Implementation of Blockchain Based Data Storage and Verification for Access

Vyshnavi Ankam 1 , N. Mahesh Reddy2 , Mohammed Mutahar Mujahid3

TTIDMKD. 2022 August; 2(3): 1-8. Published online 2022 August

doi.org/10.36647/TTIDMKD/02.03.A001

Abstract : Verification for access is used in software to secure information of the user. There are some kinds of verification process, however, as per the secondary information; major users prefer the biometric verification process. On the other hand, block chain based data storage is used in businesses, banking sectors, and other sectors. In this case, this process helps to store confidential information with proper security. This research is focused on the implementation process of block chain based data storage and verification access control. The aim of this research is to demonstrate the importance of block chain data storage and verification access control in various sectors to store and secure information of the users. This research has used the quantitative research data collection method to collect information on block chain and verification access.
As per the information, it can be stated that the user has increased demand for block chain due to its verification ability, and it’s other benefits such as increased speed of work, traceability, track of confidential data, and others. In this research, the implementation process of block chain has been discussed with an algorithm flowchart. As per the flowchart, there is a node that helps to store the information of the user and increase the value of block chain data storage. As per the result of this research, there are few steps to implement data storage and those are increasing knowledge on block chain and verification, and strategizing block chain, and plan to implement that. After that, the simulation process needs to be entered in this process to check the progress of implementation. In this research work, the FMS model is discussed to focus on the implementation of verification for access.

Keyword : Blockchain, data storage, verification access control, technology, CSE

Recent Article