Enabling Data Storage Security with Blockchain Technology

Author Details

Thiruvenkatasamy S1 , Subhashri B2 , Vikasini D3, Madhumitha A4

1Assistant Professor, 2,3,4UG Students – Final Year, Department of Computer Science and Engineering, Nandha College of Technology, Perundurai – 638052, Tamilnadu, India

Abstract

There are multiple ways of keeping data by using a single or Distributed Database on the cloud, yet a single database client can keep data only on a single server, and if multiple clients try to access those at the same time with data consistency, the data may be altered at the time of concurrent data access. Handling data on a single database could be easy, but problems associated with data consistency, confidentiality, availability, and bottleneck/single point of failure are always there. To eliminate these problems, today the author uses the Distributed Database approach, in which data is stored on multiple servers, and makes clients access the data concurrently. Here, data is mirrored in multiple places and made available anytime/anywhere. Moreover, various replicas of the data are kept on various servers so if the data is lost during concurrent access,  the replica is available and made easily available to users. Data security is administered using various encryption algorithms like DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard), AES (Advanced Encryption Standard), and the like. Different kinds of data are encrypted in different cryptographic schemes and thereby level of security is enhanced. Moreover, an error recovery process is also executed in the system resulting in auto-correction of a failed cloud instance if the data is found to be modified there. The main advantage of this approach is data security as well as a single point of failure elimination. In this architecture, the client is unaware of what kind of encryption is made to required data and what cloud server instance is providing those data. Hence data security, availability, and consistency are achieved better than single cloud database architecture.

Keywords: Database security, cryptographic algorithms, database replica, error recovery process.


Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *