{"title":"An efficient integrity based multi-user blockchain framework for heterogeneous supply chain management applications","authors":"Mani Deep Karumanchi, J. I. Sheeba, S. Devaneyan","doi":"10.1080/1206212X.2023.2199966","DOIUrl":null,"url":null,"abstract":"Most of the traditional cloud-based applications are insecure and difficult to compute the data integrity with variable hash size on heterogeneous supply chain datasets. Also, cloud storage systems are independent of integrity computational and data security due to structured data and computational memory. As the size of the cloud data files is increasing in the public and private cloud servers, it is difficult to provide strong data security due to file format and high dimensionality. The computational time and storage space of the conventional attribute-based encryption and decryption models are high during the data integrity verification in the traditional blockchain frameworks. This paper implements a hybrid variable size data integrity algorithm on the heterogeneous cloud supply chain data files for the strong data encryption and decryption process. This work implements an optimized blockchain framework using the advanced heterogeneous integrity computation approach and integrity policy-based attribute encryption and decryption approach for better cloud data security. Experimental results proved that the proposed integrity-based encryption model has better efficiency than the traditional integrity-based encryption frameworks on cloud heterogeneous data types.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"19 1","pages":"337 - 351"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computers and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/1206212X.2023.2199966","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 1
Abstract
Most of the traditional cloud-based applications are insecure and difficult to compute the data integrity with variable hash size on heterogeneous supply chain datasets. Also, cloud storage systems are independent of integrity computational and data security due to structured data and computational memory. As the size of the cloud data files is increasing in the public and private cloud servers, it is difficult to provide strong data security due to file format and high dimensionality. The computational time and storage space of the conventional attribute-based encryption and decryption models are high during the data integrity verification in the traditional blockchain frameworks. This paper implements a hybrid variable size data integrity algorithm on the heterogeneous cloud supply chain data files for the strong data encryption and decryption process. This work implements an optimized blockchain framework using the advanced heterogeneous integrity computation approach and integrity policy-based attribute encryption and decryption approach for better cloud data security. Experimental results proved that the proposed integrity-based encryption model has better efficiency than the traditional integrity-based encryption frameworks on cloud heterogeneous data types.
期刊介绍:
The International Journal of Computers and Applications (IJCA) is a unique platform for publishing novel ideas, research outcomes and fundamental advances in all aspects of Computer Science, Computer Engineering, and Computer Applications. This is a peer-reviewed international journal with a vision to provide the academic and industrial community a platform for presenting original research ideas and applications. IJCA welcomes four special types of papers in addition to the regular research papers within its scope: (a) Papers for which all results could be easily reproducible. For such papers, the authors will be asked to upload "instructions for reproduction'''', possibly with the source codes or stable URLs (from where the codes could be downloaded). (b) Papers with negative results. For such papers, the experimental setting and negative results must be presented in detail. Also, why the negative results are important for the research community must be explained clearly. The rationale behind this kind of paper is that this would help researchers choose the correct approaches to solve problems and avoid the (already worked out) failed approaches. (c) Detailed report, case study and literature review articles about innovative software / hardware, new technology, high impact computer applications and future development with sufficient background and subject coverage. (d) Special issue papers focussing on a particular theme with significant importance or papers selected from a relevant conference with sufficient improvement and new material to differentiate from the papers published in a conference proceedings.