An efficient integrity based multi-user blockchain framework for heterogeneous supply chain management applications

Mani Deep Karumanchi, J. I. Sheeba, S. Devaneyan
{"title":"An efficient integrity based multi-user blockchain framework for heterogeneous supply chain management applications","authors":"Mani Deep Karumanchi, J. I. Sheeba, S. Devaneyan","doi":"10.1080/1206212X.2023.2199966","DOIUrl":null,"url":null,"abstract":"Most of the traditional cloud-based applications are insecure and difficult to compute the data integrity with variable hash size on heterogeneous supply chain datasets. Also, cloud storage systems are independent of integrity computational and data security due to structured data and computational memory. As the size of the cloud data files is increasing in the public and private cloud servers, it is difficult to provide strong data security due to file format and high dimensionality. The computational time and storage space of the conventional attribute-based encryption and decryption models are high during the data integrity verification in the traditional blockchain frameworks. This paper implements a hybrid variable size data integrity algorithm on the heterogeneous cloud supply chain data files for the strong data encryption and decryption process. This work implements an optimized blockchain framework using the advanced heterogeneous integrity computation approach and integrity policy-based attribute encryption and decryption approach for better cloud data security. Experimental results proved that the proposed integrity-based encryption model has better efficiency than the traditional integrity-based encryption frameworks on cloud heterogeneous data types.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"19 1","pages":"337 - 351"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computers and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/1206212X.2023.2199966","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 1

Abstract

Most of the traditional cloud-based applications are insecure and difficult to compute the data integrity with variable hash size on heterogeneous supply chain datasets. Also, cloud storage systems are independent of integrity computational and data security due to structured data and computational memory. As the size of the cloud data files is increasing in the public and private cloud servers, it is difficult to provide strong data security due to file format and high dimensionality. The computational time and storage space of the conventional attribute-based encryption and decryption models are high during the data integrity verification in the traditional blockchain frameworks. This paper implements a hybrid variable size data integrity algorithm on the heterogeneous cloud supply chain data files for the strong data encryption and decryption process. This work implements an optimized blockchain framework using the advanced heterogeneous integrity computation approach and integrity policy-based attribute encryption and decryption approach for better cloud data security. Experimental results proved that the proposed integrity-based encryption model has better efficiency than the traditional integrity-based encryption frameworks on cloud heterogeneous data types.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种高效的基于完整性的多用户区块链框架,用于异构供应链管理应用
传统的基于云的应用程序大多不安全,难以在异构供应链数据集上计算变量哈希大小的数据完整性。此外,由于结构化数据和计算内存,云存储系统独立于完整性计算和数据安全。随着云数据文件在公有云和私有云服务器上的规模越来越大,由于文件格式和高维,难以提供强大的数据安全性。在传统的区块链框架中,传统的基于属性的加解密模型在数据完整性验证过程中计算时间和存储空间都很高。本文在异构云供应链数据文件上实现了一种混合变大小数据完整性算法,用于强数据加解密过程。本工作使用先进的异构完整性计算方法和基于完整性策略的属性加解密方法实现了优化的区块链框架,以提高云数据的安全性。实验结果表明,在云异构数据类型上,本文提出的基于完整性的加密模型比传统的基于完整性的加密框架具有更高的效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Computers and Applications
International Journal of Computers and Applications Computer Science-Computer Graphics and Computer-Aided Design
CiteScore
4.70
自引率
0.00%
发文量
20
期刊介绍: The International Journal of Computers and Applications (IJCA) is a unique platform for publishing novel ideas, research outcomes and fundamental advances in all aspects of Computer Science, Computer Engineering, and Computer Applications. This is a peer-reviewed international journal with a vision to provide the academic and industrial community a platform for presenting original research ideas and applications. IJCA welcomes four special types of papers in addition to the regular research papers within its scope: (a) Papers for which all results could be easily reproducible. For such papers, the authors will be asked to upload "instructions for reproduction'''', possibly with the source codes or stable URLs (from where the codes could be downloaded). (b) Papers with negative results. For such papers, the experimental setting and negative results must be presented in detail. Also, why the negative results are important for the research community must be explained clearly. The rationale behind this kind of paper is that this would help researchers choose the correct approaches to solve problems and avoid the (already worked out) failed approaches. (c) Detailed report, case study and literature review articles about innovative software / hardware, new technology, high impact computer applications and future development with sufficient background and subject coverage. (d) Special issue papers focussing on a particular theme with significant importance or papers selected from a relevant conference with sufficient improvement and new material to differentiate from the papers published in a conference proceedings.
期刊最新文献
Weight assignment in cloud service selection based on FAHP and rough sets The social force model: a behavioral modeling approach for information propagation during significant events A comprehensive study on social networks analysis and mining to detect opinion leaders A machine learning approach for skin lesion classification on iOS: implementing and optimizing a convolutional transfer learning model with Create ML Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1