Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study

Today, IT organizations largely rely on cloud computing services to meet their infrastructure needs, making it the backbone of the industry. However, several challenges remain that need to be effectively addressed. Data breaches, identity and access management problems, unsafe interfaces and APIs, d...

Full description

Saved in:
Bibliographic Details
Main Authors: Swatisipra Das, Rojalina Priyadarshini, Minati Mishra, Rabindra Kumar Barik
Format: Article
Language:English
Published: MDPI AG 2024-12-01
Series:Journal of Cybersecurity and Privacy
Subjects:
Online Access:https://www.mdpi.com/2624-800X/4/4/47
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846104245564080128
author Swatisipra Das
Rojalina Priyadarshini
Minati Mishra
Rabindra Kumar Barik
author_facet Swatisipra Das
Rojalina Priyadarshini
Minati Mishra
Rabindra Kumar Barik
author_sort Swatisipra Das
collection DOAJ
description Today, IT organizations largely rely on cloud computing services to meet their infrastructure needs, making it the backbone of the industry. However, several challenges remain that need to be effectively addressed. Data breaches, identity and access management problems, unsafe interfaces and APIs, data loss, shared technology vulnerabilities, compliance and legal issues, inadequate data encryption, lack of visibility and control, delayed security patching, and the requirement to have faith in the cloud service provider’s security procedures are the primary security challenges in cloud computing. Blockchain technology has emerged as a promising technology to address many of these security issues. In this paper, an extensive study is carried out to analyze the security issues in the cloud and the categorization of gathered security issues in terms of security requirements, such as confidentiality, integrity, availability, authenticity, and privacy. Research questions are framed to dig deeper into the different blockchain-enabled solutions present to resolve cloud security issues, such as access control, identity management (IDM), and data integrity verification, along with their analysis. In-detail comparative analysis of the above blockchain-assisted solutions is also presented along with the future research directions.
format Article
id doaj-art-c7c82db049bf42159516a69a3e4b7a9f
institution Kabale University
issn 2624-800X
language English
publishDate 2024-12-01
publisher MDPI AG
record_format Article
series Journal of Cybersecurity and Privacy
spelling doaj-art-c7c82db049bf42159516a69a3e4b7a9f2024-12-27T14:31:56ZengMDPI AGJournal of Cybersecurity and Privacy2624-800X2024-12-01441018104310.3390/jcp4040047Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative StudySwatisipra Das0Rojalina Priyadarshini1Minati Mishra2Rabindra Kumar Barik3Postgraduate Department of Computer Science, Fakir Mohan University, Balasore 756019, IndiaDepartment of Computer Science and Engineering, C.V Raman Global University, Bhubaneswar 752054, IndiaPostgraduate Department of Computer Science, Fakir Mohan University, Balasore 756019, IndiaSchool of Computer Applications, Kalinga Institute of Industrial Technology Deemed to Be University, Bhubaneswar 751024, IndiaToday, IT organizations largely rely on cloud computing services to meet their infrastructure needs, making it the backbone of the industry. However, several challenges remain that need to be effectively addressed. Data breaches, identity and access management problems, unsafe interfaces and APIs, data loss, shared technology vulnerabilities, compliance and legal issues, inadequate data encryption, lack of visibility and control, delayed security patching, and the requirement to have faith in the cloud service provider’s security procedures are the primary security challenges in cloud computing. Blockchain technology has emerged as a promising technology to address many of these security issues. In this paper, an extensive study is carried out to analyze the security issues in the cloud and the categorization of gathered security issues in terms of security requirements, such as confidentiality, integrity, availability, authenticity, and privacy. Research questions are framed to dig deeper into the different blockchain-enabled solutions present to resolve cloud security issues, such as access control, identity management (IDM), and data integrity verification, along with their analysis. In-detail comparative analysis of the above blockchain-assisted solutions is also presented along with the future research directions.https://www.mdpi.com/2624-800X/4/4/47access controlIDMdata integritycloud securityblockchain
spellingShingle Swatisipra Das
Rojalina Priyadarshini
Minati Mishra
Rabindra Kumar Barik
Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study
Journal of Cybersecurity and Privacy
access control
IDM
data integrity
cloud security
blockchain
title Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study
title_full Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study
title_fullStr Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study
title_full_unstemmed Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study
title_short Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study
title_sort leveraging towards access control identity management and data integrity verification mechanisms in blockchain assisted cloud environments a comparative study
topic access control
IDM
data integrity
cloud security
blockchain
url https://www.mdpi.com/2624-800X/4/4/47
work_keys_str_mv AT swatisipradas leveragingtowardsaccesscontrolidentitymanagementanddataintegrityverificationmechanismsinblockchainassistedcloudenvironmentsacomparativestudy
AT rojalinapriyadarshini leveragingtowardsaccesscontrolidentitymanagementanddataintegrityverificationmechanismsinblockchainassistedcloudenvironmentsacomparativestudy
AT minatimishra leveragingtowardsaccesscontrolidentitymanagementanddataintegrityverificationmechanismsinblockchainassistedcloudenvironmentsacomparativestudy
AT rabindrakumarbarik leveragingtowardsaccesscontrolidentitymanagementanddataintegrityverificationmechanismsinblockchainassistedcloudenvironmentsacomparativestudy