{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T17:06:26Z","timestamp":1772989586344,"version":"3.50.1"},"reference-count":27,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,1]]},"abstract":"<p>In earlier banking systems, the data owners were unable to access or update their financial information. Nowadays, user financial information is stored in Cloud storage instead of traditional storage, but security risks are high in financial sectors. Sometimes, Cloud services providers and public auditors modify the user sensitive attribute values. Hence, the decentralized storage system is required for providing better security and integrity of user sensitive attribute values. Blockchain is a decentralized technology for providing tamper-proof storage for sensitive attribute values. Hence, the account holder information is segregated as sensitive and non-sensitive attributes. Before storing into off-chain mode of blocks, the sensitive attributes are grouped into \u2018n' number of groups and encrypted by separate group key. The non-encrypted, non-sensitive attributes are stored in cloud storage. The access information is stored in the on-chain mode of the block for easy monitoring. Hence, the security and integrity of sensitive information are preserved.<\/p>","DOI":"10.4018\/ijcac.2020040105","type":"journal-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T11:28:18Z","timestamp":1581679698000},"page":"77-92","source":"Crossref","is-referenced-by-count":21,"title":["Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System"],"prefix":"10.4018","volume":"10","author":[{"given":"M.","family":"Sumathi","sequence":"first","affiliation":[{"name":"National Institute of Technology, Tiruchirappalli, India"}]},{"given":"S.","family":"Sangeetha","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Tiruchirappalli, India"}]}],"member":"2432","reference":[{"key":"IJCAC.2020040105-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.06.012"},{"key":"IJCAC.2020040105-1","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/CINE.2015.31","article-title":"Cloud computing features, issues, and challenges: a big picture.","author":"D.Puthal","year":"2015","journal-title":"Proceedings of the 2015 International Conference on Computational Intelligence and Networks"},{"key":"IJCAC.2020040105-2","doi-asserted-by":"crossref","unstructured":"Liu, J., Huang, K., Rong, H., Wang, H., & Xian, M. (2015). Privacy Preserving Public Auditing for Regenerating Code Based Cloud Storage. IEEE Transactions on Information Forencies and Security, 10(7), 1513-1528.","DOI":"10.1109\/TIFS.2015.2416688"},{"issue":"3","key":"IJCAC.2020040105-3","doi-asserted-by":"crossref","first-page":"3162","DOI":"10.1109\/TSG.2018.2819663","article-title":"Distributed blockchain-based data protection framework for modern power systems against cyber attacks.","volume":"10","author":"G.Liang","year":"2018","journal-title":"IEEE Transactions on Smart Grid"},{"key":"IJCAC.2020040105-4","first-page":"421","article-title":"A Review on Advanced Security Solutions in Online Banking Models.","volume":"1","author":"P. S.Aithal","year":"2016","journal-title":"International Journal of Scientific Research and Modern Education"},{"key":"IJCAC.2020040105-5","unstructured":"Albadri, H., & Sulaiman, R. (2016). A classification method for identifying confidential data to enhance efficiency of query processing over cloud. Journal of Theoretical and Applied Information Technology, 93, 412-420."},{"key":"IJCAC.2020040105-6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.203"},{"key":"IJCAC.2020040105-7","doi-asserted-by":"crossref","first-page":"38437","DOI":"10.1109\/ACCESS.2018.2851611","article-title":"A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems.","volume":"6","author":"S.Wang","year":"2018","journal-title":"IEEE Access : Practical Innovations, Open Solutions"},{"key":"IJCAC.2020040105-8","doi-asserted-by":"crossref","unstructured":"Li, J., Wu, J., & Chen, L. (2018). Block-Secure: Blockchain Based scheme for Secure P2P Cloud Storage. Information Science, 465, 219-231.","DOI":"10.1016\/j.ins.2018.06.071"},{"key":"IJCAC.2020040105-9","doi-asserted-by":"crossref","unstructured":"Kshetri, N. (2017). Blockchain roles in strengthening cybersecurity and protecting privacy. Journal of Telecommunications Policy, 41(10), 1027-1038.","DOI":"10.1016\/j.telpol.2017.09.003"},{"key":"IJCAC.2020040105-10","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2017.23"},{"key":"IJCAC.2020040105-11","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2019.2891998"},{"key":"IJCAC.2020040105-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.011"},{"key":"IJCAC.2020040105-13","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1121-4"},{"key":"IJCAC.2020040105-14","unstructured":"Maesa, D. D. F., Ricci, L., & Mori, P. (2017). Distributed access control through blockchain technology. Blockchain Engineering, 31-32."},{"key":"IJCAC.2020040105-15","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2017.23"},{"key":"IJCAC.2020040105-16","unstructured":"Es-Samaali, H., Outchakoucht, A., & Leroy, J. P. (2017). A blockchain based access control for Big Data. International Journal of Computer Networks and Communications Security, 5(7), 137-147."},{"key":"IJCAC.2020040105-17","first-page":"1","article-title":"RBAC-SC: Role-based access control using smart contract.","volume":"4","author":"J. P.Cruz","year":"2016","journal-title":"IEEE Access : Practical Innovations, Open Solutions"},{"issue":"2","key":"IJCAC.2020040105-18","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1504\/IJEB.2018.094863","article-title":"Scale-based Secured Sensitive Data storage for banking services in cloud.","volume":"14","author":"M.Sumathi","year":"2018","journal-title":"International Journal of Electronic Business"},{"key":"IJCAC.2020040105-19","unstructured":"Sumathi, M., & Sangeetha, S. (2017). Sensitive Data Protection using Modified Elliptic Curve Cryptography. Proceeding of the Ninth International Conference on Advanced Computing, MIT Chennai (pp. 485-491). Academic Press."},{"key":"IJCAC.2020040105-20","unstructured":"Thomas, A., & Sangeetha, S. (2016). TIEX- A tools for extracting structured and semantic information from text document. Proceeding of the fourth International Conference of Business Analytics and Intelligence (pp. 1026-1032). Academic Press."},{"key":"IJCAC.2020040105-21","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09473-3"},{"key":"IJCAC.2020040105-22","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09478-y"},{"key":"IJCAC.2020040105-23","doi-asserted-by":"publisher","DOI":"10.5220\/0005489302060213"},{"key":"IJCAC.2020040105-24","doi-asserted-by":"crossref","unstructured":"Alshahrani, M., & Traore, I. (2019). Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain. Journal of information security and applications, 45, 156-175.","DOI":"10.1016\/j.jisa.2019.02.003"},{"key":"IJCAC.2020040105-25","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2019040104"},{"key":"IJCAC.2020040105-26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761372"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=249163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T16:33:53Z","timestamp":1651854833000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.2020040105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2020040105","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}