2022
DOI: 10.3991/ijim.v16i15.31713
|View full text |Cite
|
Sign up to set email alerts
|

Log Data Integrity Solution based on Blockchain Technology and IPFS

Abstract: Threats towards information systems have continued to increase and become more sophisticated, making security approaches a necessity for all types of organizations to ensure their protection. To implement an appropriate computer security policy, it is necessary to efficiently exploit the data that has become a valuable asset for these security systems, provided it is well used, controlled and monitored.In this paper, we focus on developing a decentralized solution based on Blockchain technology and IPFS (Inter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Most researchers assumed the first step in protecting websites and services was to ensure that people could log in. New face recognition algorithms safeguard critical areas in the clarifying process [23]. Face recognition.…”
Section: Face Recognitionmentioning
confidence: 99%
“…Most researchers assumed the first step in protecting websites and services was to ensure that people could log in. New face recognition algorithms safeguard critical areas in the clarifying process [23]. Face recognition.…”
Section: Face Recognitionmentioning
confidence: 99%