AI-Driven Secure File Storage System Using Blockchain with Real-Time Anomaly Detection | IJCSE Volume 10 – Issue 2 | IJCSE-V10I2P32

IJCSE International Journal of Computer Science Engineering Logo

International Journal of Computer Science Engineering Techniques

ISSN: 2455-135X
Volume 10, Issue 2  |  Published:
Author

Abstract

In the era of digital transformation, ensuring the security of stored data has become increasingly challenging due to the rise in sophisticated cyber threats. This paper introduces an intelligent file storage framework that combines encryption techniques, blockchain-based access control, and artificial intelligence-driven anomaly detection to enhance data security. The proposed system encrypts files before storage, ensuring confidentiality, while blockchain mechanisms are used to validate ownership and control access in a decentralized manner. Additionally, a real-time risk assessment engine continuously monitors user behavior to identify suspicious activities. Upon detecting anomalies, the system initiates automated defensive actions such as access denial, IP blocking, file quarantine, and alert notifications. A centralized dashboard is also provided to visualize system activity and threat levels. The experimental outcomes indicate that the proposed framework significantly improves protection against unauthorized access and cyber attacks, making it suitable for modern secure storage environments.

Keywords

anomaly detection, artificial intelligence, blockchain, cybersecurity, secure file storage, zero trust architecture

Conclusion

This paper presents a secure and intelligent file storage framework that integrates encryption, blockchain, and AI-based anomaly detection. The system provides multiple layers of security, ensuring data protection against unauthorized access and malicious activities. By incorporating real-time monitoring and automated response mechanisms, the proposed solution enhances both security and system reliability. The approach demonstrates strong potential for application in modern cloud storage and enterprise security systems.

References

[1]S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008. [2]D. Boneh and V. Shoup, “A Graduate Course in Applied Cryptography,” 2020. [3]K. Christidis and M. Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016. [4]R. Sommer and V. Paxson, “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection,” IEEE Symposium on Security and Privacy, 2010. [5]National Institute of Standards and Technology (NIST), “Guide to Intrusion Detection and Prevention Systems (IDPS),” 2012. [6]M. Conti, S. Kumar, C. Lal, and S. Ruj, “A Survey on Security and Privacy Issues of Bitcoin,” IEEE Communications Surveys & Tutorials, 2018. [7]Scikit-learn Developers, “Anomaly Detection Techniques,” [Online]. Available: https://scikit-learn.org [8]OWASP Foundation, “OWASP Top 10 Web Application Security Risks,” 2021. [9]A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Advances in Cryptology, 1984. [10]J. Andress, “The Basics of Information Security,” Elsevier, 2014.
Š 2025 International Journal of Computer Science Engineering Techniques (IJCSE).
Submit Your Paper