Blockchain Integration with Cloud Storage for Secure and Transparent File Management
DOI:
https://doi.org/10.15680/IJCTECE.2026.0901013Keywords:
Blockchain, Cloud storage, Secure file management, Data integrity, Privacy, Smart contracts.Abstract
File get handled differently now – encryption handles them in the cloud. Every more afterward shows up on a blockchain log, stuck there forever, cannot be altered later. Actions like sharing, viewing, or editing appear one after without gaps. Permission rules live inside self-executing agreements that watch who does what. Access stays locked down until conditions line up just right. A fresh approach to handling digital files emerges when these tools work together. Because data moves with identifiable markets, trust grows around how files are shared or accessed later. In settings where security matters most – like hospitals, banks, or counts – this method helps meet strict rules without sacrificing speed. What stands out is how each action inside a shared folder leaves a clear mark behind it. Not every idea for online storage brings such clarity on security and openness at once. This method targets reliable handling of files while maintaining openness and safety. It brings together features from separate technologies in a way that works well. The setup helps keep data accurate, private, and supported by clear proof of every action tied to files.
References
1. Lakshmi, A. J., Dasari, R., Chilukuri, M., Tirumani, Y., Praveena, H. D., & Kumar, A. P. (2023, May). Design and implementation of a smart electric fence built on solar with an automatic irrigation system. In 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC) (pp. 1553–1558). IEEE.
2. Varshini, M., Chandrapathi, M., Manirekha, G., Balaraju, M., Afraz, M., Sarvanan, M., & Dharnasi, P. (2026). ATM access using card scanner and face recognition with AIML. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 9(1), 113–118.
3. Sugumar, R. (2025). Explainable AI-driven secure multi-modal analytics for financial fraud detection and cyber-enabled pharmaceutical network analysis. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 8(6), 13239–13249.
4. Ananth, S., Radha, D. K., Prema, D. S., & Nirajan, K. (2019). Fake news detection using convolution neural network in deep learning. International Journal of Innovative Research in Computer and Communication Engineering, 7(1), 49–63.
5. Poornima, G., & Anand, L. (2025). Medical image fusion model using CT and MRI images based on dual scale weighted fusion based residual attention network with encoder–decoder architecture. Biomedical Signal Processing and Control, 108, 107932.
6. Saravanan, M., & Sivakumaran, T. S. (2016). Three phase dual input direct matrix converter for integration of two AC sources from wind turbines. Circuits and Systems, 7, 3807–3817.
7. Prasanna, D., & Manishvarma, R. (2025, February). Skin cancer detection using image classification in deep learning. In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS) (pp. 1–8). IEEE.
8. Gogada, S., Gopichand, K., Reddy, K. C., Keerthana, G., Nithish Kumar, M., Shivalingam, N., & Dharnasi, P. (2026). Cloud computing/deep learning customer churn prediction for SaaS platforms. International Journal of Computer Technology and Electronics Communication (IJCTEC), 9(1), 74–78.
9. Inbavalli, M., & Arasu, T. (2015). Efficient analysis of frequent item set association rule mining methods. International Journal of Scientific & Engineering Research, 6(4).
10. Sammy, F., Chettier, T., Boyina, V., Shingne, H., Saluja, K., Mali, M., ... & Shobana, A. (2025). Deep learning-driven visual analytics framework for next-generation environmental monitoring. Journal of Applied Science and Technology Trends, 114–122.
11. Kiran, A., Rubini, P., & Kumar, S. S. (2025). Comprehensive review of privacy, utility and fairness offered by synthetic data. IEEE Access.
12. Amitha, K., Ram Manohar Reddy, M., Yashwanth, K., Shylaja, K., Rahul Reddy, M., Srinu, B., & Dharnasi, P. (2026). AI empowered security monitoring system with the help of deployed ML models. International Journal of Computer Technology and Electronics Communication (IJCTEC), 9(1), 69–73.
13. Sakthivel, T. S., Ragupathy, P., & Chinnadurai, N. (2025). Solar system integrated smart grid utilizing hybrid coot-genetic algorithm optimized ANN controller. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 1–24.
14. Madheswaran, M., Dhanalakshmi, R., Ramasubramanian, G., Aghalya, S., Raju, S., & Thirumaraiselvan, P. (2024, April). Advancements in immunization management for personalized vaccine scheduling with IoT and machine learning. In 2024 10th International Conference on Communication and Signal Processing (ICCSP) (pp. 1566–1570). IEEE.
15. Poornachandar, T., Latha, A., Nisha, K., Revathi, K., & Sathishkumar, V. E. (2025, September). Cloud-based extreme learning machines for mining waste detoxification efficiency. In 2025 4th International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp. 1348–1353). IEEE.
16. Aashiq Banu, S., Sucharita, M. S., Soundarya, Y. L., Nithya, L., Dhivya, R., & Rengarajan, A. (2020). Robust image encryption in transform domain using duo chaotic maps—A secure communication. In Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2020 (pp. 271–281). Springer.
17. Dharnasi, P. (2025). A multi-domain AI framework for enterprise agility integrating retail analytics with SAP modernization and secure financial intelligence. International Journal of Humanities and Information Technology, 7(4), 61–66.
18. Karthikeyan, K., & Umasankar, P. (2025). A novel buck-boost modified series forward (BBMSF) converter for enhanced efficiency in hybrid renewable energy systems. Ain Shams Engineering Journal, 16(10), 103557.
19. Feroz, A., Pranay, D., Srikar Sai Raj, B., Harsha Vardhan, C., Rohith Raja, B., Nirmala, B., & Dharnasi, P. (2026). Blockchain and machine learning combined secured voting system. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 9(1), 119–124.
20. Akula, A., Budha, G., Bingi, G., Chanda, U., Borra, A. R., Yadav, D. B., & Saravanan, M. (2026). Emotion recognition from facial expressions using CNNs. International Journal of Engineering & Extended Technologies Research (IJEETR), 8(1), 120–125.
21. Yashwanth, K., Adithya, N., Sivaraman, R., Janakiraman, S., & Rengarajan, A. (2021, July). Design and development of pipelined computational unit for high-speed processors. In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1–5). IEEE.
22. Prasanna, D., Ahamed, N. A., Abinesh, S., Karthikeyan, G., & Inbatamilan, R. (2024, November). Cloud-based automatically human document authentication processes for secured system. In 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS) (pp. 1–7). IEEE.
23. Ananth, S., Radha, D. K., Prema, D. S., & Nirajan, K. (2019). Fake news detection using convolution neural network in deep learning. International Journal of Innovative Research in Computer and Communication Engineering, 7(1), 49–63.
24. Saravanan, M., Kumar, A. S., Devasaran, R., Seshadri, G., & Sivaganesan, S. (2019). Performance analysis of very sparse matrix converter using indirect space vector modulation. International Journal of Innovative Technology and Exploring Engineering, 9(1), 4756–4762.
25. Karthikeyan, K., Umasankar, P., Parathraju, P., Prabha, M., & Pulivarthy, P. Integration and analysis of solar vertical axis wind hybrid energy system using modified zeta converter.

