Skip to main content

Blockchain-Based Social Media Software Privacy Data Cloud Storage Method

  • Conference paper
  • First Online:
Advanced Hybrid Information Processing (ADHIP 2022)

Abstract

At present, the leakage of private data stored on social media software has attracted the attention of the academic community. Therefore, it is necessary to discuss the cloud storage method of private data of social media software in detail. In the process of using the social media software privacy data cloud storage method, there is a problem that the file storage takes too long. In order to alleviate the above problem, a blockchain-based social media software privacy data cloud storage method is designed. Obtain the identity management mechanism of social media software, formulate identity restriction plans according to the available scope of accounts, classify the risk factors of privacy information, improve the data reading mode, adjust the independence of data, and use the blockchain to set up the cloud storage structure. Experimental results: The file storage time of the social media software privacy data cloud storage method and the other two social media software privacy data cloud storage methods are: 2.672 s, 4.229 s, and 4.727, respectively. After the cloud storage method of software privacy data is combined, the application effect of the method is better.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hai-chun, Z., Xuan-xia, Y., Xue-feng, Z.: Cloud storage data integrity audit based on an index-stub table. Chin. J. Eng. 42(4), 490–499 (2020)

    Google Scholar 

  2. Shi, C., Lai, M., Li, S., et al. Integrity verification of dynamic multiple-replica data in cloud storage. J. Chengdu Univ (Natl. Sci.) 39(1), 64–68 (2020)

    Google Scholar 

  3. Li, S.-Q., Liu, L., Zhu, D.-Y., et al.: Protocol of dynamic provable data integrity for cloud storage. Comput. Sci. 47(2), 256–261 (2020)

    Google Scholar 

  4. Wang, L., Xu, Y., Kang, Y.: Simulation of node-level data privacy protection mining method in cloud computing. Comput. Simul. 37(10), 433–436, 460 (2020)

    Google Scholar 

  5. Liu, G.-J., Xiong, J.-B., Zhang, L.-N., et al.: An efficient privacy-preserving data auditing scheme for regenerating-code-based cloud storage. J. Southwest Univ. (Natl. Sci.) 42(10), 37–45 (2020)

    Google Scholar 

  6. Zhu, Y.-J., Yao, J.-G., Guan, H.-B.: Blockchain as a service: next generation of cloud services. J. Softw. 31(1), 1–19 (2020)

    Google Scholar 

  7. Wang, Q.-C., Chen, Q.-Y., Zhang, C., et al.: Study of medical privacy data security protection in 5G cloud-side collaboration scenarios. Telecom Eng. Tech. Stand. 33(12), 64–67 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianjun Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tang, J., Chen, X. (2023). Blockchain-Based Social Media Software Privacy Data Cloud Storage Method. In: Fu, W., Yun, L. (eds) Advanced Hybrid Information Processing. ADHIP 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 469. Springer, Cham. https://doi.org/10.1007/978-3-031-28867-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28867-8_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28866-1

  • Online ISBN: 978-3-031-28867-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics