journal article Open Access Dec 02, 2024

Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study

View at Publisher Save 10.3390/jcp4040047
Abstract
Today, IT organizations largely rely on cloud computing services to meet their infrastructure needs, making it the backbone of the industry. However, several challenges remain that need to be effectively addressed. Data breaches, identity and access management problems, unsafe interfaces and APIs, data loss, shared technology vulnerabilities, compliance and legal issues, inadequate data encryption, lack of visibility and control, delayed security patching, and the requirement to have faith in the cloud service provider’s security procedures are the primary security challenges in cloud computing. Blockchain technology has emerged as a promising technology to address many of these security issues. In this paper, an extensive study is carried out to analyze the security issues in the cloud and the categorization of gathered security issues in terms of security requirements, such as confidentiality, integrity, availability, authenticity, and privacy. Research questions are framed to dig deeper into the different blockchain-enabled solutions present to resolve cloud security issues, such as access control, identity management (IDM), and data integrity verification, along with their analysis. In-detail comparative analysis of the above blockchain-assisted solutions is also presented along with the future research directions.
Topics

No keywords indexed for this article. Browse by subject →

References
84
[1]
Qian, L., Luo, Z., Du, Y., and Guo, L. (2009). Cloud computing: An overview. Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, 1–4 December 2009. Proceedings 1, Springer.
[2]
Zhang "Cloud computing: State-of-the-art and research challenges" J. Internet Serv. Appl. (2010) 10.1007/s13174-010-0007-6
[3]
Singh "A survey on cloud computing security: Issues, threats, and solutions" J. Netw. Comput. Appl. (2016) 10.1016/j.jnca.2016.09.002
[4]
Subramanian "Recent security challenges in cloud computing" Comput. Electr. Eng. (2018) 10.1016/j.compeleceng.2018.06.006
[5]
Wang, L., Ranjan, R., Chen, J., and Benatallah, B. (2017). Cloud Computing: Methodology, Systems, and Applications, CRC Press. 10.1201/b11149
[6]
Hu "A review on cloud computing: Design challenges in architecture and security" J. Comput. Inf. Technol. (2011) 10.2498/cit.1001864
[7]
Venters "A critical review of cloud computing: Researching desires and realities" J. Inf. Technol. (2012) 10.1057/jit.2012.17
[8]
Park, J.H., and Park, J.H. (2017). Blockchain security in cloud computing: Use cases, challenges, and solutions. Symmetry, 9. 10.3390/sym9080164
[9]
Murthy "Blockchain based cloud computing: Architecture and research challenges" IEEE Access (2020) 10.1109/access.2020.3036812
[10]
Li "Blockchain-based trust management in cloud computing systems: A taxonomy, review and future directions" J. Cloud Comput. (2021) 10.1186/s13677-021-00247-5
[11]
Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing

Gousia Habib, Sparsh Sharma, Sara Ibrahim et al.

Future Internet 10.3390/fi14110341
[12]
Das, S., Sahil, M., Pandit, N.K., Priyadarshini, R., and Gochhayat, S.P. (2024, January 24–25). BSCIAM: A Blockchain based Secure Cloud Identity and Access Management Framework. Proceedings of the 2024 IEEE International Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India. 10.1109/sceecs61402.2024.10482116
[13]
Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. (2017, January 25–30). An overview of blockchain technology: Architecture, consensus, and future trends. Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA. 10.1109/bigdatacongress.2017.85
[14]
Das, S., Rout, J., and Mishra, M. (2022, January 10–11). Blockchain Technology: Applications and Open Issues. Proceedings of the 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), Chennai, India. 10.1109/ic3iot53935.2022.9767871
[15]
Namasudra "The revolution of blockchain: State-of-the-art and research challenges" Arch. Comput. Methods Eng. (2021) 10.1007/s11831-020-09426-0
[16]
Wan "Recent advances in consensus protocols for blockchain: A survey" Wirel. Netw. (2020) 10.1007/s11276-019-02195-0
[17]
Das, S., Rout, J., Priyadarshini, R., and Mishra, M. (2022, January 19–20). A Comparative Analysis of the Consensus Algorithms in Blockchain Technology. Proceedings of the International Conference on Innovative Computing and Communications: Proceedings of ICICC, Delhi, India. 10.2139/ssrn.4091413
[18]
Zhang "The Current Situation and Trend of Blockchain Technology in the Financial Field" Mob. Inf. Syst. (2022)
[19]
Xia "MeDShare: Trust-less medical data sharing among cloud service providers via blockchain" IEEE Access (2017) 10.1109/access.2017.2730843
[20]
Mallick "Bcgeo: Blockchain-assisted geospatial web service for smart healthcare system" IEEE Access (2023) 10.1109/access.2023.3283776
[21]
Dunphy "A first look at identity management schemes on the blockchain" IEEE Secur. Priv. (2018) 10.1109/msp.2018.3111247
[22]
Awadallah "Using blockchain in cloud computing to enhance relational database security" IEEE Access (2021) 10.1109/access.2021.3117733
[23]
AlShamsi, M., Salloum, S.A., Alshurideh, M., and Abdallah, S. (2020). Artificial intelligence and blockchain for transparency in governance. Artificial Intelligence for Sustainable Development: Theory, Practice and Future Applications, Springer. 10.1007/978-3-030-51920-9_11
[24]
Huh, S., Cho, S., and Kim, S. (2017, January 19–22). Managing IoT devices using blockchain platform. Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Republic of Korea. 10.23919/icact.2017.7890132
[25]
Dorri "LSB: A Lightweight Scalable Blockchain for IoT security and anonymity" J. Parallel Distrib. Comput. (2019) 10.1016/j.jpdc.2019.08.005
[26]
Loukil "Blockchain adoption in education: A systematic literature review" Educ. Inf. Technol. (2021) 10.1007/s10639-021-10481-8
[27]
Kandpal, M., Goswami, V., Pritwani, Y., Barik, R.K., and Saikia, M.J. (2024). BS-GeoEduNet 1.0: Blockchain-Assisted Serverless Framework for Geospatial Educational Information Networks. ISPRS Int. J. Geo-Inf., 13. 10.3390/ijgi13080274
[28]
Mallick, S., Goswami, V., Dash, R.N., Lenka, R., Sharma, S., and Barik, R. (2023, January 3–5). A priority-reservation queueing-based approach for blockchain-assisted smart-grid system. Proceedings of the 2023 International Conference on Power Electronics and Energy (ICPEE), Bhubaneswar, India. 10.1109/icpee54198.2023.10060850
[29]
Kandpal "Towards Data Storage Scheme in Blockchain Based Serverless Environment: Aes Encryption and Decryption Algorithm Approach" Facta Univ. Ser. Electron. Energetics (2024) 10.2298/fuee2402317k
[30]
Ressi "AI-enhanced blockchain technology: A review of advancements and opportunities" J. Netw. Comput. Appl. (2024) 10.1016/j.jnca.2024.103858
[31]
Salman "Security services using blockchains: A state of the art survey" IEEE Commun. Surv. Tutor. (2018) 10.1109/comst.2018.2863956
[32]
Kandpal, M., Goswami, V., Priyadarshini, R., and Barik, R.K. (2023). Towards Data Storage, Scalability, and Availability in Blockchain Systems: A Bibliometric Analysis. Data, 8. 10.3390/data8100148
[33]
Yang "AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud" IEEE Access (2020) 10.1109/access.2020.2985762
[34]
Habiba "Cloud identity management security issues & solutions: A taxonomy" Complex Adapt. Syst. Model (2014) 10.1186/s40294-014-0005-9
[35]
Yue, D., Li, R., Zhang, Y., Tian, W., and Peng, C. (2018, January 11–13). Blockchain based data integrity verification in P2P cloud storage. Proceedings of the 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore. 10.1109/padsw.2018.8644863
[36]
Stefanescu "A systematic literature review of lightweight blockchain for IoT" IEEE Access (2022) 10.1109/access.2022.3224222
[37]
Ghanam "Emerging issues & challenges in cloud computing—A hybrid approach" J. Softw. Eng. Appl. (2012) 10.4236/jsea.2012.531107
[38]
Rong "Beyond Lightning: A Survey on Security Challenges in Cloud Computing" J. Comput. Electr. Eng. (2012) 10.1016/j.compeleceng.2012.04.015
[39]
Kshetri "Privacy and security issues in cloud computing: The role of institutions and institutional evolution" Telecommun. Policy (2013) 10.1016/j.telpol.2012.04.011
[40]
Hashizume "An analysis of security issues for cloud computing" J. Internet Serv. Appl. (2013) 10.1186/1869-0238-4-5
[41]
Li, T.J., and Singh, M.M. (2014). Hybrid trust framework for loss of control in cloud computing. Advances in Computer Science and Its Applications, Proceedings of the CSA 2013, Lucknow, India, 21–22 June 2013, Springer. 10.1007/978-3-642-41674-3_96
[42]
Modi "A survey on security issues and solutions at different layers of Cloud computing" J. Supercomput. (2013) 10.1007/s11227-012-0831-5
[43]
Fernandes "Security issues in cloud environments: A survey" Int. J. Inf. Secur. (2014) 10.1007/s10207-013-0208-7
[44]
Shariati, S.M., and Ahmadzadegan, M.H. (2015, January 5–6). Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection. Proceedings of the 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, Iran. 10.1109/kbei.2015.7436196
[45]
Tari "Security and privacy in cloud computing: Vision, trends, and challenges" IEEE Cloud Comput. (2015) 10.1109/mcc.2015.45
[46]
Hussein "A survey of cloud computing security challenges and solutions" Int. J. Comput. Sci. Inf. Secur. (2016)
[47]
Almorsy, M., Grundy, J., and Müller, I. (2016). An analysis of the cloud computing security problem. arXiv.
[48]
Rao "A study on data storage security issues in cloud computing" Procedia Comput. Sci. (2016) 10.1016/j.procs.2016.07.335
[49]
Kumar "A survey on secure cloud: Security and privacy in cloud computing" Am. J. Syst. Softw. (2016)
[50]
Radwan "Cloud computing security: Challenges and future trends" Int. J. Comput. Appl. Technol. (2017) 10.1504/ijcat.2017.082865

Showing 50 of 84 references

Metrics
10
Citations
84
References
Details
Published
Dec 02, 2024
Vol/Issue
4(4)
Pages
1018-1043
License
View
Cite This Article
Swatisipra Das, Rojalina Priyadarshini, Minati Mishra, et al. (2024). Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study. Journal of Cybersecurity and Privacy, 4(4), 1018-1043. https://doi.org/10.3390/jcp4040047
Related

You May Also Like