IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

ENHANCING SECURITY OF DATA IN CLOUD COMPUTING USING NUMBER SYSTEM WITH BLOCK CHAIN

AUTHORS:
RICHA SHARMA
Mentor
Dr . Nagesh Salimath
Affiliation
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

Cloud computing has become a key technology for storing and processing data, but it also introduces major security concerns such as data privacy, integrity, and unauthorized access. This paper presents a lightweight and effective data protection approach that combines multi-layer data transformation techniques with blockchain technology to improve cloud security. In the proposed method, user credentials are first merged with a secret key and then processed through several stages including binary conversion, two’s complement calculation, octal encoding, and reverse sequencing to produce encrypted data. In contrast to conventional cryptographic methods like AES (Advanced Encryption Standard) and RSA (Rivest–Shamir–Adleman), the proposed technique emphasizes lower computational complexity while still providing an acceptable level of security. Furthermore, the use of blockchain technology guarantees data immutability and integrity, protecting the information from unauthorized modification. Experimental analysis shows that the method offers faster execution and efficient performance, making it appropriate for real-time cloud-based applications. The findings indicate a balance between security capability and computational efficiency, suggesting that the proposed approach can function as an additional security layer in cloud computing environments.

Keywords
Article Metrics
Article Views
31
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

SHARMA, R. (2026). Enhancing Security of Data in Cloud Computing using Number System with Block Chain. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.340

SHARMA, RICHA. "Enhancing Security of Data in Cloud Computing using Number System with Block Chain." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.340.

SHARMA, RICHA. "Enhancing Security of Data in Cloud Computing using Number System with Block Chain." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.340.

References
1.Awadallah, R., & Samsudin, A. (2021). Using blockchain in cloud computing to enhance relational database security. [Journal/Publisher info if available].

2.Awadallah, R., Samsudin, A., Teh, J. S., & Almazrooie, M. (2021). An integrated architecture for maintaining security in cloud computing based on blockchain. [Journal/Publisher info if available].

3.Murthy, C. V. N. U. B., Shri, M. L., Kadry, S., & Lim, S. (2020). Blockchain-based cloud computing: Architecture and research challenges. IEEE Access, 8, 136077–136088. https://doi.org/10.1109/ACCESS.2020.3009186

4.Habib, G., Sharma, S., Ibrahim, S., Ahmad, I., Qureshi, S., & Ishfaq, M. (2022). Blockchain technology: Benefits, challenges, applications, and integration with cloud computing. Journal of King Saud University - Computer and Information Sciences, 34(6), 2345–2356.

5.Safar, F., & Al King, R. (2023). Data security in cloud computing. Master of Web Science (MWS) Program, Syrian Virtual University.

6.Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., & Ayaz, M. (2021). A systematic literature review on cloud computing security: Threats and mitigation strategies. IEEE Access, 9, 57792–57815. https://doi.org/10.1109/ACCESS.2021.3071976

7.International Research Journal of Engineering and Technology (IRJET). (2018). Cloud computing security. IRJET, 5(4), 2395–0072, Ingole, K. R., & Yamde, S. (2018). Blockchain technology in cloud computing: A systematic review. International Research Journal of Engineering and Technology (IRJET), 5(4), 2395–0072.

8.Doshi, R., & Kute, V. (2020). A review paper on security concerns in cloud computing and proposed security models. In 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE) (pp. 1–6). IEEE. https://doi.org/10.1109/ic-ETITE

9.Al Nafea, R., & Almaiah, M. A. (2021). Cyber security threats in cloud: Literature review. In 2021 International Conference on Information Technology (ICIT).

10.Ibitayo, F. B., Oguntuase, R. A., & Oyeladun, M. B. (2022). Securing cloud computing contents with cryptography and steganography. International Journal of Science and Engineering Applications, 11(6), 76–88. https://doi.org/10.7753/IJSEA1106.1002
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
The Digital Renaissance in Corporate Finance: Integrating Artificial Intelligence for Adaptive Decision-Making
string(18) "Dr Surabhi Pachori" Pachori, D. S.
(2026)
DOI: 10.55041/ijsmt.v2i2.019
A Study on the Working Capital Management of Tamilnadu Newsprint and Papers Ltd at Karur
string(34) "AVK.Janani, K.Keerthana Sanjeevini" Sanjeevini, A. K.
(2026)
DOI: 10.55041/ijsmt.v2i3.179
A Study on Fixed Assets Management
string(18) "Satyam Sai Avinash" Avinash, S. S.
(2026)
DOI: 10.55041/ijsmt.v2i4.015
Scroll to Top