Securing Distributed Blockchain Ledgers: An Intrusion Detection System Powered by Advanced Smart Contracts for Enhanced Cloud-Based Big Data Storage

Authors

  • Shailender Kumar Vats, Prasadu Peddi, Prashant Vats

Keywords:

Blockchain Security; Ethereum Smart Contracts; Intrusion Detection System (IDS); Distributed Ledger Technology; Cloud-Based Big Data Storage; Confidentiality Assurance; Verifiable Access Control; MD5 Schema; Decentralized Environments; Decentralized Applications (DApps); Advanced Cryptography; Blockchain Governance; Scalability; Data Integrity; External Data Integration.

Abstract

With its decentralized and unchangeable data management capabilities, blockchain technology has become a disruptive factor in a number of businesses. Distributed blockchain ledger security, however, is still a major worry, especially for cloud-based massive data storage environments. With the help of sophisticated smart contracts running on the Ethereum blockchain, this article offers a thorough solution to this problem: the creation of an intrusion detection system (IDS). The suggested IDS incorporates a number of crucial components to improve security in distributed blockchain networks. The first thing it stresses is the protection of secrecy through the use of data encryption procedures and cryptographic techniques. The information distribution system (IDS) uses Ethereum smart contracts to safeguard private data kept on the blockchain from modification or unwanted access. Strong security features are delivered by the suggested IDS while preserving scalability and efficiency thanks to the integration of sophisticated smart contracts with cloud-based large data storage infrastructure. Transparency, auditability, and resistance to malicious assaults and single points of failure are ensured by utilizing the Ethereum blockchain, which serves as a decentralized infrastructure for smart contract execution. All things considered; this work offers a new way to improve distributed blockchain ledger security by deploying an IDS that is driven by Ethereum smart contracts. The suggested method provides a thorough answer to the security issues faced by cloud-based big data storage systems by taking care of important components such data integrity, confidentiality, and access control. By means of empirical assessment and practical implementation, the efficacy and expandability of the suggested IDS may be confirmed, hence promoting the progression of security protocols inside blockchain networks.

Downloads

Download data is not yet available.

References

Zhiguo Wan, Jun’e Liu, and R.-H. Deng. Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. Information Forensics and Security, IEEE Transactions on, Vol. 7, No. 2, pp. 743–754, 2012.

Iankoulova and M. Daneva. Cloud computing security requirements: A systematic review. In Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on, pp. 1–7, May. 7, 8

Haiying Ma, Zhanjun Wang, and Zhijin Guan, “Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation”, Security and Communication Networks, Vol. 19, pp. 1-11, 2019.

Hefeng Chen and Chin-Chen Chang, “A Novel Secret Sharing Scheme Based upon Euler’s Theorem, Security and Communication Networks”, Vol. 19, pp. 1-7, 2019.

Dindayal Mahto, Dilip Kumar Yadav, RSA and ECC: A Comparative Analysis, International Journal of Applied Engineering Research, Vol. 12, No. 19, pp. 9053-9061, 2017.

NTRU Cryptosystem was created by J. Hoffstein in 1996, J. Pipher and J. H. Silverman.

Yanjiang Yang and Youcheng Zhang. A generic scheme for secure data sharing in cloud. In Parallel Processing Workshops (ICPPW), 2011 40th International Conference on, pp. 145–153, 2011.

Nguyen Thanh Hung, Do Hoang Giang, Ng Wee Keong, and Huafei Zhu. Cloud-enabled data sharing model. In Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on, pp. 1–6, 2012.

M.R. Islam and M. Habiba. Agent based framework for providing security to data storage in cloud. In Computer and Information Technology (ICCIT), 2012, 15th International Conference on, pp. 446–451, 2012.

Kumar, Byung Gook Lee, HoonJae Lee, and A. Kumari. Secure storage and access of data in cloud computing. In ICT Convergence (ICTC), 2012 International Conference on, pp. 336–339, 2012.

S. Gupta, S.R. Satapathy, P. Mehta, and A. Tripathy. A secure and searchable data storage in cloud computing. In Advance Computing Conference (IACC),2013 IEEE 3rd International, pp. 106–109, 2013.

Xiao Zhang, Hongtao Du, JianquanChen, YiLin, and LeijieZeng. Ensure data security in cloud storage. In Network Computing and Information Security (NCIS), 2011 International Conference on, volume 1, pages 284–287, 2011.

Kumbhare, Y. Simmhan, and V. Prasanna. Cryptonite: A secure and performant data repository on public clouds. In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, pp. 510–517, 2012.

S. Gupta, S.R. Satapathy, P. Mehta, and A. Tripathy. A secure and searchable data storage in cloud computing. In Advance Computing Conference (IACC), 2013 IEEE 3rd International, pages 106–109, 2013.

Raluca Ada Popa, JacobR.Lorch, DavidMolnar, HelenJ.Wang, and LiZhuang. Enabling security in cloud storage SLAs with cloud proof. In Proceedings of the 2011USENIX conference on USENIX annual technical conference, USENIXATC’11, pages 31–31, Berkeley, CA, USA, 2011. USENIX Association.

Guojun Wang, Qin Liu, and Jie Wu. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the 17th ACM conference on Computer and communications security, CCS ’10, pp. 735–737, New York, NY, USA, 2010. ACM.

Zhiguo Wan, Jun’e Liu, and R.-H. Deng. Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. Information Forensics and Security, IEEE Transactions on, Vol. 7, No. 2, pp. 743–754, 2012.

Kan Yang and Xiaohua Jia. Attributed-based access control for multi-authority systems in cloud storage. In Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on, pp. 536–545, 2012.

Zhu Tianyi, Liu Weidong, and Song Jiaxing. An efficient role-based access control system for cloud computing. In Computer and Information Technology (CIT), 2011 IEEE 11th International Conference on, pp. 97–102, 2011.

Amit Sangroya, Saurabh Kumar, Jaideep Dhok, and Vasudeva Varma. Towards analyzing data security risks in cloud computing environments. In Sushil K. Prasad, Harrick M. Vin, Sartaj Sahni, MahadeoP. Jaiswal, and Bundit Thipakorn, editors, Information Systems, Technology and Management, volume 54 of Communications in Computer and Information Science, pages 255–265. Springer Berlin Heidelberg, 2010.

S. Berger, R. C´aceres, K. Goldman, D. Pendarakis, R. Perez, J. R. Rao, E. Rom, R. Sailer, W. Schildhauer, D. Srinivasan, S. Tal, and E. Valdez. Security for the cloud infrastructure: trusted virtual data center implementation. IBM J. Res. Dev., Vol. 53, No. 4, pp. 560–571, July 2009.

Sirisha and G.G. Kumari. API access control in cloud using the role-based access control model. In Trendz in Information Sciences Computing (TISC), 2010, pages 135–137, 2010.

Hema Andal Jayaprakash Narayanan, Mehmet Hadi Gunes, “Ensuring access control in cloud provisioned health care systems”, IEEE Consumer Communications and Networking Conference, 2011.

Li J, Wang H, Zhang Y, Shen J (2016) Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. Ksii Transactions on Internet & Information Systems 10: 3339–3352

Hu, D. Ferraiolo, Kuhn, Information Technology Laboratory National Institute Standards, and Technology. Assessment of Access Control Systems, Interagency Report 7316. Technical report, National Institute of Standards and Technology, 2006.

Downloads

Published

16.03.2024

How to Cite

Prasadu Peddi, Prashant Vats, S. K. V. . (2024). Securing Distributed Blockchain Ledgers: An Intrusion Detection System Powered by Advanced Smart Contracts for Enhanced Cloud-Based Big Data Storage . International Journal of Intelligent Systems and Applications in Engineering, 12(3), 901–909. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5370

Issue

Section

Research Article