Securing Distributed Blockchain Ledgers: An Intrusion Detection System Powered by Advanced Smart Contracts for Enhanced Cloud-Based Big Data Storage
Keywords:
Blockchain Security; Ethereum Smart Contracts; Intrusion Detection System (IDS); Distributed Ledger Technology; Cloud-Based Big Data Storage; Confidentiality Assurance; Verifiable Access Control; MD5 Schema; Decentralized Environments; Decentralized Applications (DApps); Advanced Cryptography; Blockchain Governance; Scalability; Data Integrity; External Data Integration.Abstract
With its decentralized and unchangeable data management capabilities, blockchain technology has become a disruptive factor in a number of businesses. Distributed blockchain ledger security, however, is still a major worry, especially for cloud-based massive data storage environments. With the help of sophisticated smart contracts running on the Ethereum blockchain, this article offers a thorough solution to this problem: the creation of an intrusion detection system (IDS). The suggested IDS incorporates a number of crucial components to improve security in distributed blockchain networks. The first thing it stresses is the protection of secrecy through the use of data encryption procedures and cryptographic techniques. The information distribution system (IDS) uses Ethereum smart contracts to safeguard private data kept on the blockchain from modification or unwanted access. Strong security features are delivered by the suggested IDS while preserving scalability and efficiency thanks to the integration of sophisticated smart contracts with cloud-based large data storage infrastructure. Transparency, auditability, and resistance to malicious assaults and single points of failure are ensured by utilizing the Ethereum blockchain, which serves as a decentralized infrastructure for smart contract execution. All things considered; this work offers a new way to improve distributed blockchain ledger security by deploying an IDS that is driven by Ethereum smart contracts. The suggested method provides a thorough answer to the security issues faced by cloud-based big data storage systems by taking care of important components such data integrity, confidentiality, and access control. By means of empirical assessment and practical implementation, the efficacy and expandability of the suggested IDS may be confirmed, hence promoting the progression of security protocols inside blockchain networks.
Downloads
References
Zhiguo Wan, Jun’e Liu, and R.-H. Deng. Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. Information Forensics and Security, IEEE Transactions on, Vol. 7, No. 2, pp. 743–754, 2012.
Iankoulova and M. Daneva. Cloud computing security requirements: A systematic review. In Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on, pp. 1–7, May. 7, 8
Haiying Ma, Zhanjun Wang, and Zhijin Guan, “Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation”, Security and Communication Networks, Vol. 19, pp. 1-11, 2019.
Hefeng Chen and Chin-Chen Chang, “A Novel Secret Sharing Scheme Based upon Euler’s Theorem, Security and Communication Networks”, Vol. 19, pp. 1-7, 2019.
Dindayal Mahto, Dilip Kumar Yadav, RSA and ECC: A Comparative Analysis, International Journal of Applied Engineering Research, Vol. 12, No. 19, pp. 9053-9061, 2017.
NTRU Cryptosystem was created by J. Hoffstein in 1996, J. Pipher and J. H. Silverman.
Yanjiang Yang and Youcheng Zhang. A generic scheme for secure data sharing in cloud. In Parallel Processing Workshops (ICPPW), 2011 40th International Conference on, pp. 145–153, 2011.
Nguyen Thanh Hung, Do Hoang Giang, Ng Wee Keong, and Huafei Zhu. Cloud-enabled data sharing model. In Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on, pp. 1–6, 2012.
M.R. Islam and M. Habiba. Agent based framework for providing security to data storage in cloud. In Computer and Information Technology (ICCIT), 2012, 15th International Conference on, pp. 446–451, 2012.
Kumar, Byung Gook Lee, HoonJae Lee, and A. Kumari. Secure storage and access of data in cloud computing. In ICT Convergence (ICTC), 2012 International Conference on, pp. 336–339, 2012.
S. Gupta, S.R. Satapathy, P. Mehta, and A. Tripathy. A secure and searchable data storage in cloud computing. In Advance Computing Conference (IACC),2013 IEEE 3rd International, pp. 106–109, 2013.
Xiao Zhang, Hongtao Du, JianquanChen, YiLin, and LeijieZeng. Ensure data security in cloud storage. In Network Computing and Information Security (NCIS), 2011 International Conference on, volume 1, pages 284–287, 2011.
Kumbhare, Y. Simmhan, and V. Prasanna. Cryptonite: A secure and performant data repository on public clouds. In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, pp. 510–517, 2012.
S. Gupta, S.R. Satapathy, P. Mehta, and A. Tripathy. A secure and searchable data storage in cloud computing. In Advance Computing Conference (IACC), 2013 IEEE 3rd International, pages 106–109, 2013.
Raluca Ada Popa, JacobR.Lorch, DavidMolnar, HelenJ.Wang, and LiZhuang. Enabling security in cloud storage SLAs with cloud proof. In Proceedings of the 2011USENIX conference on USENIX annual technical conference, USENIXATC’11, pages 31–31, Berkeley, CA, USA, 2011. USENIX Association.
Guojun Wang, Qin Liu, and Jie Wu. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the 17th ACM conference on Computer and communications security, CCS ’10, pp. 735–737, New York, NY, USA, 2010. ACM.
Zhiguo Wan, Jun’e Liu, and R.-H. Deng. Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. Information Forensics and Security, IEEE Transactions on, Vol. 7, No. 2, pp. 743–754, 2012.
Kan Yang and Xiaohua Jia. Attributed-based access control for multi-authority systems in cloud storage. In Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on, pp. 536–545, 2012.
Zhu Tianyi, Liu Weidong, and Song Jiaxing. An efficient role-based access control system for cloud computing. In Computer and Information Technology (CIT), 2011 IEEE 11th International Conference on, pp. 97–102, 2011.
Amit Sangroya, Saurabh Kumar, Jaideep Dhok, and Vasudeva Varma. Towards analyzing data security risks in cloud computing environments. In Sushil K. Prasad, Harrick M. Vin, Sartaj Sahni, MahadeoP. Jaiswal, and Bundit Thipakorn, editors, Information Systems, Technology and Management, volume 54 of Communications in Computer and Information Science, pages 255–265. Springer Berlin Heidelberg, 2010.
S. Berger, R. C´aceres, K. Goldman, D. Pendarakis, R. Perez, J. R. Rao, E. Rom, R. Sailer, W. Schildhauer, D. Srinivasan, S. Tal, and E. Valdez. Security for the cloud infrastructure: trusted virtual data center implementation. IBM J. Res. Dev., Vol. 53, No. 4, pp. 560–571, July 2009.
Sirisha and G.G. Kumari. API access control in cloud using the role-based access control model. In Trendz in Information Sciences Computing (TISC), 2010, pages 135–137, 2010.
Hema Andal Jayaprakash Narayanan, Mehmet Hadi Gunes, “Ensuring access control in cloud provisioned health care systems”, IEEE Consumer Communications and Networking Conference, 2011.
Li J, Wang H, Zhang Y, Shen J (2016) Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. Ksii Transactions on Internet & Information Systems 10: 3339–3352
Hu, D. Ferraiolo, Kuhn, Information Technology Laboratory National Institute Standards, and Technology. Assessment of Access Control Systems, Interagency Report 7316. Technical report, National Institute of Standards and Technology, 2006.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.