Cloud Computing Access Control Using Blockchain

Authors

  • Manal Ayyadh Alshammari College of Computer and Information Sciences, Jouf University, KSA
  • Hedi Hamdi College of Computer and Information Sciences, Jouf University, KSA and University of Manouba., Tunisia
  • Mahmood A. Mahmood College of Computer and Information Sciences, Jouf University, KSA and Faculty of Graduate Studies for Statistical Research, Cairo University, Egypt
  • A. A. Abd El-Aziz College of Computer and Information Sciences, Jouf University, KSA and Faculty of Graduate Studies for Statistical Research, Cairo University, Egypt

Keywords:

Blockchain, Cloud Computing, Processing System, Network Access

Abstract

Access control is a pivotal aspect of modern computing systems, ensuring that only authorized entities can interact with sensitive data and resources. Traditional access control methods, while effective, face challenges in terms of security, transparency, and scalability. Blockchain technology has emerged as a promising solution to enhance access control in cloud computing environments. Blockchain's inherent features, such as decentralization, immutability, and cryptographic security, offer a unique framework for addressing the limitations of traditional access control systems. In this paper, we explore the integration of blockchain technology with cloud computing to establish a more secure and transparent access control mechanism. By utilizing blockchain, access control policies and permissions can be stored in a tamper-proof and transparent ledger. Scalability is an issue since processing many access control transactions on the blockchain might cause network congestion and sluggish processing. Transactions take time to upload to the blockchain, which can delay real-time access choices. It takes skill to integrate and manage blockchain and cloud technologies together. Choosing the correct consensus mechanism affects system efficiency and security. Consider the costs of establishing and maintaining such a system and the difficulty of fixing faults owing to blockchain immutability. In conclusion, this paper underscores the significance of access control in cloud computing and the limitations of traditional approaches. By harnessing the power of blockchain technology, a more secure, transparent, and scalable access control framework can be established, revolutionizing the way we manage access to sensitive data and resources in complex digital ecosystems.

Downloads

Download data is not yet available.

References

OECD, “Recommendation of the Council on Health Data Governance,” 2019. OECD/LEGAL/0433, Paris. Retrieved fromhttps://www.oecd.org/health/health- systems/Recommendation-of-OECD-Council-on-Health-DataGovernance-Booklet.pdf

B. P. SERIES, “Opportunities and Challenges of Blockchain Technologies in Health Care,” 2020.

Nedhal, A. Al-Saiyd, N. Sail, “Data Integrity in Cloud Computing Security,” Journal of Theoretical and Applied Information Technology, vol. 58, no. 3, pp. 570-581, 2013.

M. Alshinwana, A. Y. Shdefatb, N. Mostafab, A. A. M. AlSokkarc, T. Alsarhana, and D. Almajalic, “Integrated cloud computing and blockchain systems: A review,” International Journal of Data and Network Science, vol. 7, no. 2023, pp. 941-956, 2023.

S. T. Faraj, S. A. Jassim, and K. Kifayat, “Management of Identity and Access in the Cloud,” Journal of the University of Anbar for Pure Science, vol. 6, no. 2, pp. 11-23, 2012.

W. Ahmad, A. Rasool, A. R. Javed, T. Baker, and Z. Jalil, “Cyber security in IoT-based cloud computing: A comprehensive survey,” Electronics, vol. 11, no. 1, 2022.

S. S. Sarmah, “Application of block chain in cloud computing,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 8, no. 12, pp. 4698-4704, 2019.

O. Ali, A. Jaradat, A. Kulakli, and A. Abuhalimeh, “Comparative study: Blockchain technology utilization benefits, challenges, and functionalities,” Ieee Access, vol. 9, pp. 12730-12749, 2021.

A. Gupta, S. T. Siddiqui, S. Alam, and M. Shuaib, “Cloud computing security using blockchain,” Journal of Emerging Technologies and Innovative Research (JETIR), vol. 6, no. 6, pp. 791-794, 2019.

W. Venters and E. A. Whitley, “A critical review of cloud computing: Researching desires and realities,” J. Inf. Technol., vol. 27, no. 3, pp. 179–197, 2012.

J. Zhang, X. Nian, and H. Xin, “A Secure System For Pervasive Social Network-based Healthcare,” IEEE Access, vol. 4, pp. 9239-9250, 2016.

Ch. V. N. U. B. Murthy, L. M. Shri, S. Kadry, and S. Lim, “Blockchain Based Cloud Computing: Architecture and Research Challenges,” IEEE Access, vol. 8, 2020.

C. Yang, L. Tan, N. Shi, B. Xu, Y. Cao, and K. Yu, “AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud,” IEEE Access, vol. 8, pp. 70604-70615, 2020.

Z. Dong, Y. C. Lee, and A. Y. Zomaya, “Proofware: Proof of useful work blockchain consensus protocol for decentralized applications,” 2019, arXiv preprint arXiv:1903.09276.

X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, and L. Njilla, “Provchain: A blockchain- based data provenance architecture in a cloud environment with enhanced privacy and availability,” IEEE, 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 468-477, 2017.

X. Zheng, R. R. Mukkamala, R. Vatrapu, J. Ordieres-Mere, “Blockchain-based Personal Health Data Sharing System Using Cloud Storage,” IEEE, J. Kubicek (Ed.), 20th International Conference on E-Health Networking, Applications and Services (Healthcom) Los Alamos, CA: IEEE, 2018.

N. Mansourov, and D. Campara, “Knowledge of risk as an element of cybersecurity argument,” System Assurance, 2011.

Z. Shahbazi and Y. C. Byun, “Improving transactional data system based on an edge computing–blockchain–machine learning integrated framework,” Processes, vol. 9, no. 1, pp. 92, 2021.

M. Laurent, N. Kaaniche, C. Le, and M. Vander, “Plaetse, A blockchainbased access control scheme,” ICETE, 2018 - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, vol. 2, no. 7, pp. 168–176, 2018.

Downloads

Published

27.12.2023

How to Cite

Alshammari, M. A. ., Hamdi, H. ., Mahmood, M. A. ., & El-Aziz, A. A. A. . (2023). Cloud Computing Access Control Using Blockchain. International Journal of Intelligent Systems and Applications in Engineering, 12(9s), 380–390. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4329

Issue

Section

Research Article