BLOCKCHAIN-BASED SECURE DATA STORAGE FRAMEWORK FOR CLOUD COMPUTING
Data storage has been transformed by cloud computing, which offers scalable, flexible, and affordable services. Centralized cloud architectures are still susceptible to insider threats, data manipulation, integrity breaches, and a lack of transparency, though. In cloud systems, ensuring data integrity and trust has emerged as a significant research topic. In order to provide a decentralized and impenetrable verification method, this study suggests a Blockchain-Based Secure Data Storage Framework that combines blockchain technology with cloud computing.
The Advanced Encryption Standard (AES) is used in the suggested method to encrypt files prior to cloud storage. Smart contracts are used to create and store a SHA-256 cryptographic hash of the encrypted file on the blockchain.
The hybrid design uses blockchain's immutability for secure integrity verification while ensuring scalability using off-chain cloud storage. In order to identify any unauthorized changes, the system recalculates the file hash during data retrieval and compares it with the blockchain record. The suggested approach guarantees safe data verification in cloud contexts, increases transparency, strengthens auditability, and does away with centralized trust dependency.In comparison to conventional cloud storage systems, experimental study shows enhanced security and dependable tamper detection
E, S. (2026). Blockchain-Based Secure Data Storage Framework for Cloud Computing. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.101
E, Subasri. "Blockchain-Based Secure Data Storage Framework for Cloud Computing." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.101.
E, Subasri. "Blockchain-Based Secure Data Storage Framework for Cloud Computing." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.101.
2.V. Buterin, “A Next-Generation Smart Contract and Decentralized Application Platform,” Ethereum Whitepaper, 2014.
3.M. Castro and B. Liskov, “Practical Byzantine Fault Tolerance,” Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI), 1999.
4.L. Lamport, R. Shostak, and M. Pease, “The Byzantine Generals Problem,” ACM Transactions on Programming Languages and Systems, vol. 4, no. 3, pp. 382–401, 1982.
5.Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE
Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, 2011.
6.C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” IEEE International Conference on Quality of Service (IWQoS), 2009.
7.H. Shacham and B. Waters, “Compact Proofs of Retrievability,” ASIACRYPT 2008 – Advances in Cryptology, Springer, 2008.
8.National Institute of Standards and Technology (NIST), “Advanced Encryption Standard (AES),” FIPS PUB 197, 2001.
9.B. Leelavathi, “An Efficient Worm Detection System Using Multi Feature Analysis and Classification Techniques,” Springer Nature Link, vol. pp 1054–1064, 2019