Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study
Today, IT organizations largely rely on cloud computing services to meet their infrastructure needs, making it the backbone of the industry. However, several challenges remain that need to be effectively addressed. Data breaches, identity and access management problems, unsafe interfaces and APIs, d...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-12-01
|
| Series: | Journal of Cybersecurity and Privacy |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2624-800X/4/4/47 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846104245564080128 |
|---|---|
| author | Swatisipra Das Rojalina Priyadarshini Minati Mishra Rabindra Kumar Barik |
| author_facet | Swatisipra Das Rojalina Priyadarshini Minati Mishra Rabindra Kumar Barik |
| author_sort | Swatisipra Das |
| collection | DOAJ |
| description | Today, IT organizations largely rely on cloud computing services to meet their infrastructure needs, making it the backbone of the industry. However, several challenges remain that need to be effectively addressed. Data breaches, identity and access management problems, unsafe interfaces and APIs, data loss, shared technology vulnerabilities, compliance and legal issues, inadequate data encryption, lack of visibility and control, delayed security patching, and the requirement to have faith in the cloud service provider’s security procedures are the primary security challenges in cloud computing. Blockchain technology has emerged as a promising technology to address many of these security issues. In this paper, an extensive study is carried out to analyze the security issues in the cloud and the categorization of gathered security issues in terms of security requirements, such as confidentiality, integrity, availability, authenticity, and privacy. Research questions are framed to dig deeper into the different blockchain-enabled solutions present to resolve cloud security issues, such as access control, identity management (IDM), and data integrity verification, along with their analysis. In-detail comparative analysis of the above blockchain-assisted solutions is also presented along with the future research directions. |
| format | Article |
| id | doaj-art-c7c82db049bf42159516a69a3e4b7a9f |
| institution | Kabale University |
| issn | 2624-800X |
| language | English |
| publishDate | 2024-12-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Journal of Cybersecurity and Privacy |
| spelling | doaj-art-c7c82db049bf42159516a69a3e4b7a9f2024-12-27T14:31:56ZengMDPI AGJournal of Cybersecurity and Privacy2624-800X2024-12-01441018104310.3390/jcp4040047Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative StudySwatisipra Das0Rojalina Priyadarshini1Minati Mishra2Rabindra Kumar Barik3Postgraduate Department of Computer Science, Fakir Mohan University, Balasore 756019, IndiaDepartment of Computer Science and Engineering, C.V Raman Global University, Bhubaneswar 752054, IndiaPostgraduate Department of Computer Science, Fakir Mohan University, Balasore 756019, IndiaSchool of Computer Applications, Kalinga Institute of Industrial Technology Deemed to Be University, Bhubaneswar 751024, IndiaToday, IT organizations largely rely on cloud computing services to meet their infrastructure needs, making it the backbone of the industry. However, several challenges remain that need to be effectively addressed. Data breaches, identity and access management problems, unsafe interfaces and APIs, data loss, shared technology vulnerabilities, compliance and legal issues, inadequate data encryption, lack of visibility and control, delayed security patching, and the requirement to have faith in the cloud service provider’s security procedures are the primary security challenges in cloud computing. Blockchain technology has emerged as a promising technology to address many of these security issues. In this paper, an extensive study is carried out to analyze the security issues in the cloud and the categorization of gathered security issues in terms of security requirements, such as confidentiality, integrity, availability, authenticity, and privacy. Research questions are framed to dig deeper into the different blockchain-enabled solutions present to resolve cloud security issues, such as access control, identity management (IDM), and data integrity verification, along with their analysis. In-detail comparative analysis of the above blockchain-assisted solutions is also presented along with the future research directions.https://www.mdpi.com/2624-800X/4/4/47access controlIDMdata integritycloud securityblockchain |
| spellingShingle | Swatisipra Das Rojalina Priyadarshini Minati Mishra Rabindra Kumar Barik Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study Journal of Cybersecurity and Privacy access control IDM data integrity cloud security blockchain |
| title | Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study |
| title_full | Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study |
| title_fullStr | Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study |
| title_full_unstemmed | Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study |
| title_short | Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study |
| title_sort | leveraging towards access control identity management and data integrity verification mechanisms in blockchain assisted cloud environments a comparative study |
| topic | access control IDM data integrity cloud security blockchain |
| url | https://www.mdpi.com/2624-800X/4/4/47 |
| work_keys_str_mv | AT swatisipradas leveragingtowardsaccesscontrolidentitymanagementanddataintegrityverificationmechanismsinblockchainassistedcloudenvironmentsacomparativestudy AT rojalinapriyadarshini leveragingtowardsaccesscontrolidentitymanagementanddataintegrityverificationmechanismsinblockchainassistedcloudenvironmentsacomparativestudy AT minatimishra leveragingtowardsaccesscontrolidentitymanagementanddataintegrityverificationmechanismsinblockchainassistedcloudenvironmentsacomparativestudy AT rabindrakumarbarik leveragingtowardsaccesscontrolidentitymanagementanddataintegrityverificationmechanismsinblockchainassistedcloudenvironmentsacomparativestudy |