基于区块链的数据存储与访问验证的实现

Vyshnavi Ankam, N. M. Reddy, Mohammed Mutahar Mujahid
{"title":"基于区块链的数据存储与访问验证的实现","authors":"Vyshnavi Ankam, N. M. Reddy, Mohammed Mutahar Mujahid","doi":"10.36647/ttidmkd/02.03.a001","DOIUrl":null,"url":null,"abstract":"Verification for access is used in software to secure information of the user. There are some kinds of verification process, however, as per the secondary information; major users prefer the biometric verification process. On the other hand, block chain based data storage is used in businesses, banking sectors, and other sectors. In this case, this process helps to store confidential information with proper security. This research is focused on the implementation process of block chain based data storage and verification access control. The aim of this research is to demonstrate the importance of block chain data storage and verification access control in various sectors to store and secure information of the users. This research has used the quantitative research data collection method to collect information on block chain and verification access. As per the information, it can be stated that the user has increased demand for block chain due to its verification ability, and it’s other benefits such as increased speed of work, traceability, track of confidential data, and others. In this research, the implementation process of block chain has been discussed with an algorithm flowchart. As per the flowchart, there is a node that helps to store the information of the user and increase the value of block chain data storage. As per the result of this research, there are few steps to implement data storage and those are increasing knowledge on block chain and verification, and strategizing block chain, and plan to implement that. After that, the simulation process needs to be entered in this process to check the progress of implementation. In this research work, the FMS model is discussed to focus on the implementation of verification for access. Keyword : Blockchain, data storage, verification access control, technology, CSE","PeriodicalId":314032,"journal":{"name":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation of Blockchain Based Data Storage and Verification for Access\",\"authors\":\"Vyshnavi Ankam, N. M. Reddy, Mohammed Mutahar Mujahid\",\"doi\":\"10.36647/ttidmkd/02.03.a001\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Verification for access is used in software to secure information of the user. There are some kinds of verification process, however, as per the secondary information; major users prefer the biometric verification process. On the other hand, block chain based data storage is used in businesses, banking sectors, and other sectors. In this case, this process helps to store confidential information with proper security. This research is focused on the implementation process of block chain based data storage and verification access control. The aim of this research is to demonstrate the importance of block chain data storage and verification access control in various sectors to store and secure information of the users. This research has used the quantitative research data collection method to collect information on block chain and verification access. As per the information, it can be stated that the user has increased demand for block chain due to its verification ability, and it’s other benefits such as increased speed of work, traceability, track of confidential data, and others. In this research, the implementation process of block chain has been discussed with an algorithm flowchart. As per the flowchart, there is a node that helps to store the information of the user and increase the value of block chain data storage. As per the result of this research, there are few steps to implement data storage and those are increasing knowledge on block chain and verification, and strategizing block chain, and plan to implement that. After that, the simulation process needs to be entered in this process to check the progress of implementation. In this research work, the FMS model is discussed to focus on the implementation of verification for access. Keyword : Blockchain, data storage, verification access control, technology, CSE\",\"PeriodicalId\":314032,\"journal\":{\"name\":\"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.36647/ttidmkd/02.03.a001\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"TechnoareteTransactions on Intelligent Data Mining and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36647/ttidmkd/02.03.a001","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在软件中使用访问验证来保护用户的信息。然而,根据二级资料,有一些核查过程;大多数用户更喜欢生物识别验证过程。另一方面,基于区块链的数据存储用于商业、银行部门和其他部门。在这种情况下,此过程有助于以适当的安全性存储机密信息。本文主要研究了基于区块链的数据存储和验证访问控制的实现过程。本研究的目的是证明区块链数据存储和各个部门的验证访问控制对于存储和保护用户信息的重要性。本研究采用定量研究数据收集的方法,对区块链信息进行收集和验证访问。根据这些信息,用户对区块链的需求增加是因为它的验证能力,以及它的其他好处,如提高工作速度、可追溯性、跟踪机密数据等。在本研究中,讨论了区块链的实现过程,并给出了算法流程图。根据流程图,有一个节点有助于存储用户的信息,增加区块链数据存储的价值。根据本研究的结果,实现数据存储的步骤很少,即增加对区块链和验证的了解,制定区块链战略,并计划实施。之后,需要在此流程中进入仿真流程,以检查实施进度。在本研究工作中,讨论了FMS模型,重点研究了访问验证的实现。关键词:区块链,数据存储,验证访问控制,技术,CSE
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Implementation of Blockchain Based Data Storage and Verification for Access
Verification for access is used in software to secure information of the user. There are some kinds of verification process, however, as per the secondary information; major users prefer the biometric verification process. On the other hand, block chain based data storage is used in businesses, banking sectors, and other sectors. In this case, this process helps to store confidential information with proper security. This research is focused on the implementation process of block chain based data storage and verification access control. The aim of this research is to demonstrate the importance of block chain data storage and verification access control in various sectors to store and secure information of the users. This research has used the quantitative research data collection method to collect information on block chain and verification access. As per the information, it can be stated that the user has increased demand for block chain due to its verification ability, and it’s other benefits such as increased speed of work, traceability, track of confidential data, and others. In this research, the implementation process of block chain has been discussed with an algorithm flowchart. As per the flowchart, there is a node that helps to store the information of the user and increase the value of block chain data storage. As per the result of this research, there are few steps to implement data storage and those are increasing knowledge on block chain and verification, and strategizing block chain, and plan to implement that. After that, the simulation process needs to be entered in this process to check the progress of implementation. In this research work, the FMS model is discussed to focus on the implementation of verification for access. Keyword : Blockchain, data storage, verification access control, technology, CSE
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Adaptation of Text Mining as Text Data Mining, Similar to Text Analytics for the Process of Driving High-Quality Information from Text Application of Spatial Data Mining in the Process of Discovering Interesting and Previously Unknown, but Potentially Useful, Patterns from Large Spatial Datasets Aspect of the Knowledge Representation Framework (KR Framework) for Offering the Basis for a Number of Research Activities in the Caisor Expert Systems for Emulating the Decision Making Ability of a Human Expert Role of Data Visualization in Storytelling by Curating Data into an Easier form
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1