⚠ Official Notice: www.ijisrt.com is the official website of the International Journal of Innovative Science and Research Technology (IJISRT) Journal for research paper submission and publication. Please beware of fake or duplicate websites using the IJISRT name.



Safevault: Preventing Cloud Data Breaches Using ECC and Token-Based Access


Authors : H. Sameema Farhana; M. Mohamed Faisal

Volume/Issue : Volume 11 - 2026, Issue 4 - April


Google Scholar : https://tinyurl.com/mvjpfdwe

Scribd : https://tinyurl.com/5dxt57y8

DOI : https://doi.org/10.38124/ijisrt/26apr347

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : However, the centralized cloud storage poses a great threat to the security and privacy of the user. In the digital world, cloud storage is one of the most fundamental components of data storage and online services. In the traditional centralized approach, the data, including user information, credentials, and other access information, is stored centrally. This approach is highly vulnerable to attacks and data breaches. The main objective of the proposed research is to develop a system that improves the security, privacy, and control of the data, as well as providing a secure environment for storing and sharing digital assets. The system uses the Blockchain technology and the InterPlanetary File System (IPFS) to provide secure and tamper-proof storage. In the proposed system, Elliptic Curve Cryptography (ECC) is used to ensure the highest level of encryption using the smallest key sizes. In addition, the proxy re-encryption method is used to ensure the secure sharing of data among authorized users without revealing the original encryption keys. Zero-Knowledge Proof (ZKP) is used to ensure the highest level of privacy by verifying the user's authorization without revealing the actual credentials. The combination of decentralized storage, blockchain-based verification, and advanced cryptographic techniques provides a robust solution for mitigating cloud security threats, ensuring confidentiality, integrity, and transparency, and fostering a trustworthy environment for both individuals and organizations.

Keywords : Cloud Security, Decentralized Storage, Blockchain, InterPlanetary File System (IPFS), Elliptic Curve Cryptography (ECC), Proxy Re-Encryption (PRE), Zero-Knowledge Proof (ZKP), Data Privacy, Secure Data Sharing, Data Integrity, Access Control, Cryptography.

References :

  1. Gupta, Ishu, et al. "Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions." IEEE Access 10 (2022): 71247-71277.
  2. Alsalim, Ahmed Saad, and Muhammad Awais Javed. "Efficient and secure data storage for future networks: Review and future opportunities." IEEE Access (2024).
  3. Prajapati, Priteshkumar, and Parth Shah. "A review on secure data deduplication: Cloud storage security issue." Journal of King Saud University-Computer and Information Sciences 34.7 (2022): 3996-4007.
  4. Kumar, Prabhat, et al. "A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system." Journal of Parallel and Distributed Computing 172 (2023): 69-83.
  5. Ullah, Zia, et al. "Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment." IEEE access 10 (2022): 36978-36994.
  6. Thabit, Fursan, et al. "A novel effective lightweight homomorphic cryptographic algorithm for data security in cloud computing." International Journal of intelligent networks 3 (2022): 16-30.
  7. Athanere, Smita, and Ramesh Thakur. "Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing." Journal of King Saud University-Computer and Information Sciences 34.4 (2022): 1523-1534.
  8. Adee, Rose, and HaralambosMouratidis. "A dynamic four-step data security model for data in cloud computing based on cryptography and stegonography." Sensors 22.3 (2022): 1109.
  9. Xi, Peng, et al. "A review of Blockchain-based secure sharing of healthcare data." Applied Sciences 12.15 (2022): 7912.
  10. Sun, Zhijie, et al. "A blockchain-based secure storage scheme for medical information." EURASIP Journal on Wireless Communications and Networking 2022.1 (2022): 40.

However, the centralized cloud storage poses a great threat to the security and privacy of the user. In the digital world, cloud storage is one of the most fundamental components of data storage and online services. In the traditional centralized approach, the data, including user information, credentials, and other access information, is stored centrally. This approach is highly vulnerable to attacks and data breaches. The main objective of the proposed research is to develop a system that improves the security, privacy, and control of the data, as well as providing a secure environment for storing and sharing digital assets. The system uses the Blockchain technology and the InterPlanetary File System (IPFS) to provide secure and tamper-proof storage. In the proposed system, Elliptic Curve Cryptography (ECC) is used to ensure the highest level of encryption using the smallest key sizes. In addition, the proxy re-encryption method is used to ensure the secure sharing of data among authorized users without revealing the original encryption keys. Zero-Knowledge Proof (ZKP) is used to ensure the highest level of privacy by verifying the user's authorization without revealing the actual credentials. The combination of decentralized storage, blockchain-based verification, and advanced cryptographic techniques provides a robust solution for mitigating cloud security threats, ensuring confidentiality, integrity, and transparency, and fostering a trustworthy environment for both individuals and organizations.

Keywords : Cloud Security, Decentralized Storage, Blockchain, InterPlanetary File System (IPFS), Elliptic Curve Cryptography (ECC), Proxy Re-Encryption (PRE), Zero-Knowledge Proof (ZKP), Data Privacy, Secure Data Sharing, Data Integrity, Access Control, Cryptography.

Paper Submission Last Date
30 - April - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe