location:Home > 2025 Vol.8 Apr.N02 > A Secure Storage Method for Enterprise Financial Data Based on Cloud Computing Technology

2025 Vol.8 Apr.N02

  • Title: A Secure Storage Method for Enterprise Financial Data Based on Cloud Computing Technology
  • Name: Tantan Liu
  • Company: Zhengzhou institute of technology,department of economic and trade management , ZhengZhou 451150,China
  • Abstract:

    Enterprise financial data security storage methods mostly rely on traditional means such as localized encryption, regular backups and firewall isolation, which leads to poor storage security because static encryption cannot withstand dynamic attacks in the cloud environment. In this regard, a secure storage method for enterprise financial data based on cloud computing technology is proposed. Through the sequence segmentation of enterprise financial data sets, the continuous data flow is divided into normal and abnormal sequences according to business logic and statistical characteristics, and allocated to buffer areas with different capacities to realize orderly data storage and fast retrieval. Based on the distributed computing capability of cloud computing, sparse transformation and reconstruction algorithms are used to compress high-density data to reduce transmission bandwidth and storage overhead, while redundant information is eliminated through cluster analysis. Combining homomorphic encryption and blockchain technology, the compressed data is dynamically encrypted and stored in the cloud distributed node. In the experiment, the proposed method is verified for storage security. The test and comparison results make it clear that the average data leakage rate is 0.3% when the proposed method is used for secure storage of financial data, which has a more ideal storage effect.


  • Keyword: cloud computing technology; corporate financial data; secure storage; storage effectiveness;
  • DOI: 10.12250/jpciams2025090415
  • Citation form: Tantan Liu.A Secure Storage Method for Enterprise Financial Data Based on Cloud Computing Technology[J]. Computer Informatization and Mechanical System,2025,Vol.8,pp.
Reference:

[1] Wang Z , Gao W , Yang M H R .Enabling secure data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems[J].Cluster computing, 2023, 26(6):3839-3854.

[2] Kandpal M , Pritwani Y , Misra S B R K .TOWARDS DATA STORAGE SCHEME IN BLOCKCHAIN BASED SERVERLESS ENVIRONMENT: AES ENCRYPTION AND DECRYPTION ALGORITHM APPROACH[J]. facta universitatis-series electronics and energetics, 2024, 37(2):317-342.

[3] Kaur V , Bhatt D P , Tiwari K T S .Blockchain technology combined with the CNN and Hashing algorithms enabled the secure storage of 3D biometric face and ear data[J].Journal of Discrete Mathematical Sciences and Cryptography, 2023, 26(3):729-738.

[4] Wu H , Ye W , Guo Y .Data access control method of cloud network secure storage under Social Internet of Things environment[J].International journal of systems assurance engineering and management, 2023, 14(4):1379-1386

[5] Dhanalakshmi G , George G V S .Secure and Privacy-Preserving Storage of E-Healthcare Data in the Cloud: Advanced Data Integrity Measures and Privacy Assurance[J].International Journal of Engineering Trends and Technology, 2023, 71(10):238-253.

[6] Gupta S S , Pandey T K , Raju V P ,et al. Diabetes Estimation Through Data Mining Using Optimization, Clustering, and Secure Cloud Storage Strategies[J]. .SN Computer Science, 2024, 5(6):1-9

[7] Siedlecka-Lamch O .Secure Medical Data Storage with Blockchain Technology[J].Procedia Computer Science, 2023, 225:961-968

[8] Sultan N H , Kermanshahi S K ,Hong Y. TranShangqi LaiVijay VaradharajanSurya NepalXun Yi.Securely sharing outsourced IoT data: a secure access and privacy preserving keyword search scheme[J].Ad hoc networks, 2024, 158(May):103478.1-103478.14

[9] Shinzeer C K , Information V F A , Bhagat A ,et al. Secure medical data storage in DPOS-hyper ledger fabric block chain using PM-ECC and L2-DWT[J]. International Journal of Computers and Applications, 2023, 45(7-8):516-522

[10] Zakharov A , Zakharova I G , Korenev D .Blockchain Architecture for Secure Storage of IoT Data[J].2023 International Russian Smart Industry Conference (SmartIndustryCon), 2023:236-240

[11] Seshasai K J , Srinivas S .Smart Crypt-Secure Storage and Sharing of Time Series Data Stream in Iot[J]. Technology, 2023, 14(3):13-21.

[12] Shivani B , Srinivas D .Secure Data Sharing for Cloud Computing Based Cloud Storage System[J]. Technology, 2023, 14(3):34-37.

[13] Geetha R E , Tukkoji C .Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems[J].SN Computer Science, 2024, 5(4). 396-1-396-14.

[14]Krisztián Bálint.Blockchain and Smart Contract Creation for Efficient and Secure Data Storage of Consumer Habits and Logistics Data[J].Procedia Computer Science, 2025, 253(000):49-58

[15] Wan X , Zhang T , Cheng Y . Laboratory Network Data Storage Algorithm Based on Elastic Space Model [J]. Computer Simulation, 2024, 41 (09): 368-371+428.

 

 


Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16