SECURE DATA STORAGE USING THE ETHEREUM BLOCKCHAIN TECHNOLOGY
DOI:
https://doi.org/10.18372/2410-7840.26.18845Keywords:
cyber security, data storage, blockchain, EthereumAbstract
The constant increase in the amount of data creates problems related to the choice of effective methods and means of storage and ensuring the protection of this data from unauthorized access. The article details the critical topic of preserving and protecting the importance of information in the context of growing data volumes and the number of cyberattacks. The impossibility of reliable data storage and protection is increasing, especially in the context of the increased threat from attackers. It highlights how blockchain technologies, especially based on the Ethereum platform, can solve the problems of reliable storage and data security. Ethereum offers an alternative to the traditional client-server model by decentralizing data storage through a distributed network of nodes. This technology significantly improves security, making unauthorized access to information difficult, and preventing the hacking of the private key, which requires significant computing resources. Smart contracts on Ethereum allow the creation of applications that execute precisely according to predetermined conditions, without the possibility of third-party intervention. This is especially important for messengers, where data privacy and availability are of fundamental importance. Although high, the cost of transactions in the blockchain is compensated by the high reliability and security of data storage. The applied methodology confirms that public (decentralized) data storage is safe since it is practically impossible to break the private key of Ethereum.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).