Reference Hub17
Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System

Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System

M. Sumathi, S. Sangeetha
Copyright: © 2020 |Volume: 10 |Issue: 2 |Pages: 16
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781799807742|DOI: 10.4018/IJCAC.2020040105
Cite Article Cite Article

MLA

Sumathi, M., and S. Sangeetha. "Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System." IJCAC vol.10, no.2 2020: pp.77-92. http://doi.org/10.4018/IJCAC.2020040105

APA

Sumathi, M. & Sangeetha, S. (2020). Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System. International Journal of Cloud Applications and Computing (IJCAC), 10(2), 77-92. http://doi.org/10.4018/IJCAC.2020040105

Chicago

Sumathi, M., and S. Sangeetha. "Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System," International Journal of Cloud Applications and Computing (IJCAC) 10, no.2: 77-92. http://doi.org/10.4018/IJCAC.2020040105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In earlier banking systems, the data owners were unable to access or update their financial information. Nowadays, user financial information is stored in Cloud storage instead of traditional storage, but security risks are high in financial sectors. Sometimes, Cloud services providers and public auditors modify the user sensitive attribute values. Hence, the decentralized storage system is required for providing better security and integrity of user sensitive attribute values. Blockchain is a decentralized technology for providing tamper-proof storage for sensitive attribute values. Hence, the account holder information is segregated as sensitive and non-sensitive attributes. Before storing into off-chain mode of blocks, the sensitive attributes are grouped into ‘n' number of groups and encrypted by separate group key. The non-encrypted, non-sensitive attributes are stored in cloud storage. The access information is stored in the on-chain mode of the block for easy monitoring. Hence, the security and integrity of sensitive information are preserved.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.