Article Abstract
International Journal of Advance Research in Multidisciplinary, 2024;2(2):204-210
Secure role-based access control with blockchain technology
Author : Dr. S Subashree, Dr. M Priya and R Srividhya
Abstract
Better resource utilization, quick speed, affordability, and accessibility for data exchange and storage are all provided by cloud computing. However, security concerns become the main barrier as data storage-possibly sensitive data-is increasingly outsourced to cloud businesses. Preserving data files encrypted before customers upload them to the cloud is a shared approach to safeguarding data confidentiality. Customers who use cloud storage services can save money on data management maintenance expenses. Data confidentiality is the main issue when outsourcing customer data to cloud storage providers. To prevent misuse of firm data, an access control system is also required. Regretfully, it might be difficult to develop a safe and efficient data exchange plan, especially for firms that are dynamic. First, in a secure way, recommend Role Based Access Control (RBAC). or key distribution without the need for any secure lines of communication, and group managers can safely provide group keys to users. One well-known access control paradigm is rolebased access control (RBAC), which maps users to roles and roles to privileges on data objects to provide flexible restrictions and database management. Using blockchain technology, an emerging technology, for data storage is the suggested remedy. First, describe the blockchain-based data storage system paradigm that includes hash and block creation. This work proposes an ECC based encryption system to solve user identity privacy and data privacy in the current access control techniques. It incorporates an anonymous control mechanism along with RBAC and cryptographic techniques. If a group member can be removed, the current group's public keys will be instantly modified, preventing the original content from needing to be re-encrypted. Individuals who are part of the group can access the cloud source; users whose access has been canceled cannot access the cloud again. Keywords: Elliptic Curve Cryptography, Cloud Storage Process, Group Creation, Role-Based Access Permission, Data Sharing, Data Encryption, Secure Data Access.
Keywords
Blockchain, affordability, data exchange, management, RBAC