Two Fish Encryption Based Blockchain Technology for Secured Data Storage

09/21/2023
by   Dinesh Kumar K, et al.
0

Data security and sharing remains nuisance among many applications like business data, medical data, banking data etc. In this research, block chain technology is built with encryption algorithm for high level data security in cloud storage. Medical data security seems critical aspect due to sensitivity of patient information. Unauthorized access of medical data creates major issue to patients. This article proposed block chain with hybrid encryption technique for securing medical data stored in block chain model at cloud storage. New Two fish encryption model is implemented based on RSA Multiple Precision Arithmetic. MPA works by using library concept. The objective of using this methodology is to enhance security performance with less execution time. Patient data is processed by encryption algorithm and stored at blockchain infrastructure using encrypted key. Access permission allows user to read or write the medical data attached in block chain framework. The performance of traditional cryptographic techniques is very less in providing security infrastructure.

READ FULL TEXT

page 5

page 8

research
09/08/2023

Blockchain-enabled Data Governance for Privacy-Preserved Sharing of Confidential Data

In a traditional cloud storage system, users benefit from the convenienc...
research
10/22/2017

Meta-Key: A Secure Data-Sharing Protocol under Blockchain-Based Decentralised Storage Architecture

In this paper a secure data-sharing protocol under blockchain-based dece...
research
11/19/2019

Audita: A Blockchain-based Auditing Framework for Off-chain Storage

The cloud changed the way we manage and store data. Today, cloud storage...
research
08/13/2019

Blockchain Tree for eHealth

The design of access control mechanisms for healthcare systems is challe...
research
07/03/2023

Patient-centric health data sovereignty: an approach using Proxy re-encryption

The exponential growth in the digitisation of services implies the handl...
research
01/23/2019

Circular All-Or-Nothing: Revisiting Data Protection Against Key Exposure

Rivest's seminal paper introduced the first All-Or-Nothing (AON) method ...
research
12/04/2020

Hybrid Chaotic Method for Medical Images Ciphering

Healthcare is an essential application of e-services, where for diagnost...

Please sign up or login with your details

Forgot password? Click here to reset