In a centralized cloud storage system, data is stored on a single server controlled by a service provider. This centralized approach poses potential risks such as single points of failure, data breaches, and reliance on the trustworthiness of the provider. In co
APA, Harvard, Vancouver, ISO, and other styles
10

Juan Pablo Azzollini, María Elena García, and Nicolás L. Zubeldía. "Blockchain-Based Data Integrity Management System for Decentralized Cloud Computing." International Journal of Information Engineering and Science 1, no. 2 (2024): 01–07. http://dx.doi.org/10.62951/ijies.v1i2.87.

Full text
Abstract:
Cloud computing faces challenges regarding data integrity and security due to its centralized nature. This paper proposes a blockchain-based data integrity management system that decentralizes cloud data storage and ensures authenticity and traceability. By leveraging smart contracts, the proposed system validates data transactions, prevents unauthorized alterations, and provides a transparent audit trail. Experimental results reveal that the system can maintain high levels of data integrity with minimal latency and computational overhead, offering a practical solution to enhance data security
APA, Harvard, Vancouver, ISO, and other styles
11

J., Jayashree, J. V. S. Snehith Ch., Venkat K., Chaitanya P., and Vijayashree J. "CROWDBC: A Blockchain-Base Decentralized Framework for Crowdsourcing." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 4245–48. https://doi.org/10.35940/ijeat.C6503.029320.

Full text
Abstract:
Due to lack of server reliability and user data privacy encryption of data is required before the cloud is outsourced. We have found a compromised method within the blockchain in order to perform a keyword search which is secured on data that is encrypted against malicious service providers and users in cloud. SSE: Privately offers the cloud storage used in symmetric search encryption (SSE) systems, which cannot be regarded as a true cloud. The cloud service is also known to be credible. Let us start by emphasizing the importance of data storage within a public chain. The client is allowed by
APA, Harvard, Vancouver, ISO, and other styles
12

Muhammad Usman Ashraf. "A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions." Lahore Garrison University Research Journal of Computer Science and Information Technology 5, no. 3 (2021): 15–30. http://dx.doi.org/10.54692/lgurjcsit.2021.0503213.

Full text
Abstract:
Cloud computing is one of the ruling storage solutions. However, the cloud computing centralized storage method is not stable. Blockchain, on the other hand, is a decentralized cloud storage system that ensures data security. Cloud environments are vulnerable to several attacks which compromise the basic confidentiality, integrity, availability, and security of the network. This research focus on decentralized, safe data storage, high data availability, and effective use of storage resources. To properly respond to the situation of the blockchain method, we have conducted a comprehensive surve
APA, Harvard, Vancouver, ISO, and other styles
13

Qin, Peng, Wei Li, and Ke Ding. "A Big Data Security Architecture Based on Blockchain and Trusted Data Cloud Center." Wireless Communications and Mobile Computing 2022 (August 31, 2022): 1–8. http://dx.doi.org/10.1155/2022/7272405.

Full text
Abstract:
In view of the shortcomings of big data security and privacy protection in cloud environment, a big data security architecture was proposed in this paper. Based on blockchain technology and trusted data cloud center, data security architecture adopts the ideas of trusted authentication, intrusion detection, data segmentation, and decentralized storage and applies Amazon AWS log processing service, PairHand user authentication protocol, and Hadoop data analysis framework to realize dig data security and privacy protection in the cloud environment. This paper realizes system initialization and u
APA, Harvard, Vancouver, ISO, and other styles
14

Xu, Ronghua, Yu Chen, Genshe Chen, and Erik Blasch. "SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network." Future Internet 14, no. 12 (2022): 354. http://dx.doi.org/10.3390/fi14120354.

Full text
Abstract:
The rapid development of three-dimensional (3D) acquisition technology based on 3D sensors provides a large volume of data, which are often represented in the form of point clouds. Point cloud representation can preserve the original geometric information along with associated attributes in a 3D space. Therefore, it has been widely adopted in many scene-understanding-related applications such as virtual reality (VR) and autonomous driving. However, the massive amount of point cloud data aggregated from distributed 3D sensors also poses challenges for secure data collection, management, storage
APA, Harvard, Vancouver, ISO, and other styles
15

Vegesna, Dr Vinod Varma. "Methodologies for Enhancing Data Integrity and Security in Distributed Cloud Computing with Techniques to Implement Security Solutions." Asian Journal of Applied Science and Technology 06, no. 02 (2022): 167–80. http://dx.doi.org/10.38177/ajast.2022.6217.

Full text
Abstract:
Usually, cloud infrastructure is used individually by businesses, whereas the hybrid cloud would be a blend of two or many kinds of clouds. Because as clouds become increasingly common, safety issues also expanding. Because of such cybersecurity threats, numerous experts suggested procedures as well as ways to assure internet confidentiality. Providers of cloud-based services were accountable for the complete safety of cloud information. Nevertheless, since the clouds are accessible (easily accessible over the World wide web), much research has been conducted on cloud storage cybersecurity. Th
APA, Harvard, Vancouver, ISO, and other styles
16

Dr., Vinod Varma Vegesna. "Methodologies for Enhancing Data Integrity and Security in Distributed Cloud Computing with Techniques to Implement Security Solutions." Asian Journal of Applied Science and Technology (AJAST) 6, no. 2 (2022): 167–80. https://doi.org/10.38177/ajast.2022.6217.

Full text
Abstract:
Usually, cloud infrastructure is used individually by businesses, whereas the hybrid cloud would be a blend of two or many kinds of clouds. Because as clouds become increasingly common, safety issues also expanding. Because of such cybersecurity threats, numerous experts suggested procedures as well as ways to assure internet confidentiality. Providers of cloud-based services were accountable for the complete safety of cloud information. Nevertheless, since the clouds are accessible (easily accessible over the World wide web), much research has been conducted on cloud storage cybersecurity. Th
APA, Harvard, Vancouver, ISO, and other styles
17

S, Archana, Princy Mary, Sangami S, and Mahalakshmi V. "Peer-to-Peer Network Node Distribution Analysis Using Block chain." International Research Journal of Computer Science 11, no. 04 (2024): 309–13. http://dx.doi.org/10.26562/irjcs.2024.v1104.29.

Full text
Abstract:
This project uses block chain technology to propose a decentralized access control method for anonymous authentication and secure cloud data storage. The suggested plan improves privacy by guaranteeing that users can authenticate themselves to the cloud without disclosing who they are. Block chain integration improves system security by removing single points of failure and enabling robust, decentralized access management. The plan handles user revocation, enables fine-grained access control, and successfully thwarts replay assaults. Users have similar communication, processing, and storage ov
APA, Harvard, Vancouver, ISO, and other styles
18

R, Mr Ram Prashath, and Surya Prabha J. "Enhancing Security of Data in Cloud Storage Using Decentralized Infrastructure." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 395–97. http://dx.doi.org/10.22214/ijraset.2022.43751.

Full text
Abstract:
Abstract: Nowadays, a considerable amount of data is stored in the cloud, which must be kept safe against unauthorised access. Various algorithms are employed to ensure data privacy and security. Every system's goal is to achieve confidentiality, integrity, and availability (CIA). The existing centralised cloud storage, on the other hand, does not have these CIA qualities. Decentralized cloud storage is used in conjunction with hash algorithm used to improve data security and storage approaches. It efficiently aids in the protection of data against manipulation or the deletion of a portion of
APA, Harvard, Vancouver, ISO, and other styles
19

Sharma, Pratima, Rajni Jindal, and Malaya Dutta Borah. "Blockchain-based decentralized architecture for cloud storage system." Journal of Information Security and Applications 62 (November 2021): 102970. http://dx.doi.org/10.1016/j.jisa.2021.102970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zhu, Zhiqin, Guanqiu Qi, Mingyao Zheng, Jian Sun, and Yi Chai. "Blockchain based consensus checking in decentralized cloud storage." Simulation Modelling Practice and Theory 102 (July 2020): 101987. http://dx.doi.org/10.1016/j.simpat.2019.101987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

V. Archana. M.E. and G. Saraswathi. "Multi Server Collaborative Auditing in Encrypted Data Storage with Blockchain Technology." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 4 (2024): 190–201. http://dx.doi.org/10.32628/cseit24104121.

Full text
Abstract:
Traditional centralized cloud storage systems often face vulnerabilities such as single points of failure, data breaches, and unauthorized access. To address these challenges, this study proposes a blockchain-based approach for secure data storage on the cloud while providing controlled data access. The proposed system leverages the decentralized and immutable nature of blockchain to ensure the integrity and security of stored data. Blockchain technology, known for its decentralized and immutable nature, can enhance the security and transparency of data storage. In this proposed approach, data
APA, Harvard, Vancouver, ISO, and other styles
22

Sumathi, M., and S. Sangeetha. "Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System." International Journal of Cloud Applications and Computing 10, no. 2 (2020): 77–92. http://dx.doi.org/10.4018/ijcac.2020040105.

Full text
Abstract:
In earlier banking systems, the data owners were unable to access or update their financial information. Nowadays, user financial information is stored in Cloud storage instead of traditional storage, but security risks are high in financial sectors. Sometimes, Cloud services providers and public auditors modify the user sensitive attribute values. Hence, the decentralized storage system is required for providing better security and integrity of user sensitive attribute values. Blockchain is a decentralized technology for providing tamper-proof storage for sensitive attribute values. Hence, th
APA, Harvard, Vancouver, ISO, and other styles
23

Ankit Gupta. "Blockchain-Based Tokenized Storage Incentives: Revolutionizing Decentralized Object Storage." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 854–64. https://doi.org/10.32628/cseit25111289.

Full text
Abstract:
This article presents an innovative approach to decentralized object storage that combines blockchain technology, distributed hash tables (DHTs), and advanced cryptographic techniques. The proposed system addresses the limitations of traditional centralized storage infrastructures by implementing a token-based incentive mechanism that encourages network participation while ensuring data security and availability. By integrating proof-of-storage consensus mechanisms consensus mechanisms, homomorphic encryption, and erasure coding, the architecture demonstrates superior fault tolerance and opera
APA, Harvard, Vancouver, ISO, and other styles
24

Ravi, Harsh Deo. "Secure and Efficient Cloud Storage System with Deduplication and Compression Using Blockchain Technology." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 447–53. http://dx.doi.org/10.22214/ijraset.2024.65086.

Full text
Abstract:
Cloud storage is becoming increasingly essential as data volumes continue to grow exponentially. However, traditional cloud storage systems face issues related to data redundancy, inefficient storage utilization, and vulnerabilities in security. This paper presents a novel approach to cloud storage that incorporates deduplication, compression, and blockchain technology. Deduplication removes redundant data, while compression minimizes storage requirements. Blockchain, known for its decentralized and immutable ledger, ensures data integrity and security. The results of this research demonstrate
APA, Harvard, Vancouver, ISO, and other styles
25

Nair, Rajit, Syed Nasrullah Zafrullah, P. Vinayasree, et al. "Blockchain-Based Decentralized Cloud Solutions for Data Transfer." Computational Intelligence and Neuroscience 2022 (May 30, 2022): 1–12. http://dx.doi.org/10.1155/2022/8209854.

Full text
Abstract:
Cloud computing has increased its service area and user experience above traditional platforms through virtualization and resource integration, resulting in substantial economic and societal advantages. Cloud computing is experiencing a significant security and trust dilemma, requiring a trust-enabled transaction environment. The typical cloud trust model is centralized, resulting in high maintenance costs, network congestion, and even single-point failure. Also, due to a lack of openness and traceability, trust rating findings are not universally acknowledged. “Blockchain is a novel, decentra
APA, Harvard, Vancouver, ISO, and other styles
26

Khan, Nabeel, Hanan Aljoaey, Mujahid Tabassum, Ali Farzamnia, Tripti Sharma, and Yew Hoe Tung. "Proposed Model for Secured Data Storage in Decentralized Cloud by Blockchain Ethereum." Electronics 11, no. 22 (2022): 3686. http://dx.doi.org/10.3390/electronics11223686.

Full text
Abstract:
Since cloud computing is an essential component of any modern company (usually accounting for a considerable share of information technology (IT) infrastructure investment), consumers rely on cloud services. Data privacy and security are worries when data remains in third-party storage. Existing document version control systems are centralized and at risk from data loss, as seen by higher time utilization and incorrect document update procedures that allow modifications to a document without the awareness of other network operators. Underutilized peer resources might be leveraged to construct
APA, Harvard, Vancouver, ISO, and other styles
27

Berezko, Leonid, and V. Tatianchuk. "Decentralized access management scheme to the cloud data storage." Computer systems and network 1, no. 1 (2019): 9–14. http://dx.doi.org/10.23939/csn2019.01.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

N., Pooja, and B. M. Patil. "Secure Data Storage in Cloud by Decentralized Access Control." International Journal of Computer Applications 140, no. 11 (2016): 37–42. http://dx.doi.org/10.5120/ijca2016909528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Gouru, Navya, and NagaLakshmi Vadlamani. "CoPS - Cooperative Provenance System with ZKP using Ethereum Blockchain Smart Contracts." International Journal of Distributed Systems and Technologies 9, no. 4 (2018): 40–53. http://dx.doi.org/10.4018/ijdst.2018100103.

Full text
Abstract:
The redesign of cloud storage with the amalgamation of cooperative cloud and an immutable and unhackable distributed database blockchain thrives towards a strong CIA triad and secured data provenance. The conspiracy ideology associated with the traditional cloud has economized with cooperative cloud storage like Storj and Sia, decentralized storage, which allows renting the unused hard drive space and getting monetary compensation in an exchange with cryptocurrency. In this article, the authors explain how confidentiality, integrity and availability can be progressed with cooperative cloud sto
APA, Harvard, Vancouver, ISO, and other styles
30

Ramesh, Dharavath, Rahul Mishra, Pradeep K. Atrey, Damodar Reddy Edla, Sanjay Misra, and Lianyong Qi. "Blockchain based efficient tamper-proof EHR storage for decentralized cloud-assisted storage." Alexandria Engineering Journal 68 (April 2023): 205–26. http://dx.doi.org/10.1016/j.aej.2023.01.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Cui, Min, and Yipeng Wang. "EC-Kad: An Efficient Data Redundancy Scheme for Cloud Storage." Electronics 14, no. 9 (2025): 1700. https://doi.org/10.3390/electronics14091700.

Full text
Abstract:
To address the issues of fault tolerance and retrieval efficiency in cloud storage space data, we propose an efficient cloud storage solution based on erasure codes. A cloud storage system model is designed to use erasure codes to distribute the encoded original data files across various nodes of the cloud storage system in a decentralized manner. The files are decoded by the receiver to complete data recovery and ensure high availability of the data files while optimizing redundant computing overhead during data storage, thereby improving the stability of encoding and decoding and reducing th
APA, Harvard, Vancouver, ISO, and other styles
32

Arafat, Yasir. "Exploring the Role of Blockchain in Revolutionizing Cloud Storage and IoT Networks by Enhancing Security, Transparency, and Decentralized Control for a More Resilient Digital Future." International Journal of Innovative Science and Research Technologies 10, no. 1 (2025): 87–92. https://doi.org/10.5281/zenodo.15161111.

Full text
Abstract:
<em>Blockchain technology offers a novel approach to data storage, addressing common issues associated with traditional cloud storage systems by distributing data across multiple devices. Users can benefit from enhanced data security, as the trust in a single point of failure is reduced when storing data through blockchain's distributed ledger technology. The decentralized architecture of blockchain-based cloud storage systems instills greater trust in data management, providing enhanced privacy protection and user control over their data. Researchers are actively exploring how blockchain can
APA, Harvard, Vancouver, ISO, and other styles
33

Chen, Jiannan, Ying Wang, Zhaohui Huang, Conghao Ruan, and Chunqiang Hu. "A Decentralized Public Auditing Scheme for Secure Cloud Storage Based on Blockchain." Wireless Communications and Mobile Computing 2022 (October 14, 2022): 1–12. http://dx.doi.org/10.1155/2022/3688164.

Full text
Abstract:
The cloud storage service has brought great convenience to the customer, which can save massive storage and computation resources via outsourcing the data to cloud service provider (CSP). However, the security issues are the biggest challenge such as data integrity. The user can verify the integrity of outsourced data through a remote data auditing solution without retrieving original data from cloud, however, the auditing procedure has heavy computational overhead, which employs third party auditor (TPA) to conduct auditing task on behalf of users. In this paper, we propose a decentralized pu
APA, Harvard, Vancouver, ISO, and other styles
34

B, Shadaksharappa. "High Availability and Fault Tolerance in AWS." International Journal of Innovative Research in Information Security 09, no. 03 (2023): 66–72. http://dx.doi.org/10.26562/ijiris.2023.v0903.03.

Full text
Abstract:
With the increasing adoption of cloud computing, ensuring high availability and fault tolerance has become paramount for organizations. Amazon Web Services (AWS) offers a robust infrastructure for hosting applications, but it requires careful architectural design and implementation to achieve desired levels of availability and fault tolerance. This research paper explores two innovative concepts, namely Cloud Fractal and Decentralized Replication and Orchestration, and their application in achieving high availability and fault tolerance in AWS. We present a comprehensive analysis of these conc
APA, Harvard, Vancouver, ISO, and other styles
35

Nida, Bhanu Raju. "Blockchain Meets Cloud: Reinventing Decentralization and Secure Transactions." International Journal of Multidisciplinary Research and Growth Evaluation. 6, no. 2 (2025): 408–13. https://doi.org/10.54660/.ijmrge.2025.6.2.408-413.

Full text
Abstract:
The integration of blockchain and cloud computing is reshaping the way we think about data security, trust, and decentralization. While cloud computing offers scalability, efficiency, and cost-effectiveness, its centralized nature raises concerns about data privacy, security vulnerabilities, and dependency on third-party providers. Blockchain, known for its decentralized, immutable, and cryptographically secure structure, presents a promising solution by enhancing trust, reducing reliance on intermediaries, and ensuring secure transactions. This paper explores the potential and challenges of i
APA, Harvard, Vancouver, ISO, and other styles
36

Kaushik, Shweta, and Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud." International Journal of Information Security and Privacy 15, no. 2 (2021): 29–52. http://dx.doi.org/10.4018/ijisp.2021040102.

Full text
Abstract:
Cloud computing started a new era for IT enterprises. It allows the movement of application from local to remote location, massive data storage. Owner has access to centralized or decentralized data storage server, where data management handled by remote vendor. But, the heterogeneous and dynamic nature of cloud introduces security challenges. Among them, access control and integrity checking are most important which incur high consideration. Attribute-based encryption is one of the access control technique which allows integration of access policies, attributes, and encrypted data. In this pa
APA, Harvard, Vancouver, ISO, and other styles
37

Wang, Chong, Hao Jin, Ronglei Wei, and Ke Zhou. "Revocable, dynamic and decentralized data access control in cloud storage." Journal of Supercomputing 78, no. 7 (2022): 10063–87. http://dx.doi.org/10.1007/s11227-021-04277-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

S., Shital. "Decentralized Anonymous User Authentication For Securing Data Storage in Cloud." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 1 (2015): 05–10. http://dx.doi.org/10.17762/ijritcc2321-8169.150102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Sumathi, M., S. P. Raja, N. Vijayaraj, and M. Rajkamal. "Healthcare Data Collection Using Internet of Things and Blockchain Based Decentralized Data Storage." ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal 12, no. 1 (2023): e28612. http://dx.doi.org/10.14201/adcaij.28612.

Full text
Abstract:
With the increase in usage of Internet of Things devices (IoT), IoT is used in different sectors such as manufacturing, electric vehicles, home automation and healthcare. The IoT devices collected large volumes of data on different parameters at regular intervals. Storing a massive amount volume of IoT data securely is a complicated task. Presently, the majority of IoT devices use cloud storage to store the data, however, cloud servers require large storage and high computation. Due to third party cloud service provider (CSP) interaction, the management of IoT data security fully depends on th
APA, Harvard, Vancouver, ISO, and other styles
40

Yousif, Firas Abdulrahman. "Securing Cloud Data Storage through Blockchain-Enhanced Encryption." Journal of Internet Services and Information Security 15, no. 1 (2025): 130–52. https://doi.org/10.58346/jisis.2025.i1.009.

Full text
Abstract:
Blockchain technology has brought a new change in many sectors mainly through provision of decentralized transactional solutions and it is an open, continuously growing list of records, which is distributed and not controlled by centralized authorities. The current regulation is the first one of such kind because it encompasses payment, communication, registration, and monitoring of transactions between members, without the need to have a central authority to manage the needs of the organization. There are however, challenges, which persist for example in data storage and scalability. This pap
APA, Harvard, Vancouver, ISO, and other styles
41

Naga Chandrika H, Et al. "Data Security on Backed Up Data and Recovery in Cloud Storage." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 4563–74. http://dx.doi.org/10.17762/ijritcc.v11i9.9971.

Full text
Abstract:
Cloud provides its users with different services. Every day during cloud computing, a great deal of data is generated. On the cloud servers, the data is being saved. A recovery tool should be created in case this data is lost from the server. One such setup is described in this consideration. The proposed approach would enable simultaneous data storage on the inaccessible server and the cloud server. The information is returned from the farther server when the key record is misplaced. Secret key security is ensured so that the authentication is secure and authorized by the user based on the at
APA, Harvard, Vancouver, ISO, and other styles
42

Meng, Lu, and Bin Sun. "Research on Decentralized Storage Based on a Blockchain." Sustainability 14, no. 20 (2022): 13060. http://dx.doi.org/10.3390/su142013060.

Full text
Abstract:
The current distributed storage solutions are still concentrated in third-party storage service providers, and the stored data are concentrated in a few cloud servers, which inevitably brings the risk of data loss, leakage, and tampering, so it is imperative to study a distributed storage and decentralized storage system. How to maintain the consistency of data in a distributed environment has become a problem in building decentralized applications, until the emergence of blockchain technology, whose decentralized, non-tamperable, and traceable features can solve this problem well. In this pap
APA, Harvard, Vancouver, ISO, and other styles
43

Gan, Chuang, Weichun Wang, Yuchong Hu, et al. "Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication." Applied Sciences 15, no. 3 (2025): 1245. https://doi.org/10.3390/app15031245.

Full text
Abstract:
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality. Encrypted deduplication can achieve both goals via performing deduplication to eliminate the duplicate data within encrypted data. Traditional encrypted deduplication generates the encryption key on the client side, which poses a risk of offline brute-force cracking of the outsourced data. Server-aided encryption schemes have been proposed to strengthen the confidentiality of encrypted deduplication by distributing the encry
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Xiehua, Yanlong Wang, Ming Xu, and Yaping Cui. "Decentralized attribute-based encryption and data sharing scheme in cloud storage." China Communications 15, no. 2 (2018): 138–52. http://dx.doi.org/10.1109/cc.2018.8300278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Moudni, Mohammed El, and Elhoussaine Ziyati. "Decentralized and Secure Access Control Model for Multi-Cloud Data Storage." International Journal of Safety and Security Engineering 15, no. 2 (2025): 261–78. https://doi.org/10.18280/ijsse.150203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Zahran Rayyan, Rayyan Mahdi, and Syarifal Luthfan. "Blockchain-Based Secure Data Sharing in Cloud Computing." Proceeding of The International Conference of Inovation, Science, Technology, Education, Children, and Health 3, no. 2 (2023): 123–26. https://doi.org/10.62951/icistech.v3i2.124.

Full text
Abstract:
Cloud computing has revolutionized data storage and management; however, security and privacy concerns remain critical challenges. This paper explores the integration of blockchain technology to enhance data security in cloud environments. A decentralized approach ensures data integrity, authentication, and tamper resistance. The proposed framework leverages smart contracts to enforce access control policies efficiently. Simulation results indicate that our model significantly improves data security without compromising system performance.
APA, Harvard, Vancouver, ISO, and other styles
47

Gnana Jeslin, J., and P. Mohan Kumar. "Decentralized and Privacy Sensitive Data De-Duplication Framework for Convenient Big Data Management in Cloud Backup Systems." Symmetry 14, no. 7 (2022): 1392. http://dx.doi.org/10.3390/sym14071392.

Full text
Abstract:
The number of customers transferring information to cloud storage has grown significantly, with the rising prevalence of cloud computing. The rapidly rising data volume in the cloud, mostly on one side, is followed by a large replication of data. On the other hand, if there is a single duplicate copy of stored symmetrical information in the de-duplicate cloud backup the manipulation or lack of a single copy may cause untold failure. Thus, the deduplication of files and the auditing of credibility are extremely necessary and how they are achieved safely and effectively must be addressed in acad
APA, Harvard, Vancouver, ISO, and other styles
48

Versha Verma, Vipin Saxena, Vishal Verma, Karm Veer Singh. "A Framework for Secured Access Control of Cloud Data Using Blockchain Technology." Journal of Information Systems Engineering and Management 10, no. 29s (2025): 934–40. https://doi.org/10.52783/jisem.v10i29s.4606.

Full text
Abstract:
Cloud computing provides a scalable storage, but ensuring data security and access control are still challenging areas of research. The present work proposes an efficient framework for secure access control of cloud data using blockchain technology. The framework leverages blockchain’s decentralized nature to enhance trust and transparency. Smart contracts automate access control, policy for ensuring access of authorized users. Cryptographic technique is used to secure data transmission and storage. The system eliminates reliance on third-party entities, reducing vulnerabilities. Experimental
APA, Harvard, Vancouver, ISO, and other styles
49

S, Rajasekaran, Kalifulla Y, Murugesan S, Ezhilvendan M, and Gunasekaran J. "Authentication Based Cloud Storage and Secure Data Forwarding." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (2013): 106–10. http://dx.doi.org/10.24297/ijct.v4i1b.3068.

Full text
Abstract:
cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme an
APA, Harvard, Vancouver, ISO, and other styles
50

Yadav, Ramesh Kumar, and Dr Raja Parven. "Blockchain Based Cloud File Sharing System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43793.

Full text
Abstract:
Although blockchain is excellent for decentralized transaction recording, it has certain drawbacks when it comes to storing big files or documents. Decentralized storage systems have been created to effectively manage greater volumes of data in order to address this problem. A distributed system called blockchain makes sure that transactions are safe and clear. To enhance data sharing, some strategies have looked into combining blockchain with other technologies. However, relying solely on blockchain technology for safe file sharing has drawbacks. In this study, we present a secure file-sharin
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!