ETHEREUM ORIENTED ENHANCED SECURE LOG FILE STORAGE USING INTERPLANETARY FILE SYSTEM WITH BLOWFISH ENCRYPTION
Journal: International Education and Research Journal (Vol.10, No. 3)Publication Date: 2024-03-15
Authors : M. S. Anbarasi Barath P. Bharath Y. Arun Kumar J. Ajay A.;
Page : 173-175
Keywords : Blockchain; Tamper-resistant; Decentralization; Data Integrity; Blowfish Encryption; Proof of Stake; Smart Contracts;
Abstract
In the realm of cloud server operations, where the sheer volume of daily transactions is immense, safeguarding data security is paramount. One of the significant challenges faced is the verification of transaction logs, as attackers may attempt to tamper with them. The current system, utilizing Proof of Work (PoW) for blockchain, falls short by lacking robust data encryption, thereby exposing a critical vulnerability. This proposed paper introduces an innovative solution by integrating the more secure and energy-efficient Proof of Stake (PoS) algorithm with Blowfish encryption. The combination of PoS and Blowfish addresses the identified weaknesses effectively. PoS introduces a novel approach by relying on validators who have a stake in the network, creating a powerful deterrent against log tampering. This not only enhances the integrity of the transaction logs but also reduces the risk of malicious activities. Additionally, the incorporation of Blowfish encryption ensures the confidentiality of log data, providing an extra layer of protection. Even if logs are accessed illicitly, the encryption prevents unauthorized individuals from deciphering sensitive information. Furthermore, the implementation of a smart contract for user registration adds another dimension to security, creating a comprehensive solution to fortify data security on Cloud servers. The proposed approach offers a promising solution to the critical cybersecurity challenge faced by cloud servers. By combining the security features of PoS and Blowfish encryption, along with the strategic use of smart contracts, the solution not only deters tampering but also safeguards sensitive information. This holistic approach contributes significantly to reinforcing the data security infrastructure of cloud servers in the face of evolving cyber threats.
Other Latest Articles
- SECURING DIGITAL EVIDENCE: BLOCKCHAIN AND AES -ENCRYPTION FOR TAMPER-RESISTANT DATA INTEGRITY IN CYBERCRIME INVESTIGATIONS
- UNLOCKING THE POTENTIAL: SOCIO-ECONOMIC SIGNIFICANCE OF TOURISM IN TRIPURA'S GROWTH AND TRANSFORMATION
- WOMEN’S EMPOWERMENT: REALITY, MYTH AND IDEAL
- NETWORK TRAFFIC BASED RANSOMWARE DETECTION
- FLOOD PRONE AND IMPACT ANALYSIS USING GEOGRAPHIC INFORMATION SYSTEM
Last modified: 2024-06-05 22:14:43