Enhanced Blockchain-Based Decentralized Public Auditing for Cloud Storage
Downcodes小编
This project focuses on creating a privacy-preserving authentication protocol specifically designed for cloud storage. It aims to enhance data security by preventing unauthorized access and ensuring data confidentiality during both data access and sharing.
Project Goal
Purpose: The primary objective is to safeguard sensitive data stored in the cloud and shield it from unauthorized access, thereby ensuring data integrity and confidentiality.
Problem Solved
This protocol tackles the issue of unauthorized access by implementing a decentralized auditing system that prioritizes data security and privacy. This solution effectively minimizes data breaches and unauthorized access to confidential information.
Installation Instructions
1. Clone the Repository:
`bash
git clone https://github.com/Preethi0502/Enhanced-Blockchain-Based-Decentralized-Public-Auditing-for-Cloud-Storage.git
`
2. Open in Microsoft Visual Studio:
- Navigate to the downloaded repository folder.
- Open the solution (.sln) file in Microsoft Visual Studio.
3. Database Setup in SQL Server:
- Open SQL Server Management Studio.
- Utilize the SQL scripts provided in the repository (if available) to establish the required tables, permissions, and other database specifications.
- Ensure SQL Server is configured to allow the application to connect to it.
Running the Demo
1. Configure the Database:
- Confirm your SQL Server instance is running.
- Verify that the database structure is set up according to the provided scripts.
2. Run the Application:
- Within Microsoft Visual Studio, open the solution and build the project.
- Start the application by pressing F5 or selecting Run. This should launch the application locally.
3. Simulate Access and Permissions:
- Follow any additional instructions in the project to create test users, initiate access requests, and test the dynamic permission management features.
Technologies Used
Core Technologies:
1. Blockchain: For decentralized auditing and transaction record management.
2. Attribute-Based Access Control (ABAC): For flexible and granular access control.
3. Proxy Re-Encryption: To securely share encrypted data without compromising decryption keys.
Tools:
1. ASP.NET: The web application framework.
2. Visual C#: The primary programming language.
3. SQL Server: The database management system.
4. Microsoft Visual Studio: The integrated development environment.
Important Features and Impact
Key Functionalities:
1. Anonymous access requests: Enhance user privacy by concealing user identities during access requests.
2. Data integrity verification: Guarantees data consistency and authenticity through secure auditing.
3. Dynamic permission management for data access and sharing: Enables flexible and responsive data access control based on user attributes and policies.
Outcomes:
1. Enhanced security: Reduces the likelihood of unauthorized access incidents.
2. Improved user confidence: Enhances user trust in data security through ease of use and robust protection.
3. Reduced data breaches: Contributes to overall data protection by minimizing vulnerabilities.