Leveraging Blockchain Technology Centric Tools in Enhancing the Security Safeguards of Documents Storage

Gaurav Chhikara

G D Geonka Public School, Sector-22, Rohini, New Delhi, India


Vol: 12, Issue: 4, 2022

Receiving Date: 2022-08-08 Acceptance Date:


Publication Date:


Download PDF


The most widely used method for exchanging data worldwide is the Internet. Numerous cloud service providers support this sharing by letting customers store and share data over the Internet. However, cloud service providers have consistently failed to guarantee data's 100% security regarding privacy. Data breaches, piracy, and hacking attacks have threatened cloud providers' security mechanisms. However, customer data should be 100% secure because it may contain private information that should only be accessible to the owner and an intended audience. As a result, making this system more secure is critical to maintaining data privacy and cloud provider trust. We present a system that incorporates cloud-based data security into the Blockchain. It permits clients to store information in the cloud and gives a specific access control component that guarantees information security. Users can share data with others with permission by sharing the document's link with the intended user. The owner will have access to logs of all operations performed with the document at any time. This will guarantee the data's true ownership and privacy. A third party or individual will be permitted to access the document with prior authorization. This will increase cloud storage's security and reduce data breaches and attacks. Swiss best UK rolex replica watches are of high quality. Wish you find your perfect fake Rolex watches here.
Would you like to buy cheap fake watches UK? This website can offer help.

Keywords: blockchain technology; cryptographic keys; DApps


  1. Maximilian Wöhrer, Uwe Zdun, “Smart contracts: Security patterns in the ethereum ecosystem and solidity”, International Workshop on Blockchain Oriented Software Engineering (IWBOSE), IEEE, 2018.
  2. Qiwu Zou, Yuzhe Tang, Ju Chen, Kai Li, Charles A. Kamhoua, Kevin Kwiat, Laurent Njilla, “ChainFS: Blockchain-Secured Cloud Storage”, IEEE 11th International Conference on Cloud Computing (CLOUD), 2018.
  3. Fran Casino, Thomas K. Dasaklis, Constantinos Patsakis, “A systematic literature review of blockchain-based applications: Current status, classification and open issues”, Elsevier, 2018
  4. R.Gowthami Saranya, A.Kousalya, “A comparative analysis of security algorithms using cryptographic techniques in cloud computing”, IEEE, 2017
  5. Ilya Sukhodolskiy, Sergey Zapechnikov, “A Blockchain Based Access Control System for Cloud Storage,” IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), 2018
  6. Shubham Desai, Rahul Shelke, Omkar Deshmukh, Harish Choudhary, Prof. S. S. Sambhare “Blockchain Based Secure Data Storage and Access Control System using Cloud” IEEE - ICCUBEA 2019
  7. Gurudatt Kulkarni, Rani Waghmare, Rajnikant Palwe, Vidya Waykule, Hemant Bankar, Kundlik Koli, “Cloud Storage Architecture”, IEEE 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA) Google Cloud Platform Documentation: AWS Documentation:
  8. Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, Qiaoyan Wen, “A Survey on the Security of Blockchain Systems”, Beijing university China, 2018.
  9. Rongzhi Wang, “Research on data security technology based on cloud storage”, 13th Global Congress on Manufacturing and Management, GCMM, 2016.
  10. Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends”, IEEE 6th International Congress on Big Data, 2017
  11. Julija Golosova “The Advantages and Disadvantages of Blockchain Technology”, IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE), 2018.
  12. Mr Anup R. Nimje “Blockchain Attribute Based Encryption Techniques in Cloud Computing Security : An Overview ” IJCTT Volume 4, Issue 3-2013
  13. Sangsuree Vasupongayya -“Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems”, Research Article, 2019
  14. Naresh vurukonda, B.Thirumala Rao, -“A Study on Data Storage Security Issues in Cloud Computing”, 2nd International Conference on Intelligent Computing, Communication & Convergence , (ICCC-2016), 2018.
  15. Guang Chen, Bing Xu1, Manli Lu1 and Nian-Shing Chen, -“Exploring blockchain technology and its potential applications”, [Elsevier] 2018

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.