Blockchain Cloud Privacy: Access Control Framework

Authors

  • Nitin Hegde JSS Academy of Technical Education, Bengaluru, Karnataka, India
  • Nagamani N P JSS Academy of Technical Education, Bengaluru, Karnataka, India
  • Rakesh JSS Academy of Technical Education, Bengaluru, Karnataka, India
  • Rohith Kumar R JSS Academy of Technical Education, Bengaluru, Karnataka, India
  • Srujan U JSS Academy of Technical Education, Bengaluru, Karnataka, India

Keywords:

Access control framework, Blockchain technology, Centralized access control, Cloud computing, Data security

Abstract

Cloud computing has undergone a significant transformation in its methods for data processing and service delivery across various industries, providing cost-effective solutions and greater accessibility. As organizations increasingly migrate to cloud platforms, they seek to capitalize on cloud services' scalability, flexibility, and reduced operational costs. This transition has led to diverse applications, from simple data storage to complex enterprise solutions, benefiting from the cloud's ubiquitous nature.
Despite these advantages, the rise of cloud computing has brought to light several challenges, particularly in data security and privacy. Conventional centralized access control systems are susceptible to threats like unauthorized access, data breaches, and insider attacks. These weaknesses highlight the necessity for enhanced security measures to protect sensitive data in cloud environments. In response to these challenges, this research introduces an innovative access control framework called Privacy Chain, powered by blockchain technology. Blockchain's decentralized nature inherently addresses many security concerns associated with centralized systems. Privacy Chain leverages the unique identities of blockchain nodes' account addresses, ensuring access control permissions are managed securely and transparently.
By implementing advanced encryption methodologies, Privacy Chain ensures that access control permissions stored within the blockchain are protected from unauthorized access and tampering. These encryption methods add an extra layer of protection, significantly increasing the difficulty for malicious entities to breach the system.

Author Biographies

Nitin Hegde, JSS Academy of Technical Education, Bengaluru, Karnataka, India

Under Graduate Student, Department of Information Science & Engineering

Nagamani N P, JSS Academy of Technical Education, Bengaluru, Karnataka, India

Associate Professor, Department of Information Science & Engineering

Rakesh, JSS Academy of Technical Education, Bengaluru, Karnataka, India

Under Graduate Student, Department of Information Science & Engineering

Rohith Kumar R, JSS Academy of Technical Education, Bengaluru, Karnataka, India

Under Graduate Student, Department of Information Science & Engineering

Srujan U, JSS Academy of Technical Education, Bengaluru, Karnataka, India

Under Graduate Student, Department of Information Science & Engineering

Published

2024-07-17

Issue

Section

Articles