ENHANCING SECURITY OF DATA IN CLOUD COMPUTING USING NUMBER SYSTEM WITH BLOCK CHAIN
Cloud computing has become a key technology for storing and processing data, but it also introduces major security concerns such as data privacy, integrity, and unauthorized access. This paper presents a lightweight and effective data protection approach that combines multi-layer data transformation techniques with blockchain technology to improve cloud security. In the proposed method, user credentials are first merged with a secret key and then processed through several stages including binary conversion, two’s complement calculation, octal encoding, and reverse sequencing to produce encrypted data. In contrast to conventional cryptographic methods like AES (Advanced Encryption Standard) and RSA (Rivest–Shamir–Adleman), the proposed technique emphasizes lower computational complexity while still providing an acceptable level of security. Furthermore, the use of blockchain technology guarantees data immutability and integrity, protecting the information from unauthorized modification. Experimental analysis shows that the method offers faster execution and efficient performance, making it appropriate for real-time cloud-based applications. The findings indicate a balance between security capability and computational efficiency, suggesting that the proposed approach can function as an additional security layer in cloud computing environments.
SHARMA, R. (2026). Enhancing Security of Data in Cloud Computing using Number System with Block Chain. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.340
SHARMA, RICHA. "Enhancing Security of Data in Cloud Computing using Number System with Block Chain." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.340.
SHARMA, RICHA. "Enhancing Security of Data in Cloud Computing using Number System with Block Chain." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.340.
2.Awadallah, R., Samsudin, A., Teh, J. S., & Almazrooie, M. (2021). An integrated architecture for maintaining security in cloud computing based on blockchain. [Journal/Publisher info if available].
3.Murthy, C. V. N. U. B., Shri, M. L., Kadry, S., & Lim, S. (2020). Blockchain-based cloud computing: Architecture and research challenges. IEEE Access, 8, 136077–136088. https://doi.org/10.1109/ACCESS.2020.3009186
4.Habib, G., Sharma, S., Ibrahim, S., Ahmad, I., Qureshi, S., & Ishfaq, M. (2022). Blockchain technology: Benefits, challenges, applications, and integration with cloud computing. Journal of King Saud University - Computer and Information Sciences, 34(6), 2345–2356.
5.Safar, F., & Al King, R. (2023). Data security in cloud computing. Master of Web Science (MWS) Program, Syrian Virtual University.
6.Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., & Ayaz, M. (2021). A systematic literature review on cloud computing security: Threats and mitigation strategies. IEEE Access, 9, 57792–57815. https://doi.org/10.1109/ACCESS.2021.3071976
7.International Research Journal of Engineering and Technology (IRJET). (2018). Cloud computing security. IRJET, 5(4), 2395–0072, Ingole, K. R., & Yamde, S. (2018). Blockchain technology in cloud computing: A systematic review. International Research Journal of Engineering and Technology (IRJET), 5(4), 2395–0072.
8.Doshi, R., & Kute, V. (2020). A review paper on security concerns in cloud computing and proposed security models. In 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE) (pp. 1–6). IEEE. https://doi.org/10.1109/ic-ETITE
9.Al Nafea, R., & Almaiah, M. A. (2021). Cyber security threats in cloud: Literature review. In 2021 International Conference on Information Technology (ICIT).
10.Ibitayo, F. B., Oguntuase, R. A., & Oyeladun, M. B. (2022). Securing cloud computing contents with cryptography and steganography. International Journal of Science and Engineering Applications, 11(6), 76–88. https://doi.org/10.7753/IJSEA1106.1002