Skip to main content
Log in

Data secure application: an application that allows developers to store user data securely using blockchain and IPFS

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data, attacking your information, thereby losing data integrity, confidentiality, and availability. Cyberattack refers to the unauthorized intrusion of external personnel into a user’s private digital space. We have proposed a solution to provide secure data storage in third-party applications and leverage the power of Blockchain and Interplanetary File Systems. The proposed approach offers reliable role-based access to control data storage service that maintains data integrity, availability, and confidentiality. The proposed model uses the aforementioned technologies because they provide a distributed and decentralized nature of data storage and add-on support to data immutability. Traditionally the technologies used for such services are centralized and provide a single point of attack for the attacker. It puts confidential user data in jeopardy. The proposed solutions store encrypted data distributed to reduce reliance on big tech giants for data storage support and uproot the fear of collapsing systems due to a single point of failure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Algorithm 6
Algorithm 7
Algorithm 8
Algorithm 9
Algorithm 10
Algorithm 11
Algorithm 12
Algorithm 13
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Availability of Data and Materials

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study’.

References

  1. Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Int Serv Appl 1:7–18

    Article  Google Scholar 

  2. Pratap Yadav M, Pal N, Kumar Yadav D (2021) A formal approach for docker container deployment. Concurr Comput Pract Exp 33(20):e6364

    Article  Google Scholar 

  3. Wang S, Zhang Y, Zhang Y (2018) A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. Ieee Access 6:38437–38450

    Article  Google Scholar 

  4. Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J (2022) Rsm analysis based cloud access security broker: a systematic literature review. Cluster Comput 25(5):3733–3763

    Article  Google Scholar 

  5. Rao RV, Selvamani K (2015) Data security challenges and its solutions in cloud computing. Proced Comput Sci 48:204–209

    Article  Google Scholar 

  6. Yang P, Xiong N, Ren J (2020) Data security and privacy protection for cloud storage: A survey. IEEE Access 8:131723–131740

    Article  Google Scholar 

  7. Rafique A, Van Landuyt D, Beni EH, Lagaisse B, Joosen W (2021) Cryptdice: Distributed data protection system for secure cloud data storage and computation. Inf Syst 96:101671

    Article  Google Scholar 

  8. Gray C (2014) Storj vs. dropbox: Why decentralized storage is the future. On line at: https://bitcoinmagazine.com/articles/storjvs-dropboxdecentralized-storage-future, 1408177107

  9. Benet J (2014) Ipfs-content addressed, versioned, p2p file system. arXiv:1407.3561

  10. Nyo MT, Mebarek-Oudina F, Hlaing SS, Khan NA (2022) Otsu’s thresholding technique for mri image brain tumor segmentation. Multimed Tools Appl 81(30):43837–43849

    Article  Google Scholar 

  11. Zhang J, Wang XA, Ma J (2015) Data owner based attribute based encryption. In 2015 international conference on intelligent networking and collaborative systems. IEEE, pp 144–148

  12. Zarrin J, Wen Phang H, Babu Saheer L, Zarrin B (2021) Blockchain for decentralization of internet: prospects, trends, and challenges. Cluster Comput 24(4):2841–2866

    Article  Google Scholar 

  13. Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentral Bus Rev

  14. Decuyper X (2020) How does a blockchain work - simply explained. https://www.youtube.com/watch?v=SSo_EIwHSd4. Accessed 01 June 2020

  15. Prakash R, Anoop VS, Asharaf S (2022) Blockchain technology for cybersecurity: A text mining literature analysis. Int J Inf Manag Data Ins 2(2):100112

    Google Scholar 

  16. Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telemat Inf 36:55–81

    Article  Google Scholar 

  17. Khan SN, Loukil F, Ghedira-Guegan C, Benkhelifa E, Bani-Hani A (2021) Blockchain smart contracts: Applications, challenges, and future trends. Peer-to-peer Netw Appl 14:2901–2925

    Article  Google Scholar 

  18. Laurent A, Brotcorne L, Fortz B (2022) Transaction fees optimization in the ethereum blockchain. Blockchain Res Appl 3(3):100074

    Article  Google Scholar 

  19. Etherscan API. https://etherscan.io/apis. Accessed 02 June 2020

  20. Gwei to INR (Gwei to Indian Rupee). https://www.cryps.info/en/Gwei_to_INR/. Accessed 03 June 2020

  21. Blockchain for financial services. https://ibm.com/blockchain/industries/financial-services. Accessed 29 May 2020

  22. Blockchain for the supply chain. https://www.ibm.com/blockchain/industries/supply-chain. Accessed 29 May 2020

  23. Fromknecht C, Velicanu D, Yakoubov S (2014) A decentralized public key infrastructure with identity retention. Cryptol ePrint Archive

  24. Zyskind G, Nathan O et al (2015) Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops. IEEE, pp 180–184

  25. Rahulamathavan Y, Phan RC-W, Rajarajan M, Misra S, Kondoz A (2017) Privacy-preserving blockchain based iot ecosystem using attribute-based encryption. In 2017 IEEE international conference on advanced networks and telecommunications systems (ANTS). IEEE, pp 1–6

  26. Es-Samaali H, Outchakoucht A, Leroy JP (2017) A blockchain-based access control for big data. Int J Comput Netw Commun Secur 5(7):137

    Google Scholar 

  27. IPFS powers the distributed Web. https://ipfs.io/. Accessed 29 May 2020

  28. Vorick D, Champine L (2014) Sia: Simple decentralized storage. Retriev May 8:2018

  29. Storj Labs I (2018) Storj: A decentralized cloud storage network framework

  30. Labs P (2017) Filecoin: A decentralized storage network

  31. Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncert Fuzz Knowl-based Syst 10(5):557–570

    Article  MathSciNet  Google Scholar 

  32. Li N, Li T, Venkatasubramanian S (2006) t-closeness: Privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd international conference on data engineering. IEEE, pp 106–115

  33. Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) l-diversity: Privacy beyond k-anonymity. ACM Trans Knowl Disc Data (TKDD) 1(1):3–es

  34. Narayanan A, Shmatikov V (2006) How to break anonymity of the netflix prize dataset. arXiv:cs/0610105

  35. Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on theory of computing. pp 169–178

  36. Wang S, Zhang Y, Zhang Y (2018) A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6:38437–38450

  37. Benet J, Greco N (2018) Filecoin: a decentralized storage network. Protocol Labs

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahendra Pratap Yadav.

Ethics declarations

Funding and/or Conflicts of interests/Competing interests

This work has not any funding support, it has not any conficts of interests or competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dewang, R.K., Yadav, M.P., Awasthi, S. et al. Data secure application: an application that allows developers to store user data securely using blockchain and IPFS. Multimed Tools Appl 83, 45491–45517 (2024). https://doi.org/10.1007/s11042-023-17204-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17204-w

Keywords

Navigation