CFP last date
20 May 2025
Reseach Article

Blockchain based Cloud storage framework with Self- Sovereign-Identity and Access Control

by Srinivasa Suresh Sikhakolli, Asha kiran Sikhakolli
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 79
Year of Publication: 2025
Authors: Srinivasa Suresh Sikhakolli, Asha kiran Sikhakolli
10.5120/ijca2025924700

Srinivasa Suresh Sikhakolli, Asha kiran Sikhakolli . Blockchain based Cloud storage framework with Self- Sovereign-Identity and Access Control. International Journal of Computer Applications. 186, 79 ( Apr 2025), 13-18. DOI=10.5120/ijca2025924700

@article{ 10.5120/ijca2025924700,
author = { Srinivasa Suresh Sikhakolli, Asha kiran Sikhakolli },
title = { Blockchain based Cloud storage framework with Self- Sovereign-Identity and Access Control },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2025 },
volume = { 186 },
number = { 79 },
month = { Apr },
year = { 2025 },
issn = { 0975-8887 },
pages = { 13-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number79/blockchain-based-cloud-storage-framework-with-self-sovereign-identity-and-access-control/ },
doi = { 10.5120/ijca2025924700 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-04-26T02:19:27.754330+05:30
%A Srinivasa Suresh Sikhakolli
%A Asha kiran Sikhakolli
%T Blockchain based Cloud storage framework with Self- Sovereign-Identity and Access Control
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 79
%P 13-18
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The cloud acts as a platform to store more number of data and it is known for its low cost computing and data storing efficiency. In recent time, more number of organizations and individuals utilize cloud storage services to back up the essential information. But, the stored data undergoes different kind of threats related to security issues due to internal and external attacks. Whenever, the data user request access to encrypt the data file, a key to access the file is distributed by the third party. But, when the third party becomes untrusted, the entire security system will be at risk. To overcome this issues, this research proposed a cloud storage framework along with the access control and block chain technique. The proposed research undergoes five stages such as initialization, encryption of data, generating the keys, authentication and authorization and data decryption. Among these stages, the authentication and authorization is performed using the proposed Self- Sovereign- Identity based Access Control (SSIBAC) which verifies the user’s authenticity and permits him to access the data. The experimental results show that the proposed method achieved minimum delay of 1.59 s whereas the existing methods such as Block chain based Decentralized Architecture (BDCA) and Block chain-based Multi-authority Access Control (BMAC) achieved delay period of 2.10 s and 1.59 s respectively.

References
  1. Xue, Yingjie, Kaiping Xue, Na Gai, Jianan Hong, David SL Wei, and Peilin Hong. "An attribute-based controlled collaborative access control scheme for public cloud storage." IEEE Transactions on Information Forensics and Security 14, no. 11 (2019): 2927-2942.
  2. Zarezadeh, Maryam, Hamid Mala, and Maede Ashouri-Talouki. "Multi-keyword ranked searchable encryption scheme with access control for cloud storage." Peer-to-Peer Networking and Applications 13 (2020): 207-218.
  3. Ghorbel, Amal, Mahmoud Ghorbel, and Mohamed Jmaiel. "Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain." International Journal of Information Security (2021): 1-20.
  4. Xu, Shengmin, Guomin Yang, Yi Mu, and Ximeng Liu. "A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance." Future Generation Computer Systems 97 (2019): 284-294.
  5. Saravanan, N., and A. Umamakeswari. "Lattice based access control for protecting user data in cloud environments with hybrid security." Computers & Security 100 (2021): 102074.
  6. Susilo, Willy, Peng Jiang, Jianchang Lai, Fuchun Guo, Guomin Yang, and Robert H. Deng. "Sanitizable access control system for secure cloud storage against malicious data publishers." IEEE Transactions on Dependable and Secure Computing 19, no. 3 (2021): 2138-2148.
  7. Li, Hongzhi, Dezhi Han, and Mingdong Tang. "A privacy-preserving storage scheme for logistics data with assistance of blockchain." IEEE Internet of Things Journal 9, no. 6 (2021): 4704-4720.
  8. Maesa, Damiano Di Francesco, Paolo Mori, and Laura Ricci. "A blockchain based approach for the definition of auditable access control systems." Computers & Security 84 (2019): 93-119.
  9. Varri, Uma Sankararao, Syam Kumar Pasupuleti, and K. V. Kadambari. "Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage." Journal of Ambient Intelligence and Humanized Computing (2022): 1-13.
  10. Chaudhari, Payal, and Manik Lal Das. "Privacy preserving searchable encryption with fine-grained access control." IEEE Transactions on Cloud Computing 9, no. 2 (2019): 753-762.
  11. Algarni, Sultan, Fathy Eassa, Khalid Almarhabi, Abduallah Almalaise, Emad Albassam, Khalid Alsubhi, and Mohammad Yamin. "Blockchain-based secured access control in an IoT system." Applied Sciences 11, no. 4 (2021): 1772.
  12. Qin, Xuanmei, Yongfeng Huang, Zhen Yang, and Xing Li. "LBAC: A lightweight blockchain-based access control scheme for the internet of things." Information Sciences 554 (2021): 222-235.
  13. Kesarwani, Abhishek, and Pabitra Mohan Khilar. "Development of trust based access control models using fuzzy logic in cloud computing." Journal of King Saud University-Computer and Information Sciences 34, no. 5 (2022): 1958-1967.
  14. Ren, Yongjun, Fujian Zhu, Jian Qi, Jin Wang, and Arun Kumar Sangaiah. "Identity management and access control based on blockchain under edge computing for the industrial internet of things." Applied Sciences 9, no. 10 (2019): 2058.
  15. Deep, Gaurav, Rajni Mohana, Anand Nayyar, P. Sanjeevikumar, and Eklas Hossain. "Authentication protocol for cloud databases using blockchain mechanism." Sensors 19, no. 20 (2019): 4444.
  16. Sharma, Pratima, Rajni Jindal, and Malaya Dutta Borah. "Blockchain-based decentralized architecture for cloud storage system." Journal of Information Security and Applications 62 (2021): 102970.
  17. Darwish, Marwan Adnan, Eiad Yafi, Mohammed A. Al Ghamdi, and Abdullah Almasri. "Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm." Arabian Journal for Science and Engineering 45 (2020): 3369-3378.
  18. Yang, Caixia, Liang Tan, Na Shi, Bolei Xu, Yang Cao, and Keping Yu. "AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud." IEEE Access 8 (2020): 70604-70615.
  19. Qin, Xuanmei, Yongfeng Huang, Zhen Yang, and Xing Li. "A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing." Journal of Systems Architecture 112 (2021): 101854.
  20. Wang, Shangping, Xu Wang, and Yaling Zhang. "A secure cloud storage framework with access control based on blockchain." IEEE access 7 (2019): 112713-112725.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication cloud storage security Self- Sovereign- Identity based Access Control