Abstract
Due to the COVID-19 pandemic, the use of software applications has increased by end users, which is an issue regarding user data privacy. Numerous apps are collecting sensitive data like user location and phone number, which are becoming hotspots for cyber-attacks. A cyberattack breaches your data, attacking your information, thereby losing data integrity, confidentiality, and availability. Cyberattack refers to the unauthorized intrusion of external personnel into a user’s private digital space. We have proposed a solution to provide secure data storage in third-party applications and leverage the power of Blockchain and Interplanetary File Systems. The proposed approach offers reliable role-based access to control data storage service that maintains data integrity, availability, and confidentiality. The proposed model uses the aforementioned technologies because they provide a distributed and decentralized nature of data storage and add-on support to data immutability. Traditionally the technologies used for such services are centralized and provide a single point of attack for the attacker. It puts confidential user data in jeopardy. The proposed solutions store encrypted data distributed to reduce reliance on big tech giants for data storage support and uproot the fear of collapsing systems due to a single point of failure.
Similar content being viewed by others
Availability of Data and Materials
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study’.
References
Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Int Serv Appl 1:7–18
Pratap Yadav M, Pal N, Kumar Yadav D (2021) A formal approach for docker container deployment. Concurr Comput Pract Exp 33(20):e6364
Wang S, Zhang Y, Zhang Y (2018) A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. Ieee Access 6:38437–38450
Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J (2022) Rsm analysis based cloud access security broker: a systematic literature review. Cluster Comput 25(5):3733–3763
Rao RV, Selvamani K (2015) Data security challenges and its solutions in cloud computing. Proced Comput Sci 48:204–209
Yang P, Xiong N, Ren J (2020) Data security and privacy protection for cloud storage: A survey. IEEE Access 8:131723–131740
Rafique A, Van Landuyt D, Beni EH, Lagaisse B, Joosen W (2021) Cryptdice: Distributed data protection system for secure cloud data storage and computation. Inf Syst 96:101671
Gray C (2014) Storj vs. dropbox: Why decentralized storage is the future. On line at: https://bitcoinmagazine.com/articles/storjvs-dropboxdecentralized-storage-future, 1408177107
Benet J (2014) Ipfs-content addressed, versioned, p2p file system. arXiv:1407.3561
Nyo MT, Mebarek-Oudina F, Hlaing SS, Khan NA (2022) Otsu’s thresholding technique for mri image brain tumor segmentation. Multimed Tools Appl 81(30):43837–43849
Zhang J, Wang XA, Ma J (2015) Data owner based attribute based encryption. In 2015 international conference on intelligent networking and collaborative systems. IEEE, pp 144–148
Zarrin J, Wen Phang H, Babu Saheer L, Zarrin B (2021) Blockchain for decentralization of internet: prospects, trends, and challenges. Cluster Comput 24(4):2841–2866
Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentral Bus Rev
Decuyper X (2020) How does a blockchain work - simply explained. https://www.youtube.com/watch?v=SSo_EIwHSd4. Accessed 01 June 2020
Prakash R, Anoop VS, Asharaf S (2022) Blockchain technology for cybersecurity: A text mining literature analysis. Int J Inf Manag Data Ins 2(2):100112
Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telemat Inf 36:55–81
Khan SN, Loukil F, Ghedira-Guegan C, Benkhelifa E, Bani-Hani A (2021) Blockchain smart contracts: Applications, challenges, and future trends. Peer-to-peer Netw Appl 14:2901–2925
Laurent A, Brotcorne L, Fortz B (2022) Transaction fees optimization in the ethereum blockchain. Blockchain Res Appl 3(3):100074
Etherscan API. https://etherscan.io/apis. Accessed 02 June 2020
Gwei to INR (Gwei to Indian Rupee). https://www.cryps.info/en/Gwei_to_INR/. Accessed 03 June 2020
Blockchain for financial services. https://ibm.com/blockchain/industries/financial-services. Accessed 29 May 2020
Blockchain for the supply chain. https://www.ibm.com/blockchain/industries/supply-chain. Accessed 29 May 2020
Fromknecht C, Velicanu D, Yakoubov S (2014) A decentralized public key infrastructure with identity retention. Cryptol ePrint Archive
Zyskind G, Nathan O et al (2015) Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops. IEEE, pp 180–184
Rahulamathavan Y, Phan RC-W, Rajarajan M, Misra S, Kondoz A (2017) Privacy-preserving blockchain based iot ecosystem using attribute-based encryption. In 2017 IEEE international conference on advanced networks and telecommunications systems (ANTS). IEEE, pp 1–6
Es-Samaali H, Outchakoucht A, Leroy JP (2017) A blockchain-based access control for big data. Int J Comput Netw Commun Secur 5(7):137
IPFS powers the distributed Web. https://ipfs.io/. Accessed 29 May 2020
Vorick D, Champine L (2014) Sia: Simple decentralized storage. Retriev May 8:2018
Storj Labs I (2018) Storj: A decentralized cloud storage network framework
Labs P (2017) Filecoin: A decentralized storage network
Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncert Fuzz Knowl-based Syst 10(5):557–570
Li N, Li T, Venkatasubramanian S (2006) t-closeness: Privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd international conference on data engineering. IEEE, pp 106–115
Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) l-diversity: Privacy beyond k-anonymity. ACM Trans Knowl Disc Data (TKDD) 1(1):3–es
Narayanan A, Shmatikov V (2006) How to break anonymity of the netflix prize dataset. arXiv:cs/0610105
Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on theory of computing. pp 169–178
Wang S, Zhang Y, Zhang Y (2018) A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6:38437–38450
Benet J, Greco N (2018) Filecoin: a decentralized storage network. Protocol Labs
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Funding and/or Conflicts of interests/Competing interests
This work has not any funding support, it has not any conficts of interests or competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Dewang, R.K., Yadav, M.P., Awasthi, S. et al. Data secure application: an application that allows developers to store user data securely using blockchain and IPFS. Multimed Tools Appl 83, 45491–45517 (2024). https://doi.org/10.1007/s11042-023-17204-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-17204-w