Data secure application: an application that allows developers to store user data securely using blockchain and IPFS
Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data,...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2024-05, Vol.83 (15), p.45491-45517 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 45517 |
---|---|
container_issue | 15 |
container_start_page | 45491 |
container_title | Multimedia tools and applications |
container_volume | 83 |
creator | Dewang, Rupesh Kumar Yadav, Mahendra Pratap Awasthi, Surbhit Raj, Om Mewada, Arvind Bawankule, Kamlakant Laxman |
description | Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data, attacking your information, thereby losing data integrity, confidentiality, and availability. Cyberattack refers to the unauthorized intrusion of external personnel into a user’s private digital space. We have proposed a solution to provide secure data storage in third-party applications and leverage the power of Blockchain and Interplanetary File Systems. The proposed approach offers reliable role-based access to control data storage service that maintains data integrity, availability, and confidentiality. The proposed model uses the aforementioned technologies because they provide a distributed and decentralized nature of data storage and add-on support to data immutability. Traditionally the technologies used for such services are centralized and provide a single point of attack for the attacker. It puts confidential user data in jeopardy. The proposed solutions store encrypted data distributed to reduce reliance on big tech giants for data storage support and uproot the fear of collapsing systems due to a single point of failure. |
doi_str_mv | 10.1007/s11042-023-17204-w |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3048261305</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3048261305</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-86d9e5ddb11fa754cd5c61b35793788634cfa8afb647457d228f41deb9b10cb33</originalsourceid><addsrcrecordid>eNp9kF1LwzAUhoMoOKd_wKuA19V8Nq13Mp0OBgrqdUiTdOusTU1Sx_690QruyquTE97nOfACcI7RJUZIXAWMESMZIjTDgiCWbQ_ABHNBMyEIPtx7H4OTEDYI4ZwTNgHxVkUFg9WDt1D1fdtoFRvXXUPV7e8wrlWEqm3dNkBjP23reusDjA6G6BI7BOuh-ZO1u_TVdCtYtU6_6bVqkq8zcPE0fz4FR7Vqgz37nVPwOr97mT1ky8f7xexmmWmKy5gVuSktN6bCuFaCM224znFFuSipKIqcMl2rQtVVzgTjwhBS1AwbW5UVRrqidAouRm_v3cdgQ5QbN_gunZQUsYLkmCKeUmRMae9C8LaWvW_eld9JjOR3u3JsV6Z25U-7cpsgOkIhhbuV9X_qf6gvfp1_Bg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3048261305</pqid></control><display><type>article</type><title>Data secure application: an application that allows developers to store user data securely using blockchain and IPFS</title><source>SpringerLink</source><creator>Dewang, Rupesh Kumar ; Yadav, Mahendra Pratap ; Awasthi, Surbhit ; Raj, Om ; Mewada, Arvind ; Bawankule, Kamlakant Laxman</creator><creatorcontrib>Dewang, Rupesh Kumar ; Yadav, Mahendra Pratap ; Awasthi, Surbhit ; Raj, Om ; Mewada, Arvind ; Bawankule, Kamlakant Laxman</creatorcontrib><description>Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data, attacking your information, thereby losing data integrity, confidentiality, and availability. Cyberattack refers to the unauthorized intrusion of external personnel into a user’s private digital space. We have proposed a solution to provide secure data storage in third-party applications and leverage the power of Blockchain and Interplanetary File Systems. The proposed approach offers reliable role-based access to control data storage service that maintains data integrity, availability, and confidentiality. The proposed model uses the aforementioned technologies because they provide a distributed and decentralized nature of data storage and add-on support to data immutability. Traditionally the technologies used for such services are centralized and provide a single point of attack for the attacker. It puts confidential user data in jeopardy. The proposed solutions store encrypted data distributed to reduce reliance on big tech giants for data storage support and uproot the fear of collapsing systems due to a single point of failure.</description><identifier>ISSN: 1573-7721</identifier><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-023-17204-w</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Applications programs ; Availability ; Blockchain ; Computer Communication Networks ; Computer Science ; Confidentiality ; Control data (computers) ; Cryptography ; Cybersecurity ; Data integrity ; Data storage ; Data Structures and Information Theory ; End users ; Integrity ; Multimedia Information Systems ; Privacy ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2024-05, Vol.83 (15), p.45491-45517</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-86d9e5ddb11fa754cd5c61b35793788634cfa8afb647457d228f41deb9b10cb33</citedby><cites>FETCH-LOGICAL-c319t-86d9e5ddb11fa754cd5c61b35793788634cfa8afb647457d228f41deb9b10cb33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-023-17204-w$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-023-17204-w$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Dewang, Rupesh Kumar</creatorcontrib><creatorcontrib>Yadav, Mahendra Pratap</creatorcontrib><creatorcontrib>Awasthi, Surbhit</creatorcontrib><creatorcontrib>Raj, Om</creatorcontrib><creatorcontrib>Mewada, Arvind</creatorcontrib><creatorcontrib>Bawankule, Kamlakant Laxman</creatorcontrib><title>Data secure application: an application that allows developers to store user data securely using blockchain and IPFS</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data, attacking your information, thereby losing data integrity, confidentiality, and availability. Cyberattack refers to the unauthorized intrusion of external personnel into a user’s private digital space. We have proposed a solution to provide secure data storage in third-party applications and leverage the power of Blockchain and Interplanetary File Systems. The proposed approach offers reliable role-based access to control data storage service that maintains data integrity, availability, and confidentiality. The proposed model uses the aforementioned technologies because they provide a distributed and decentralized nature of data storage and add-on support to data immutability. Traditionally the technologies used for such services are centralized and provide a single point of attack for the attacker. It puts confidential user data in jeopardy. The proposed solutions store encrypted data distributed to reduce reliance on big tech giants for data storage support and uproot the fear of collapsing systems due to a single point of failure.</description><subject>Access control</subject><subject>Applications programs</subject><subject>Availability</subject><subject>Blockchain</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Confidentiality</subject><subject>Control data (computers)</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Data storage</subject><subject>Data Structures and Information Theory</subject><subject>End users</subject><subject>Integrity</subject><subject>Multimedia Information Systems</subject><subject>Privacy</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1573-7721</issn><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kF1LwzAUhoMoOKd_wKuA19V8Nq13Mp0OBgrqdUiTdOusTU1Sx_690QruyquTE97nOfACcI7RJUZIXAWMESMZIjTDgiCWbQ_ABHNBMyEIPtx7H4OTEDYI4ZwTNgHxVkUFg9WDt1D1fdtoFRvXXUPV7e8wrlWEqm3dNkBjP23reusDjA6G6BI7BOuh-ZO1u_TVdCtYtU6_6bVqkq8zcPE0fz4FR7Vqgz37nVPwOr97mT1ky8f7xexmmWmKy5gVuSktN6bCuFaCM224znFFuSipKIqcMl2rQtVVzgTjwhBS1AwbW5UVRrqidAouRm_v3cdgQ5QbN_gunZQUsYLkmCKeUmRMae9C8LaWvW_eld9JjOR3u3JsV6Z25U-7cpsgOkIhhbuV9X_qf6gvfp1_Bg</recordid><startdate>20240501</startdate><enddate>20240501</enddate><creator>Dewang, Rupesh Kumar</creator><creator>Yadav, Mahendra Pratap</creator><creator>Awasthi, Surbhit</creator><creator>Raj, Om</creator><creator>Mewada, Arvind</creator><creator>Bawankule, Kamlakant Laxman</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20240501</creationdate><title>Data secure application: an application that allows developers to store user data securely using blockchain and IPFS</title><author>Dewang, Rupesh Kumar ; Yadav, Mahendra Pratap ; Awasthi, Surbhit ; Raj, Om ; Mewada, Arvind ; Bawankule, Kamlakant Laxman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-86d9e5ddb11fa754cd5c61b35793788634cfa8afb647457d228f41deb9b10cb33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Access control</topic><topic>Applications programs</topic><topic>Availability</topic><topic>Blockchain</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Confidentiality</topic><topic>Control data (computers)</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Data storage</topic><topic>Data Structures and Information Theory</topic><topic>End users</topic><topic>Integrity</topic><topic>Multimedia Information Systems</topic><topic>Privacy</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dewang, Rupesh Kumar</creatorcontrib><creatorcontrib>Yadav, Mahendra Pratap</creatorcontrib><creatorcontrib>Awasthi, Surbhit</creatorcontrib><creatorcontrib>Raj, Om</creatorcontrib><creatorcontrib>Mewada, Arvind</creatorcontrib><creatorcontrib>Bawankule, Kamlakant Laxman</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dewang, Rupesh Kumar</au><au>Yadav, Mahendra Pratap</au><au>Awasthi, Surbhit</au><au>Raj, Om</au><au>Mewada, Arvind</au><au>Bawankule, Kamlakant Laxman</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Data secure application: an application that allows developers to store user data securely using blockchain and IPFS</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2024-05-01</date><risdate>2024</risdate><volume>83</volume><issue>15</issue><spage>45491</spage><epage>45517</epage><pages>45491-45517</pages><issn>1573-7721</issn><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data, attacking your information, thereby losing data integrity, confidentiality, and availability. Cyberattack refers to the unauthorized intrusion of external personnel into a user’s private digital space. We have proposed a solution to provide secure data storage in third-party applications and leverage the power of Blockchain and Interplanetary File Systems. The proposed approach offers reliable role-based access to control data storage service that maintains data integrity, availability, and confidentiality. The proposed model uses the aforementioned technologies because they provide a distributed and decentralized nature of data storage and add-on support to data immutability. Traditionally the technologies used for such services are centralized and provide a single point of attack for the attacker. It puts confidential user data in jeopardy. The proposed solutions store encrypted data distributed to reduce reliance on big tech giants for data storage support and uproot the fear of collapsing systems due to a single point of failure.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-023-17204-w</doi><tpages>27</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1573-7721 |
ispartof | Multimedia tools and applications, 2024-05, Vol.83 (15), p.45491-45517 |
issn | 1573-7721 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_3048261305 |
source | SpringerLink |
subjects | Access control Applications programs Availability Blockchain Computer Communication Networks Computer Science Confidentiality Control data (computers) Cryptography Cybersecurity Data integrity Data storage Data Structures and Information Theory End users Integrity Multimedia Information Systems Privacy Special Purpose and Application-Based Systems |
title | Data secure application: an application that allows developers to store user data securely using blockchain and IPFS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T16%3A21%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Data%20secure%20application:%20an%20application%20that%20allows%20developers%20to%20store%20user%20data%20securely%20using%20blockchain%20and%20IPFS&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Dewang,%20Rupesh%20Kumar&rft.date=2024-05-01&rft.volume=83&rft.issue=15&rft.spage=45491&rft.epage=45517&rft.pages=45491-45517&rft.issn=1573-7721&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-023-17204-w&rft_dat=%3Cproquest_cross%3E3048261305%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3048261305&rft_id=info:pmid/&rfr_iscdi=true |