{"title":"使用区块链的银行云中的安全性和错误恢复","authors":"K.Jamberi, S. Reddy, D Sasikala","doi":"10.58599/ijsmem.2023.1302","DOIUrl":null,"url":null,"abstract":"It is possible to store data in the cloud in a variety of different ways, including in a single database or across numerous servers; however, database clients are only able to save their information on a single server. No matter how straightforward the management of data in a single database may appear to be, there will invariably be complications regarding concerns of safety, consistency, availability, and bottlenecks. Distributed databases eliminate this issue by splintering the data among different servers, which in turn makes it possible for multiple clients to access the database at the same time. All of this information is readily available to the public and may be viewed whenever one chooses and from wherever one may be. Clients are able to quickly access replicas even in the event that the original is destroyed as a result of concurrent access. Users also have the option of protecting the data using either the Advanced Encryption Standard (AES) or the Triple Data Encryption Standard (3DES). Ensuring the privacy of sensitive data can be accomplished using any one of a number of distinct ciphering techniques, which can then be applied to any one of several distinct data formats. In the event that it is found out that the data was also altered, a procedure for recovering it will be carried out. In the case that a cloud instance experiences an error, the problem is fixed right away. This architecture protects sensitive data by removing potential points of failure from the design. Clients may not be aware of the encryption technology that is used to secure data or the particular cloud server instance that is responsible for delivering it if the system is configured in this manner. Hence, a unified strategy for the architecture of cloud-based databases offers higher levels of security, consistency, and accessibility.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security and Error Recovery in a Banking Cloud using Blockchain\",\"authors\":\"K.Jamberi, S. Reddy, D Sasikala\",\"doi\":\"10.58599/ijsmem.2023.1302\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is possible to store data in the cloud in a variety of different ways, including in a single database or across numerous servers; however, database clients are only able to save their information on a single server. No matter how straightforward the management of data in a single database may appear to be, there will invariably be complications regarding concerns of safety, consistency, availability, and bottlenecks. Distributed databases eliminate this issue by splintering the data among different servers, which in turn makes it possible for multiple clients to access the database at the same time. All of this information is readily available to the public and may be viewed whenever one chooses and from wherever one may be. Clients are able to quickly access replicas even in the event that the original is destroyed as a result of concurrent access. Users also have the option of protecting the data using either the Advanced Encryption Standard (AES) or the Triple Data Encryption Standard (3DES). Ensuring the privacy of sensitive data can be accomplished using any one of a number of distinct ciphering techniques, which can then be applied to any one of several distinct data formats. In the event that it is found out that the data was also altered, a procedure for recovering it will be carried out. In the case that a cloud instance experiences an error, the problem is fixed right away. This architecture protects sensitive data by removing potential points of failure from the design. Clients may not be aware of the encryption technology that is used to secure data or the particular cloud server instance that is responsible for delivering it if the system is configured in this manner. Hence, a unified strategy for the architecture of cloud-based databases offers higher levels of security, consistency, and accessibility.\",\"PeriodicalId\":103282,\"journal\":{\"name\":\"International Journal of Scientific Methods in Engineering and Management\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Scientific Methods in Engineering and Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58599/ijsmem.2023.1302\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Scientific Methods in Engineering and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58599/ijsmem.2023.1302","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security and Error Recovery in a Banking Cloud using Blockchain
It is possible to store data in the cloud in a variety of different ways, including in a single database or across numerous servers; however, database clients are only able to save their information on a single server. No matter how straightforward the management of data in a single database may appear to be, there will invariably be complications regarding concerns of safety, consistency, availability, and bottlenecks. Distributed databases eliminate this issue by splintering the data among different servers, which in turn makes it possible for multiple clients to access the database at the same time. All of this information is readily available to the public and may be viewed whenever one chooses and from wherever one may be. Clients are able to quickly access replicas even in the event that the original is destroyed as a result of concurrent access. Users also have the option of protecting the data using either the Advanced Encryption Standard (AES) or the Triple Data Encryption Standard (3DES). Ensuring the privacy of sensitive data can be accomplished using any one of a number of distinct ciphering techniques, which can then be applied to any one of several distinct data formats. In the event that it is found out that the data was also altered, a procedure for recovering it will be carried out. In the case that a cloud instance experiences an error, the problem is fixed right away. This architecture protects sensitive data by removing potential points of failure from the design. Clients may not be aware of the encryption technology that is used to secure data or the particular cloud server instance that is responsible for delivering it if the system is configured in this manner. Hence, a unified strategy for the architecture of cloud-based databases offers higher levels of security, consistency, and accessibility.