Skip to main content

BLOCKCHAIN BASED DOUBLE LAYER DATA PROTECTION WITH ENHANCED ACCESS CONTROL MECHANISM

Page 1

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 05 | May 2024

www.irjet.net

p-ISSN: 2395-0072

BLOCKCHAIN BASED DOUBLE LAYER DATA PROTECTION WITH ENHANCED ACCESS CONTROL MECHANISM RAMYA R1, JAYANTHI K2 1M.TECH-Student, DEPARTMENT OF CSE, PRIST UNIVERSITY, THANJAVUR, TAMILNADU, INDIA. 2M.E-Assistant Professor, DEPARTMENT OF CSE, PRIST UNIVERSITY, THANJAVUR,TAMILNADU,INDIA.

------------------------------------------------------------------------***--------------------------------------------------------------------strength of the cloud closer to the point of creation and Abstract— an expanded version of cloud

computing is called fog computing. A current research trend is fog computing, which offers the potential for effective network services. Fog computing is a decentralized platform that is fundamentally different from cloud computing, while it shares many similarities with cloud computing in terms of data computation, storage, and application services. The security and privacy of medical records are crucial in the age of digital healthcare. The goal of this project is to create and put into place a complete system for the safekeeping and restricted access of medical records. The fog server's data processing and storage capacity are fully utilized by the TLS (Three Layer Security) framework. Three layers make up the architecture: the local machine, the fog server, and the cloud server. The solution creates a strong foundation to protect sensitive healthcare data by utilizing cloud storage for scalability, a fog computing layer for real-time processing, and Advanced Encryption Standard (AES) encryption for data secrecy. It also uses blockchain technology to protect the integrity of the data. In order to control user and data owner permissions and guarantee authorized access, a trusted authority system is implemented. In accordance with the least privilege concept, role-based access control (RBAC) procedures are used to limit data access based on user roles. Users can access certain medical records through a secure file request and verification process that follows strict authentication guidelines. In addition to addressing the present security issues, the suggested solution lays the groundwork for future adaptability to new threats in the ever-changing field of healthcare information management. Index Terms — Cloud server, Fog server, data storage, Index creation, Blockchain process, Role based access control, Data request, Verification process, Data sharing, User revocation. Introduction

action for data. Since both refer to moving processing and intelligence closer to the point of data creation, many people confuse the terms edge computing and fog computing. Though it may also be done for security and compliance purposes, efficiency improvement is the main motivation for this.

Just as fog focuses on the network's edge, the fog metaphor originates from the meteorological term for a cloud near the ground. The phrase is frequently linked to Cisco; it is thought to have been created by Ginny Nichols, the product line manager for the corporation. Fog computing is available to the general public and is registered under the term Cisco Fog Computing.

CLOUD COMPUTING Undoubtedly, the cloud computing concept holds great potential for business computing. It highlights the need for crucial infrastructure to support a new kind of service delivery that offers the advantage of cost savings through pooling computing and storage resources. In the fiercely competitive and demanding information technology sector, cloud computing is currently a truly enormous technology that surpasses all previous computing technologies. Undoubtedly, the cloud computing concept holds great potential for business computing. It highlights the need for crucial infrastructure to support a new kind of service delivery that offers the advantage of cost savings through pooling computing and storage resources. In the fiercely competitive and demanding information technology sector, cloud computing is currently a truly enormous technology that surpasses all previous computing technologies.

A dispersed computing infrastructure known as fog computing places data, processing power, storage, and applications in between the cloud and the data source. Fog computing, like edge computing, brings the benefits and

Resource management is better handled by cloud computing since it relieves the user of the burden of finding resources for storage. A user can ask the cloud provider for more storage if needed, and when they're done using it, they can either release the storage by simply ceasing to use it or shift the data to a longer-term, less expensive storage option. This further enables the user to utilize more dynamic resources efficiently because they are free from the worry of storage

© 2024, IRJET

ISO 9001:2008 Certified Journal

FOG COMPUTING

|

Impact Factor value: 8.226

|

|

Page 883


Turn static files into dynamic content formats.

Create a flipbook
BLOCKCHAIN BASED DOUBLE LAYER DATA PROTECTION WITH ENHANCED ACCESS CONTROL MECHANISM by IRJET Journal - Issuu