Claim Missing Document
Check
Articles

Found 2 Documents
Search

Blockchain-Based Secure Data Sharing in Cloud Computing Zahran Rayyan; Rayyan Mahdi; Syarifal Luthfan
Proceeding International Conference Of Innovation Science, Technology, Education, Children And Health Vol. 3 No. 2 (2023): Proceeding of The International Conference of Inovation, Science, Technology, E
Publisher : Program Studi DIII Rekam Medis dan Informasi Kesehatan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/icistech.v3i2.124

Abstract

Cloud computing has revolutionized data storage and management; however, security and privacy concerns remain critical challenges. This paper explores the integration of blockchain technology to enhance data security in cloud environments. A decentralized approach ensures data integrity, authentication, and tamper resistance. The proposed framework leverages smart contracts to enforce access control policies efficiently. Simulation results indicate that our model significantly improves data security without compromising system performance.
Blockchain-Based Secure Data Sharing in Cloud Computing Zahran Rayyan; Rayyan Mahdi; Syarifal Luthfan
Proceeding International Conference Of Innovation Science, Technology, Education, Children And Health Vol. 3 No. 2 (2023): Proceeding of The International Conference of Inovation, Science, Technology, E
Publisher : Program Studi DIII Rekam Medis dan Informasi Kesehatan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/icistech.v3i2.124

Abstract

Cloud computing has revolutionized data storage and management; however, security and privacy concerns remain critical challenges. This paper explores the integration of blockchain technology to enhance data security in cloud environments. A decentralized approach ensures data integrity, authentication, and tamper resistance. The proposed framework leverages smart contracts to enforce access control policies efficiently. Simulation results indicate that our model significantly improves data security without compromising system performance.