Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15399
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Faheem, Eissa M | - |
dc.contributor.author | Pol, Ashish Ramesh | - |
dc.contributor.author | Zahidali, Kazi Rizwan | - |
dc.contributor.author | Shekhar, R | - |
dc.date.accessioned | 2024-04-20T10:53:12Z | - |
dc.date.available | 2024-04-20T10:53:12Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/15399 | - |
dc.description.abstract | Files and electronic data can be stored and accessed safely with Blockchain and Encryption to Secure Access to Files and Electronic Data. With the rise of digital threats such as data breaches and unauthorized access, BESAFE innovatively tackles the challenge head-on. Its comprehensive approach presents a strong defense for sensitive information. Using encryption, blockchain, and secure authentication, BESAFE is both robust and trustworthy, enabling users to protect valuable data in today's digital era. Blockchain and Encryption for Safe Access of File and Electronic Data, or BESAFE, is the name of our project, which serves to guarantee user-friendly privacy and data security. We start by delving deep into the purpose and functionalities of BESAFE before moving on to the literature survey portion. This segment establishes the groundwork for the development of our project by examining the available research and technologies regarding secure file access and storage. The analysis chapter dives into data security issues, exposing the obstacles and concerns that this topic raises. It investigates where current systems fail and the necessity for a strong determination to overcome these challenges. Different encryption algorithms are explained, underlining their relevance in data security, such as AES, RSA, and hashing. Furthermore, the chapter delves into the possible application of blockchain technology, which guarantees security via decentralised and immaculate storage. The architecture and methods of BESAFE are fully detailed in the design and implementation sections. It focuses on identification and verification, describing how BESAFE ensures system users' legitimacy. The master key is highlighted because it is crucial in protecting user files through encryption and decryption operations. The chapter also discusses the different encryption mechanisms utilised by BESAFE, with a focus on AES encryption. It also looks at the usage of blockchain technology, which enables decentralised storage and increases user file security. Finally, the chapter demonstrates how to upload and download data while ensuring confidentiality and integrity. BESAFE is a one-stop shop for storing and accessing electronic data and files. To keep user data hidden, undamaged, and private, encryption, blockchain, and strong authentication are employed. BESAFE's revolutionary method solves the challenges of data security in today's digital environment, guaranteeing that important data belongs to individuals and organisations. BESAFE has promise in the areas of secure data storage and access. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Alliance College of Engineering and Design, Alliance University | en_US |
dc.subject | Blockchain And Encryption | en_US |
dc.subject | Safe Access Of File | en_US |
dc.subject | Besafe | en_US |
dc.subject | Aes Encryption. | en_US |
dc.title | BESAFE: Blockchain and Encryption for Secure Access To Files and Electronic Data | en_US |
dc.type | Other | en_US |
Appears in Collections: | Dissertations - Alliance College of Engineering & Design |
Files in This Item:
File | Size | Format | |
---|---|---|---|
CSE_G08_2023.pdf Restricted Access | 1.94 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.