使用卓越的访问控制和区块链设计优化的机密数据管理系统

K. Madhura, R. Mahalakshmi
{"title":"使用卓越的访问控制和区块链设计优化的机密数据管理系统","authors":"K. Madhura, R. Mahalakshmi","doi":"10.1108/ijicc-12-2021-0295","DOIUrl":null,"url":null,"abstract":"PurposeThe blockchain system is required for coordinating and managing the information across the organizations. The internal assurance of the information system is under threat and requires a defined and arbitrary system for protective information sharing. The primary analysis of defining and providing the access to the data or information is proposed in this article. The major challenge faced by organizations is providing and maintaining security to the cumulated data infrastructure, protecting the confidential data flow within the infrastructure and to ascertain ethical operations within the organization.Design/methodology/approachIn this paper, a top-down approach is utilized to solve the issues faced during confidential data storage, track and alert internal malignant access. The web content management system (WCMS) market is growing and the challenging desideratum of solving security issues are incrementing. This research proposes a top-down security implementation methodology which alters the access control of the organization running the WCMS, it is a highly secure access-control with activity tracker that records who did what activity and who is responsible for malignant access tracker.FindingsThe upgraded access control system is implemented utilizing the most influential blockchain technology where the hash engendered by the Inter Planetary File System (IPFS) cloud is stored on the block to implement a confidential data tracker; a supplemental level of security is integrated to the admin by verifying its account ID by storing it on to the astute contracts and applying two-step authentication. A caliber of security is integrated during storage by integrating RHS encryption.Research limitations/implicationsThis system is proposed for the confidential student data storage (for e.g. educational documents, marks cards etc.) and tracking maleficent access.Originality/valueThe upgraded access control system is implemented using the most influential blockchain technology where the hash generated by the IPFS cloud is stored on the block to implement a confidential data tracker, an additional level of security is added to the admin by verifying its account ID by storing it on to the smart contracts and applying two-step authentication.","PeriodicalId":352072,"journal":{"name":"Int. J. Intell. Comput. Cybern.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Designing an optimized confidential-data management system using preeminent access-control and block-chain\",\"authors\":\"K. Madhura, R. Mahalakshmi\",\"doi\":\"10.1108/ijicc-12-2021-0295\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"PurposeThe blockchain system is required for coordinating and managing the information across the organizations. The internal assurance of the information system is under threat and requires a defined and arbitrary system for protective information sharing. The primary analysis of defining and providing the access to the data or information is proposed in this article. The major challenge faced by organizations is providing and maintaining security to the cumulated data infrastructure, protecting the confidential data flow within the infrastructure and to ascertain ethical operations within the organization.Design/methodology/approachIn this paper, a top-down approach is utilized to solve the issues faced during confidential data storage, track and alert internal malignant access. The web content management system (WCMS) market is growing and the challenging desideratum of solving security issues are incrementing. This research proposes a top-down security implementation methodology which alters the access control of the organization running the WCMS, it is a highly secure access-control with activity tracker that records who did what activity and who is responsible for malignant access tracker.FindingsThe upgraded access control system is implemented utilizing the most influential blockchain technology where the hash engendered by the Inter Planetary File System (IPFS) cloud is stored on the block to implement a confidential data tracker; a supplemental level of security is integrated to the admin by verifying its account ID by storing it on to the astute contracts and applying two-step authentication. A caliber of security is integrated during storage by integrating RHS encryption.Research limitations/implicationsThis system is proposed for the confidential student data storage (for e.g. educational documents, marks cards etc.) and tracking maleficent access.Originality/valueThe upgraded access control system is implemented using the most influential blockchain technology where the hash generated by the IPFS cloud is stored on the block to implement a confidential data tracker, an additional level of security is added to the admin by verifying its account ID by storing it on to the smart contracts and applying two-step authentication.\",\"PeriodicalId\":352072,\"journal\":{\"name\":\"Int. J. Intell. Comput. Cybern.\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Intell. Comput. Cybern.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1108/ijicc-12-2021-0295\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Intell. Comput. Cybern.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/ijicc-12-2021-0295","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

目的区块链系统用于组织间的信息协调和管理。信息系统的内部保障受到威胁,需要一个明确的、任意的系统来保护信息共享。本文对定义和提供对数据或信息的访问进行了初步分析。组织面临的主要挑战是为累积的数据基础设施提供和维护安全性,保护基础设施内的机密数据流,并确定组织内的道德操作。设计/方法/方法本文采用自顶向下的方法来解决机密数据存储、跟踪和预警内部恶意访问所面临的问题。web内容管理系统(WCMS)市场正在增长,解决安全问题的挑战性也在增加。本研究提出了一种自上而下的安全实现方法,它改变了运行WCMS的组织的访问控制,它是一种高度安全的访问控制,带有活动跟踪器,记录谁做了什么活动以及谁对恶意访问跟踪器负责。升级后的访问控制系统利用最具影响力的区块链技术实现,其中将星际文件系统(IPFS)云产生的哈希存储在块上,以实现机密数据跟踪器;通过将帐户ID存储到精明合约中并应用两步身份验证,将补充级别的安全性集成到管理员中。通过集成RHS加密,在存储期间集成了一定级别的安全性。研究限制/启示本系统适用于学生机密资料的储存(例如教育文件、分数卡等)及追踪非法存取。升级后的访问控制系统使用最具影响力的区块链技术实现,其中IPFS云生成的哈希存储在块上以实现机密数据跟踪器,通过将其存储到智能合约并应用两步身份验证来验证其帐户ID,从而为管理员增加了额外的安全级别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Designing an optimized confidential-data management system using preeminent access-control and block-chain
PurposeThe blockchain system is required for coordinating and managing the information across the organizations. The internal assurance of the information system is under threat and requires a defined and arbitrary system for protective information sharing. The primary analysis of defining and providing the access to the data or information is proposed in this article. The major challenge faced by organizations is providing and maintaining security to the cumulated data infrastructure, protecting the confidential data flow within the infrastructure and to ascertain ethical operations within the organization.Design/methodology/approachIn this paper, a top-down approach is utilized to solve the issues faced during confidential data storage, track and alert internal malignant access. The web content management system (WCMS) market is growing and the challenging desideratum of solving security issues are incrementing. This research proposes a top-down security implementation methodology which alters the access control of the organization running the WCMS, it is a highly secure access-control with activity tracker that records who did what activity and who is responsible for malignant access tracker.FindingsThe upgraded access control system is implemented utilizing the most influential blockchain technology where the hash engendered by the Inter Planetary File System (IPFS) cloud is stored on the block to implement a confidential data tracker; a supplemental level of security is integrated to the admin by verifying its account ID by storing it on to the astute contracts and applying two-step authentication. A caliber of security is integrated during storage by integrating RHS encryption.Research limitations/implicationsThis system is proposed for the confidential student data storage (for e.g. educational documents, marks cards etc.) and tracking maleficent access.Originality/valueThe upgraded access control system is implemented using the most influential blockchain technology where the hash generated by the IPFS cloud is stored on the block to implement a confidential data tracker, an additional level of security is added to the admin by verifying its account ID by storing it on to the smart contracts and applying two-step authentication.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信