Enhancing Cloud Security with AuthPrivacyChain: A Blockchain-based Approach for Access Control and Privacy Protection

Authors

  • J. Mahalakshmi Associate professor, Information Technology,MLR institute of technology, Telangana , India
  • A. Malla Reddy Associate Professor, Department of Information Technology, CVR College of Engineering, Hyderabad, Telangana
  • Sowmya T. Assistant professor CMR Institute of Technology Bengaluru, Karnataka, India
  • B. V. Chowdary Associate Professor, Department of Information technology, Vignan Institute of Technology and Science, Telangana, India
  • P. Radhika Raju Assistant Professor (A) , CSE Department, JNTUACE, Ananthapuramu, Andhra Pradesh, India

Keywords:

Cloud computing, Access control, Privacy protection, Blockchain, Smart contracts Cryptographic techniques

Abstract

Cloud computing is a popular option for storing and accessing data and applications, but it raises security concerns related to access control and privacy protection. To address these concerns, this paper proposes a novel approach called AuthPrivacyChain, which is a blockchain-based solution for enhancing cloud security. AuthPrivacyChain provides a decentralized, transparent, and tamper-evident access control mechanism that uses smart contracts to define the rules for granting or denying access to cloud resources. The smart contracts are stored in a tamper-evident and immutable manner on the blockchain, which provides transparency and accountability for all access control decisions. The AuthPrivacyChain approach also uses cryptographic techniques, such as digital signatures and encryption, to ensure the privacy and confidentiality of user data. It uses a zero-knowledge proof mechanism to enable users to prove their identity without revealing any sensitive information. The authors evaluate the AuthPrivacyChain approach using a prototype implementation and show that it can provide effective access control and privacy protection for cloud-based resources. The results suggest that AuthPrivacyChain could be a promising solution to enhance cloud security and address security concerns related to cloud computing. Overall, AuthPrivacyChain is a blockchain-based solution that provides decentralized access control and privacy protection for cloud-based resources, using smart contracts, cryptographic techniques, and a distributed ledger to ensure transparency, accountability, and security.

Downloads

Download data is not yet available.

References

Zhou, M., Zhang, R., Xie, W., Qian, W., & Zhou, A. (2010, November). Security and privacy in cloud computing: A survey. In 2010 Sixth International Conference on Semantics, Knowledge and Grids (pp. 105-112). IEEE.

Pearson, S., & Benameur, A. (2010, November). Privacy, security and trust issues arising from cloud computing. In 2010 IEEE Second International Conference on Cloud Computing Technology and Science (pp. 693-702). IEEE.

Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In 2012 international conference on computer science and electronics engineering (Vol. 1, pp. 647-651). IEEE.

Tariq, N., Qamar, A., Asim, M., & Khan, F. A. (2020). Blockchain and smart healthcare security: a survey. Procedia Computer Science, 175, 615-620.

Ghorbel, A., Ghorbel, M., & Jmaiel, M. (2021). Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain. International Journal of Information Security, 1-20.

H. Liang, J. Wu, S. Mumtaz, J. Li, X. Lin and M. Wen, "MBID: Micro-blockchain-based geographical dynamic intrusion detection for V2X", IEEE Commun. Mag., vol. 57, no. 10, pp. 77-83, Oct. 2019.

J. Wu, M. Dong, K. Ota, J. Li, W. Yang and M. Wang, "Fog-Computing-Enabled cognitive network function virtualization for an information-centric future Internet", IEEE Commun. Mag., vol. 57, no. 7, pp. 48-54, Jul. 2019.

L. Wang and X. Zhao, "Research on service composition strategy based on blockchain mechanism in cloud computing environment", Appl. Res. Comput. (Chin.), vol. 26, no. 91, pp. 81-86, 2019.

B. Pittl, W. Mach and E. Schikuta, "Bazaar-blockchain: A blockchain for bazaar-based cloud markets", Proc. IEEE Int. Conf. Services Comput. (SCC), pp. 89-96, Jul. 2018.

Y. Zhang, R. Deng, X. Liu and D. Zheng, "Outsourcing service fair payment based on blockchain and its applications in cloud computing", IEEE Trans. Services Comput., Aug. 2018.

J. Li, J. Wu and L. Chen, "Block-secure: Blockchain based scheme for secure P2P cloud storage", Inf. Sci., vol. 465, pp. 219-231, Oct. 2018.

G. Edoardo, A. Leonardo, B. Roberto, L. Federico, M. Andrea and V. Sassone, "Blockchain-based database to ensure data integrity in cloud computing environments", Proc. Italian Conf. Cybersecur., Jan. 2017.

G. Edoardo, A. Leonardo, B. Roberto, L. Federico, M. Andrea and V. Sassone, "Blockchain-based database to ensure data integrity in cloud computing environments", Proc. Italian Conf. Cybersecur., Jan. 2017.

D. K. Tosh, S. Shetty, X. Liang, C. Kamhoua and L. Njilla, "Consensus protocols for blockchain-based data provenance: Challenges and opportunities", Proc. IEEE 8th Annu. Ubiquitous Comput. Electron. Mobile Commun. Conf. (UEMCON), pp. 469-474, Oct. 2017

X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat and L. Njilla, "ProvChain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability", Proc. 17th IEEE/ACM Int. Symp. Cluster Cloud Grid Comput. (CCGRID), pp. 468-477, May 2017.

D. Tosh, S. Shetty, P. Foytik, C. Kamhoua and L. Njilla, "CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud", Proc. IEEE 11th Int. Conf. Cloud Comput. (CLOUD), pp. 302-309, Jul. 2018.

Ouaddah, A., Mousannif, H., Abou Elkalam, A., & Ouahman, A. A. (2017). Access control in the Internet of Things: Big challenges and new opportunities. Computer Networks, 112, 237-262.

Debnath, D., Chettri, S. K., & Dutta, A. K. (2022). Security and privacy issues in internet of things. In ICT Analysis and Applications (pp. 65-74). Springer Singapore.

M, P., & K, D. S. D. (2023). ICN Scheme and Proxy re-encryption for Privacy Data Sharing on the Block Chain. International Journal of Computer Engineering in Research Trends, 10(4), 172–176.

M. R. Arun , M. R. Sheeba , F. Shabina Fred Rishma,(2020). Comparing BlockChain with other Cryptographic Technologies (DAG, Hashgraph, Holochain). International Journal of Computer Engineering in Research Trends, 7(4), 13–19.

Ashesh K Chaudhuri , Mani S Sen (2019). Digital Technologies and Its Scope in Shoplifting Prevention. International Journal of Computer Engineering in Research Trends, 6(10), 1–3.

Ayushi Singh , Gulafsha Shujaat , Isha Singh , Abhishek Tripathi , Divya Thakur (2019). A Survey of Blockchain Technology Security. International Journal of Computer Engineering in Research Trends, 6(4), 299–303.

The AuthPrivacyChain Methodology

Downloads

Published

17.05.2023

How to Cite

Mahalakshmi, J. ., Reddy, A. M. ., T., S. ., Chowdary, B. V. ., & Raju, P. R. . (2023). Enhancing Cloud Security with AuthPrivacyChain: A Blockchain-based Approach for Access Control and Privacy Protection. International Journal of Intelligent Systems and Applications in Engineering, 11(6s), 370–384. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2863

Issue

Section

Research Article