Secure Cloud Storage with Blockchain for Confidential Data 🔒
Analyzes blockchain-based secure cloud storage for confidential data, including implementation steps like network setup.

PhDDirection
21 views • Dec 18, 2024

About this video
Title :- Blockchain Based Secure Cloud Storage Architecture for Confidential Data Management
Implementation plan:
Step 1: Initially, we construct a Network with 50 -- Users 2-- Base Stations, 1-- Blockchain node, 1-- cloud server.
step 2: Then, we register the users with “Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC)” authentication.
Step 3: Next, we collect the users data stored in a blockchain-based encrypted storage architecture .
Step 4: Next, we encrypt the data using AES (Advanced Encryption Standard) method then decrypt the encrypted data.
Step 5:Next, we integrate blockchain with cloud .
step 6:Next, we retrive the data stored in blockchain-based secured storage system.
Step 7:Finally, we plot performance for the following metrics:
7.1: Number of Users vs Throughput (Kbps).
7.2: Number of Users vs Latency (ms)
7.3: Number of Transactions vs Execution Time(ms)
7.4: Number of Users vs Packet Delivery Ratio(%)
Software Requirement:
1. Development Tool: NS-3.26 or above with python and Ganache.
2. Operating System: Ubuntu 18.04 or above (64-bit)
Note:
[1] If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.
[2] Please note that this implementation plan does not include any further steps after it is put into implementation.
[3] Please understand that any modifications made to the confirmed implementation plan will not be made before or after the project development.
[4] If the above plan satisfies your requirement please confirm with us.
We perform the EXISTING Approach based on the Reference 2:Title:-“Auditable attribute‐based data access control using blockchain in cloud storage”
-------------------------------------------------------------------------------------
1. #CloudStorageSecurity
2. #BlockchainTechnology
3. #DataConfidentiality
4. #PerformanceAnalysis
5. #SecureDataStorage
6. #BlockchainInCloud
7. #ConfidentialDataProtection
8. #DataSecurityResearch
9. #CloudComputingTrends
10. #InnovativeThesisIdeas
------------------------------------------------------------------------------------------
We offer a Complete research solution for PHD & MS scholars for their research work.
The aforementioned video elucidates our provision of research assistance to esteemed research scholars.
visit us at : https://www.phddirection.com/
mail us at : phddirection@gmail.com
call us at : +91 94448 29042
Implementation plan:
Step 1: Initially, we construct a Network with 50 -- Users 2-- Base Stations, 1-- Blockchain node, 1-- cloud server.
step 2: Then, we register the users with “Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC)” authentication.
Step 3: Next, we collect the users data stored in a blockchain-based encrypted storage architecture .
Step 4: Next, we encrypt the data using AES (Advanced Encryption Standard) method then decrypt the encrypted data.
Step 5:Next, we integrate blockchain with cloud .
step 6:Next, we retrive the data stored in blockchain-based secured storage system.
Step 7:Finally, we plot performance for the following metrics:
7.1: Number of Users vs Throughput (Kbps).
7.2: Number of Users vs Latency (ms)
7.3: Number of Transactions vs Execution Time(ms)
7.4: Number of Users vs Packet Delivery Ratio(%)
Software Requirement:
1. Development Tool: NS-3.26 or above with python and Ganache.
2. Operating System: Ubuntu 18.04 or above (64-bit)
Note:
[1] If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.
[2] Please note that this implementation plan does not include any further steps after it is put into implementation.
[3] Please understand that any modifications made to the confirmed implementation plan will not be made before or after the project development.
[4] If the above plan satisfies your requirement please confirm with us.
We perform the EXISTING Approach based on the Reference 2:Title:-“Auditable attribute‐based data access control using blockchain in cloud storage”
-------------------------------------------------------------------------------------
1. #CloudStorageSecurity
2. #BlockchainTechnology
3. #DataConfidentiality
4. #PerformanceAnalysis
5. #SecureDataStorage
6. #BlockchainInCloud
7. #ConfidentialDataProtection
8. #DataSecurityResearch
9. #CloudComputingTrends
10. #InnovativeThesisIdeas
------------------------------------------------------------------------------------------
We offer a Complete research solution for PHD & MS scholars for their research work.
The aforementioned video elucidates our provision of research assistance to esteemed research scholars.
visit us at : https://www.phddirection.com/
mail us at : phddirection@gmail.com
call us at : +91 94448 29042
Video Information
Views
21
Duration
6:08
Published
Dec 18, 2024