Data secure application: an application that allows developers to store user data securely using blockchain and IPFS

Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2024-05, Vol.83 (15), p.45491-45517
Hauptverfasser: Dewang, Rupesh Kumar, Yadav, Mahendra Pratap, Awasthi, Surbhit, Raj, Om, Mewada, Arvind, Bawankule, Kamlakant Laxman
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 45517
container_issue 15
container_start_page 45491
container_title Multimedia tools and applications
container_volume 83
creator Dewang, Rupesh Kumar
Yadav, Mahendra Pratap
Awasthi, Surbhit
Raj, Om
Mewada, Arvind
Bawankule, Kamlakant Laxman
description Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data, attacking your information, thereby losing data integrity, confidentiality, and availability. Cyberattack refers to the unauthorized intrusion of external personnel into a user’s private digital space. We have proposed a solution to provide secure data storage in third-party applications and leverage the power of Blockchain and Interplanetary File Systems. The proposed approach offers reliable role-based access to control data storage service that maintains data integrity, availability, and confidentiality. The proposed model uses the aforementioned technologies because they provide a distributed and decentralized nature of data storage and add-on support to data immutability. Traditionally the technologies used for such services are centralized and provide a single point of attack for the attacker. It puts confidential user data in jeopardy. The proposed solutions store encrypted data distributed to reduce reliance on big tech giants for data storage support and uproot the fear of collapsing systems due to a single point of failure.
doi_str_mv 10.1007/s11042-023-17204-w
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3048261305</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3048261305</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-86d9e5ddb11fa754cd5c61b35793788634cfa8afb647457d228f41deb9b10cb33</originalsourceid><addsrcrecordid>eNp9kF1LwzAUhoMoOKd_wKuA19V8Nq13Mp0OBgrqdUiTdOusTU1Sx_690QruyquTE97nOfACcI7RJUZIXAWMESMZIjTDgiCWbQ_ABHNBMyEIPtx7H4OTEDYI4ZwTNgHxVkUFg9WDt1D1fdtoFRvXXUPV7e8wrlWEqm3dNkBjP23reusDjA6G6BI7BOuh-ZO1u_TVdCtYtU6_6bVqkq8zcPE0fz4FR7Vqgz37nVPwOr97mT1ky8f7xexmmWmKy5gVuSktN6bCuFaCM224znFFuSipKIqcMl2rQtVVzgTjwhBS1AwbW5UVRrqidAouRm_v3cdgQ5QbN_gunZQUsYLkmCKeUmRMae9C8LaWvW_eld9JjOR3u3JsV6Z25U-7cpsgOkIhhbuV9X_qf6gvfp1_Bg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3048261305</pqid></control><display><type>article</type><title>Data secure application: an application that allows developers to store user data securely using blockchain and IPFS</title><source>SpringerLink</source><creator>Dewang, Rupesh Kumar ; Yadav, Mahendra Pratap ; Awasthi, Surbhit ; Raj, Om ; Mewada, Arvind ; Bawankule, Kamlakant Laxman</creator><creatorcontrib>Dewang, Rupesh Kumar ; Yadav, Mahendra Pratap ; Awasthi, Surbhit ; Raj, Om ; Mewada, Arvind ; Bawankule, Kamlakant Laxman</creatorcontrib><description>Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data, attacking your information, thereby losing data integrity, confidentiality, and availability. Cyberattack refers to the unauthorized intrusion of external personnel into a user’s private digital space. We have proposed a solution to provide secure data storage in third-party applications and leverage the power of Blockchain and Interplanetary File Systems. The proposed approach offers reliable role-based access to control data storage service that maintains data integrity, availability, and confidentiality. The proposed model uses the aforementioned technologies because they provide a distributed and decentralized nature of data storage and add-on support to data immutability. Traditionally the technologies used for such services are centralized and provide a single point of attack for the attacker. It puts confidential user data in jeopardy. The proposed solutions store encrypted data distributed to reduce reliance on big tech giants for data storage support and uproot the fear of collapsing systems due to a single point of failure.</description><identifier>ISSN: 1573-7721</identifier><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-023-17204-w</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Applications programs ; Availability ; Blockchain ; Computer Communication Networks ; Computer Science ; Confidentiality ; Control data (computers) ; Cryptography ; Cybersecurity ; Data integrity ; Data storage ; Data Structures and Information Theory ; End users ; Integrity ; Multimedia Information Systems ; Privacy ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2024-05, Vol.83 (15), p.45491-45517</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-86d9e5ddb11fa754cd5c61b35793788634cfa8afb647457d228f41deb9b10cb33</citedby><cites>FETCH-LOGICAL-c319t-86d9e5ddb11fa754cd5c61b35793788634cfa8afb647457d228f41deb9b10cb33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-023-17204-w$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-023-17204-w$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Dewang, Rupesh Kumar</creatorcontrib><creatorcontrib>Yadav, Mahendra Pratap</creatorcontrib><creatorcontrib>Awasthi, Surbhit</creatorcontrib><creatorcontrib>Raj, Om</creatorcontrib><creatorcontrib>Mewada, Arvind</creatorcontrib><creatorcontrib>Bawankule, Kamlakant Laxman</creatorcontrib><title>Data secure application: an application that allows developers to store user data securely using blockchain and IPFS</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data, attacking your information, thereby losing data integrity, confidentiality, and availability. Cyberattack refers to the unauthorized intrusion of external personnel into a user’s private digital space. We have proposed a solution to provide secure data storage in third-party applications and leverage the power of Blockchain and Interplanetary File Systems. The proposed approach offers reliable role-based access to control data storage service that maintains data integrity, availability, and confidentiality. The proposed model uses the aforementioned technologies because they provide a distributed and decentralized nature of data storage and add-on support to data immutability. Traditionally the technologies used for such services are centralized and provide a single point of attack for the attacker. It puts confidential user data in jeopardy. The proposed solutions store encrypted data distributed to reduce reliance on big tech giants for data storage support and uproot the fear of collapsing systems due to a single point of failure.</description><subject>Access control</subject><subject>Applications programs</subject><subject>Availability</subject><subject>Blockchain</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Confidentiality</subject><subject>Control data (computers)</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Data storage</subject><subject>Data Structures and Information Theory</subject><subject>End users</subject><subject>Integrity</subject><subject>Multimedia Information Systems</subject><subject>Privacy</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1573-7721</issn><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kF1LwzAUhoMoOKd_wKuA19V8Nq13Mp0OBgrqdUiTdOusTU1Sx_690QruyquTE97nOfACcI7RJUZIXAWMESMZIjTDgiCWbQ_ABHNBMyEIPtx7H4OTEDYI4ZwTNgHxVkUFg9WDt1D1fdtoFRvXXUPV7e8wrlWEqm3dNkBjP23reusDjA6G6BI7BOuh-ZO1u_TVdCtYtU6_6bVqkq8zcPE0fz4FR7Vqgz37nVPwOr97mT1ky8f7xexmmWmKy5gVuSktN6bCuFaCM224znFFuSipKIqcMl2rQtVVzgTjwhBS1AwbW5UVRrqidAouRm_v3cdgQ5QbN_gunZQUsYLkmCKeUmRMae9C8LaWvW_eld9JjOR3u3JsV6Z25U-7cpsgOkIhhbuV9X_qf6gvfp1_Bg</recordid><startdate>20240501</startdate><enddate>20240501</enddate><creator>Dewang, Rupesh Kumar</creator><creator>Yadav, Mahendra Pratap</creator><creator>Awasthi, Surbhit</creator><creator>Raj, Om</creator><creator>Mewada, Arvind</creator><creator>Bawankule, Kamlakant Laxman</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20240501</creationdate><title>Data secure application: an application that allows developers to store user data securely using blockchain and IPFS</title><author>Dewang, Rupesh Kumar ; Yadav, Mahendra Pratap ; Awasthi, Surbhit ; Raj, Om ; Mewada, Arvind ; Bawankule, Kamlakant Laxman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-86d9e5ddb11fa754cd5c61b35793788634cfa8afb647457d228f41deb9b10cb33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Access control</topic><topic>Applications programs</topic><topic>Availability</topic><topic>Blockchain</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Confidentiality</topic><topic>Control data (computers)</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Data storage</topic><topic>Data Structures and Information Theory</topic><topic>End users</topic><topic>Integrity</topic><topic>Multimedia Information Systems</topic><topic>Privacy</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dewang, Rupesh Kumar</creatorcontrib><creatorcontrib>Yadav, Mahendra Pratap</creatorcontrib><creatorcontrib>Awasthi, Surbhit</creatorcontrib><creatorcontrib>Raj, Om</creatorcontrib><creatorcontrib>Mewada, Arvind</creatorcontrib><creatorcontrib>Bawankule, Kamlakant Laxman</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dewang, Rupesh Kumar</au><au>Yadav, Mahendra Pratap</au><au>Awasthi, Surbhit</au><au>Raj, Om</au><au>Mewada, Arvind</au><au>Bawankule, Kamlakant Laxman</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Data secure application: an application that allows developers to store user data securely using blockchain and IPFS</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2024-05-01</date><risdate>2024</risdate><volume>83</volume><issue>15</issue><spage>45491</spage><epage>45517</epage><pages>45491-45517</pages><issn>1573-7721</issn><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data, attacking your information, thereby losing data integrity, confidentiality, and availability. Cyberattack refers to the unauthorized intrusion of external personnel into a user’s private digital space. We have proposed a solution to provide secure data storage in third-party applications and leverage the power of Blockchain and Interplanetary File Systems. The proposed approach offers reliable role-based access to control data storage service that maintains data integrity, availability, and confidentiality. The proposed model uses the aforementioned technologies because they provide a distributed and decentralized nature of data storage and add-on support to data immutability. Traditionally the technologies used for such services are centralized and provide a single point of attack for the attacker. It puts confidential user data in jeopardy. The proposed solutions store encrypted data distributed to reduce reliance on big tech giants for data storage support and uproot the fear of collapsing systems due to a single point of failure.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-023-17204-w</doi><tpages>27</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1573-7721
ispartof Multimedia tools and applications, 2024-05, Vol.83 (15), p.45491-45517
issn 1573-7721
1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_3048261305
source SpringerLink
subjects Access control
Applications programs
Availability
Blockchain
Computer Communication Networks
Computer Science
Confidentiality
Control data (computers)
Cryptography
Cybersecurity
Data integrity
Data storage
Data Structures and Information Theory
End users
Integrity
Multimedia Information Systems
Privacy
Special Purpose and Application-Based Systems
title Data secure application: an application that allows developers to store user data securely using blockchain and IPFS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T16%3A21%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Data%20secure%20application:%20an%20application%20that%20allows%20developers%20to%20store%20user%20data%20securely%20using%20blockchain%20and%20IPFS&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Dewang,%20Rupesh%20Kumar&rft.date=2024-05-01&rft.volume=83&rft.issue=15&rft.spage=45491&rft.epage=45517&rft.pages=45491-45517&rft.issn=1573-7721&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-023-17204-w&rft_dat=%3Cproquest_cross%3E3048261305%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3048261305&rft_id=info:pmid/&rfr_iscdi=true