IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

BLOCKCHAIN-BASED SECURE DATA STORAGE FRAMEWORK FOR CLOUD COMPUTING

AUTHORS:
Subasri E
Mentor
Dr. B. Leelavathi
Affiliation
Department of Computer Technology, Dr. N.G.P. Arts and Science College, Coimbatore, India
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

Data storage has been transformed by cloud computing, which offers scalable, flexible, and affordable services. Centralized cloud architectures are still susceptible to insider threats, data manipulation, integrity breaches, and a lack of transparency, though. In cloud systems, ensuring data integrity and trust has emerged as a significant research topic. In order to provide a decentralized and impenetrable verification method, this study suggests a Blockchain-Based Secure Data Storage Framework that combines blockchain technology with cloud computing.


The Advanced Encryption Standard (AES) is used in the suggested method to encrypt files prior to cloud storage. Smart contracts are used to create and store a SHA-256 cryptographic hash of the encrypted file on the blockchain.


The hybrid design uses blockchain's immutability for secure integrity verification while ensuring scalability using off-chain cloud storage. In order to identify any unauthorized changes, the system recalculates the file hash during data retrieval and compares it with the blockchain record. The suggested approach guarantees safe data verification in cloud contexts, increases transparency, strengthens auditability, and does away with centralized trust dependency.In comparison to conventional cloud storage systems, experimental study shows enhanced security and dependable tamper detection

Keywords
Article Metrics
Article Views
38
PDF Downloads
1
HOW TO CITE
APA

MLA

Chicago

Copy

E, S. (2026). Blockchain-Based Secure Data Storage Framework for Cloud Computing. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.101

E, Subasri. "Blockchain-Based Secure Data Storage Framework for Cloud Computing." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.101.

E, Subasri. "Blockchain-Based Secure Data Storage Framework for Cloud Computing." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.101.

References
1.S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008.

2.V. Buterin, “A Next-Generation Smart Contract and Decentralized Application Platform,” Ethereum Whitepaper, 2014.

3.M. Castro and B. Liskov, “Practical Byzantine Fault Tolerance,” Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI), 1999.

4.L. Lamport, R. Shostak, and M. Pease, “The Byzantine Generals Problem,” ACM Transactions on Programming Languages and Systems, vol. 4, no. 3, pp. 382–401, 1982.

5.Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE

Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, 2011.

6.C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” IEEE International Conference on Quality of Service (IWQoS), 2009.

7.H. Shacham and B. Waters, “Compact Proofs of Retrievability,” ASIACRYPT 2008 – Advances in Cryptology, Springer, 2008.

8.National Institute of Standards and Technology (NIST), “Advanced Encryption Standard (AES),” FIPS PUB 197, 2001.

9.B. Leelavathi, “An Efficient Worm Detection System Using Multi Feature Analysis and Classification Techniques,” Springer Nature Link, vol. pp 1054–1064, 2019

 
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
A Study on Employee Satisfaction and Retention Strategies at Leggett & Platt Automotive Pvt Ltd., Chennai.
string(8) "SWETHA K" K, S.
(2026)
DOI: 10.55041/ijsmt.v2i3.144
Divine in Art: Aesthetic Rapture, Masochism, Metaphysical Awareness
string(19) "Vivechana Prajapati" Prajapati, V.
(2026)
DOI: 10.55041/ijsmt.v2i3.438
Reforming the Rules-Based International Order: Opportunities and Challenges in a Shifting Global Landscape
string(22) "Damaraju Pradeep Kumar" Kumar, D. P.
(2026)
DOI: 10.55041/ijsmt.v2i2.007
Scroll to Top