Cloud Computing Access Control Using Blockchain
Keywords:
Blockchain, Cloud Computing, Processing System, Network AccessAbstract
Access control is a pivotal aspect of modern computing systems, ensuring that only authorized entities can interact with sensitive data and resources. Traditional access control methods, while effective, face challenges in terms of security, transparency, and scalability. Blockchain technology has emerged as a promising solution to enhance access control in cloud computing environments. Blockchain's inherent features, such as decentralization, immutability, and cryptographic security, offer a unique framework for addressing the limitations of traditional access control systems. In this paper, we explore the integration of blockchain technology with cloud computing to establish a more secure and transparent access control mechanism. By utilizing blockchain, access control policies and permissions can be stored in a tamper-proof and transparent ledger. Scalability is an issue since processing many access control transactions on the blockchain might cause network congestion and sluggish processing. Transactions take time to upload to the blockchain, which can delay real-time access choices. It takes skill to integrate and manage blockchain and cloud technologies together. Choosing the correct consensus mechanism affects system efficiency and security. Consider the costs of establishing and maintaining such a system and the difficulty of fixing faults owing to blockchain immutability. In conclusion, this paper underscores the significance of access control in cloud computing and the limitations of traditional approaches. By harnessing the power of blockchain technology, a more secure, transparent, and scalable access control framework can be established, revolutionizing the way we manage access to sensitive data and resources in complex digital ecosystems.
Downloads
References
OECD, “Recommendation of the Council on Health Data Governance,” 2019. OECD/LEGAL/0433, Paris. Retrieved fromhttps://www.oecd.org/health/health- systems/Recommendation-of-OECD-Council-on-Health-DataGovernance-Booklet.pdf
B. P. SERIES, “Opportunities and Challenges of Blockchain Technologies in Health Care,” 2020.
Nedhal, A. Al-Saiyd, N. Sail, “Data Integrity in Cloud Computing Security,” Journal of Theoretical and Applied Information Technology, vol. 58, no. 3, pp. 570-581, 2013.
M. Alshinwana, A. Y. Shdefatb, N. Mostafab, A. A. M. AlSokkarc, T. Alsarhana, and D. Almajalic, “Integrated cloud computing and blockchain systems: A review,” International Journal of Data and Network Science, vol. 7, no. 2023, pp. 941-956, 2023.
S. T. Faraj, S. A. Jassim, and K. Kifayat, “Management of Identity and Access in the Cloud,” Journal of the University of Anbar for Pure Science, vol. 6, no. 2, pp. 11-23, 2012.
W. Ahmad, A. Rasool, A. R. Javed, T. Baker, and Z. Jalil, “Cyber security in IoT-based cloud computing: A comprehensive survey,” Electronics, vol. 11, no. 1, 2022.
S. S. Sarmah, “Application of block chain in cloud computing,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 8, no. 12, pp. 4698-4704, 2019.
O. Ali, A. Jaradat, A. Kulakli, and A. Abuhalimeh, “Comparative study: Blockchain technology utilization benefits, challenges, and functionalities,” Ieee Access, vol. 9, pp. 12730-12749, 2021.
A. Gupta, S. T. Siddiqui, S. Alam, and M. Shuaib, “Cloud computing security using blockchain,” Journal of Emerging Technologies and Innovative Research (JETIR), vol. 6, no. 6, pp. 791-794, 2019.
W. Venters and E. A. Whitley, “A critical review of cloud computing: Researching desires and realities,” J. Inf. Technol., vol. 27, no. 3, pp. 179–197, 2012.
J. Zhang, X. Nian, and H. Xin, “A Secure System For Pervasive Social Network-based Healthcare,” IEEE Access, vol. 4, pp. 9239-9250, 2016.
Ch. V. N. U. B. Murthy, L. M. Shri, S. Kadry, and S. Lim, “Blockchain Based Cloud Computing: Architecture and Research Challenges,” IEEE Access, vol. 8, 2020.
C. Yang, L. Tan, N. Shi, B. Xu, Y. Cao, and K. Yu, “AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud,” IEEE Access, vol. 8, pp. 70604-70615, 2020.
Z. Dong, Y. C. Lee, and A. Y. Zomaya, “Proofware: Proof of useful work blockchain consensus protocol for decentralized applications,” 2019, arXiv preprint arXiv:1903.09276.
X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, and L. Njilla, “Provchain: A blockchain- based data provenance architecture in a cloud environment with enhanced privacy and availability,” IEEE, 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 468-477, 2017.
X. Zheng, R. R. Mukkamala, R. Vatrapu, J. Ordieres-Mere, “Blockchain-based Personal Health Data Sharing System Using Cloud Storage,” IEEE, J. Kubicek (Ed.), 20th International Conference on E-Health Networking, Applications and Services (Healthcom) Los Alamos, CA: IEEE, 2018.
N. Mansourov, and D. Campara, “Knowledge of risk as an element of cybersecurity argument,” System Assurance, 2011.
Z. Shahbazi and Y. C. Byun, “Improving transactional data system based on an edge computing–blockchain–machine learning integrated framework,” Processes, vol. 9, no. 1, pp. 92, 2021.
M. Laurent, N. Kaaniche, C. Le, and M. Vander, “Plaetse, A blockchainbased access control scheme,” ICETE, 2018 - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, vol. 2, no. 7, pp. 168–176, 2018.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.