0% found this document useful (0 votes)
34 views5 pages

Blockchain-Based Access Control Algorithms For Big

The document discusses the challenges of access management and data security in Big Data environments, highlighting the inadequacies of traditional access control systems like RBAC and DAC. It proposes blockchain technology as a solution, emphasizing its benefits such as decentralization, immutability, and transparency for secure access control. The article also explores various blockchain models, smart contracts, and case studies demonstrating the effectiveness of blockchain in improving access control across different industries.

Uploaded by

Raj KumarThakur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views5 pages

Blockchain-Based Access Control Algorithms For Big

The document discusses the challenges of access management and data security in Big Data environments, highlighting the inadequacies of traditional access control systems like RBAC and DAC. It proposes blockchain technology as a solution, emphasizing its benefits such as decentralization, immutability, and transparency for secure access control. The article also explores various blockchain models, smart contracts, and case studies demonstrating the effectiveness of blockchain in improving access control across different industries.

Uploaded by

Raj KumarThakur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International Journal of Trend in Research and Development, Volume 11(6), ISSN: 2394-9333

www.ijtrd.com
Blockchain-based Access Control Algorithms for Big
Data Environments
1
Dr. Gopal Prasad Sharma, 2Prof. Dr. Subarna Shakya, 3Prof. Raj Kumar Thakur,
1
Associate professor, Purbanchal University School of Science & Technology (PUSAT), Biratnagar, Nepal
2.
Professor, Institute of Engineering, Pulchowk Campus, Tribhuvan University, Nepal.
3
Professor, Purbanchal University School of Science & Technology (PUSAT), Biratnagar, Nepal

Abstract: The exponential expansion of Big Data has RBAC and DAC often fail in Big Data situations. Scalability,
exacerbated the challenges of access management and data adaptability, and complex and ever-changing access
security. The scalability, data consistency, and privacy requirements are these architectures' problems. Big Data
requirements of Big Data are frequently not met by environments require automated and effective access control
conventional access control systems. The immutable, solutions to secure data while allowing authorised users to
distributed ledger known as blockchain technology might offer access it. Many applications generate and consume data.
safe access control in these kinds of settings. To combat issues Access management is complicated enough without needing to
with data integrity, auditability, and unauthorised access, this comply with GDPR.
article delves into Big Data access control algorithms that are
B. Blockchain technology
based on the blockchain. We examine over different
blockchain models, smart contracts, tokenisation, consensus Blockchain technology, popularised by Bitcoin, offers a new
methods, and permissioned and permissionless blockchains. perspective on data security and access control. Blockchain
This article uses case studies to show how blockchain is technology is a secure, immutable, transparent distributed
improving access control in various industries, including ledger.
healthcare, the internet of things (IoT), cloud computing, and
financial systems. Additionally, we cover topics related to Blockchain works decentralised, not centrally, using a network
of nodes, or computers, each with a complete copy of the
privacy and security, such as methods for consensus and
blockchain and helping validate new transactions [3].
GDPR compliance. The article concludes by proposing further
Decentralisation makes the system resistant to tampering,
studies to fortify blockchain's Big Data management
fraud, and unauthorised access. Blockchain can control access,
capabilities. Among these, researching 5G and quantum
computing, integrating AI, and scaling the system are on the among other things. Since it cannot be edited or deleted, it is a
list. safe way to track access occurrences. Smart contractscoded
agreements that execute themselvescan automate access
Keywords: Access Control, Big Data, Blockchain, Data control based on specified conditions. Blockchain uses
Security, Smart Contracts. cryptographic keys for powerful authentication and
authorisation, allowing users to prove their identity without a
I. INTRODUCTION
central authority. Blockchain's scalability, security, and
A. Overview of big data environments openness make it anideal Big Data access control mechanism.
Traditional data processing tools can't handle "Big Data"' II. BACKGROUND AND RELATED WORK
massive and complex datasets. Large, newly created datasets in
A. Traditional access control models
structured, semi-structured, or unstructured formats often
exhibit the "three Vs": volume, velocity, and variety. New Information security is particularly concerned with resource
technologies like cloud computing, the IoT, and social media allocation and data access management. RBAC, DAC, and
have increased data collection exponentially [1]. Daily data MAC are still used in many centralised systems to restrict
production is estimated at 2.5 quintillion bytes, which access. Modern data ecosystems are so huge, intricate, and
contributes to Big Data growth. Controlling data access is ever-changing that traditional models have major limitations in
difficult with Big Data security and management. Restricting Big Data contexts. Role-Based Access Control (RBAC) is a
access to sensitive or secret information to permitted prominent technique of access control that grants permissions
individuals becomes harder as databases grow. Data breaches, to resources based on roles rather than people[4]. Despite its
unauthorised access, and misuse are rising in today's data- simplicity and scalability, RBAC is unsuitable for Big Data
driven culture. Big Data environments require more environments due to dynamic data access, multiple roles and
complicated and ever-changing solutions to control access data types, and hierarchies. Confidential data requires fine-
rights and protect sensitive data, making traditional security grained access control, which RBAC cannot provide.
methods unsuitable. Discretionary Access Control lets resource owners choose who
uses them. Delegating access permissions to other users
Data security requires access control, especially in Big Data
increases flexibility. DAC works effectively in smaller settings
environments [2]. User access hours, conditions, and resources
but fails with Big Data. As data expands, access rights become
are controlled via access control. Data availability, integrity,
harder to allocate.
and secrecy require trustworthy access control systems. Big
Data environments require flexible access control policies due Due to the lack of centralised management in DAC, dispersed
to enormous volumes of data, changing user interactions, and systems may have inconsistent access control policies [5].
evolving threats. Traditional access control methods like

IJTRD | Nov – Dec 2024


Available [email protected] 260
International Journal of Trend in Research and Development, Volume 11(6), ISSN: 2394-9333
www.ijtrd.com
Mandatory Access management (MAC) enforces system-level requirement for a trusted authority, allowing participants to
restrictions to restrict process and user access. engage insecurely. Blockchain's distributed consensus
procedures strengthen confidence between parties who may not
Big Data systems, where the data environment is constantly
otherwise share data in Big Data scenarios. Blockchain
changing and access control policies must be updated often,
technology makes data transactions and access records
present unique challenges for this architecture, which is
transparent and verifiable, reducing data breaches and illicit
normally used in secure environments due to its inflexible
access [9]. Blockchain's cryptography procedures validate
structure. As user roles, data sources, and data types change
identities and data ownership without credentials. Blockchain
across distant systems in Big Data environments, traditional
technology can secure access control system authentication by
access control management methods are inflexible, unscalable,
using public/private key pairs for identity verification. This
and unable to dynamically respond.
ensures only authorised users can access particular datasets.
B. Blockchain Basics
D. Existing Blockchain-Based Access Control Models
Blockchain, a distributed ledger system without a central
There have been several research on blockchain integration
authority, can securely store and validate data across a network
with Big Data access control systems, however it is still in
of nodes. Its main purpose is cryptocurrency transactions,
development. Blockchain technology could make Big Data
although it has other uses [6]. Blockchains consist of blocks
access control systems decentralised, transparent, and
with transaction data, a timestamp, and a cryptographic hash of
unchangeable. Many access control models use blockchain
the previous block. Every blockchain block contains a unique
technology [10]. Several blockchain-based technologies have
hash that links it to the one before it, creating a chain. This
been used to decentralise access authorisation management.
cryptographic connection makes the system immutable by
These approaches use blockchain technology to record
preventing adding a block without affecting all subsequent
transactions and access credentials for decentralised permission
blocks. Blockchain networks need consensus methods to verify
management. One technique uses blockchain coins to represent
and agree on blockchain material. Without these precautions, a
access privileges. Token transfers let users grant access to
reliable third party cannot verify that all network nodes agree
others, and the blockchain records them permanently. Even
on the ledger's status. Practical Byzantine Fault Tolerance
while blockchain networks provide a transparent and tamper-
(PBFT), Proof of Stake (PoS), and Proof of Work are common
resistant record of access permits, their computational
consensus mechanisms. Every consensus method has pros and
complexity limits their scale [11]. Multiple studies have
cons. Proof-of-Work (PoW) is secure but needs a lot of
examined smart contract access control automation. These
resources, while PoS uses less energy but requires a stake in
solutions program smart contracts to grant or revoke access
the network [7]. Blockchain technology relies on smart
when certain conditions are met. A user can be automatically
contracts, coded agreements that execute themselves. These
provided data access depending on role or time limits. Despite
contracts automatically enforce rules, eliminating middlemen.
its efficiency and flexibility in controlling permissions, smart
Smart contracts can automate and improve access control by
contract code flaws risk unintentional access hazards.
defining and enforcing rights based on preset circumstances.
Due to its decentralisation, transparency, immutability, and Only permitted players can join permissioned blockchains,
smart contract execution, blockchain technology may solve which improve access control system security. Privacy and
security and access control issues in distributed systems like data security are paramount, and permissioned blockchains
Big Data. allow greater control over who can view and verify
transactions. These methods scale better than permissionless
blockchains but reduce blockchain's decentralisation.
Although progress has been made, blockchain-based access
management still struggles with scalability, performance, and
interoperability with current access control systems.
Blockchain technology's latency, especially in consensus
procedures like PoW, makes real-time access control in high-
volume Big Data situations difficult [12]. Integrating
blockchain-based systems into current infrastructures is
difficult, especially for data protection and compliance. Still,
these models demonstrate how blockchain could revolutionise
Big Data access control using automated, transparent, and safe
methods.
III. BLOCKCHAIN-BASED ACCESS CONTROL FOR
Figure 1 Block diagram of Blockchain (source: self-created)
BIG DATA
C. Blockchain In Security A. Challenges in big data access control
Blockchain has significant potential in data security and
In Big Data environments, vast, ever-changing, and scattered
distributed network trust. Decentralisation, immutability, and
datasets provide many challenges to good access control.
transparency promote Big Data situations.
Complex situations make scaling typical access control
Blockchain technology protects data from deletion or techniques difficult. Large volumes of data from multiple
modification without network approval [8]. Blockchain sources might be part of Big Data systems. The volume of
technology's immutability benefits healthcare, banking, and
users and data makes RBAC and DAC ineffective in these
supply chain management.
environments. When data is constantly generated, updated, or
This ensures data integrity, which is crucial in Big Data destroyed, global rights issuance and auditing become harder
environments where datasets are frequently updated and shared in distributed systems [13]. The huge amount of data and ever-
among many stakeholders. Blockchain eliminates the

IJTRD | Nov – Dec 2024


Available [email protected] 261
International Journal of Trend in Research and Development, Volume 11(6), ISSN: 2394-9333
www.ijtrd.com
changing data access make conventional access control C. Access Control Algorithms in Blockchain-Based Systems
methods less scalable.
Blockchain's adaptive algorithms and methods secure Big Data
Big Data requires data consistency since various systems or access. Smart contracts automate and enforce access control.
entities can access and change the same dataset. Providing Smart contracts automatically execute operations and evaluate
uniform access controls to all users and systems is laborious. access requests to restrict data access to contract-compliant
Since one authority chooses who gets data, centralised access users [16]. Smart contracts can authorise dataset access based
control solutions risk inconsistencies and security flaws. on user role or cryptographic identity. Human error is
Traditional access control systems struggle to update eliminated by automation, improving access decisions. Smart
restrictions in real time when data is updated. Data security and contracts allow dynamic access. Smart contracts may grant
GDPR/HIPAA compliance are major challenges in Big Data dataset access temporarily before terminating. Smart contracts
contexts. Managing who has access to sensitive, proprietary, can automatically authorise patient medical record access
personal, or other data gets harder when it is disseminated based on role, hospital network affiliation, and consent. Both
across numerous platforms and accessible by diverse parties. permissioned and permissionless blockchain technologies have
With more users and data sources, it becomes harder to restrict advantages for limiting access.
data access and prevent unauthorised access. Blockchain
Permissioned blockchains require user approval to join. This
technology's decentralised and immutable access management
control makes access control more secure and easier to
can improve Big Data systems' scalability, consistency, and
administer because only verified entities can view and validate
privacy.
data. For Big Data applications, permissioned blockchains
B. Blockchain As A Solution limit data access, update, and modification to approved parties.
Due to their computationally efficient consensus process,
Blockchain technology's various benefits help with Big Data
permissioned blockchains are more scalable. Permissionless
access control. Decentralised control, immutability,
blockchains allow everyone to participate. This method helps
transparency, and auditability improve data access
when decentralisation and transparency trump access control.
management security and scalability. Decentralisation is a
Permissionless blockchains may struggle in Big Data
major benefit of blockchain. A central authority audits, grants,
applications with massive amounts of critical data.
and denies resource access in traditional access control.
Decentralisation is crucial in open data platforms and public
Blockchain works decentralised via peer-to-peer networks
blockchains, so they strengthen it. Blockchain-based access
[14]. Distributed access control decision-making makes the
control uses tokens for privileges. A token can represent
network more resilient to single failures and promotes
ownership or access in a decentralised system. Tokens can
transparency and consensus. This decentralised control model
approve, delegate, or revoke data access, per rules [17].
works well in Big Data contexts where many parties share data
and a single authority would not work. Big Data users can receive tokens based on their role, status, or
other attributes. Access tokens can be added to a user's digital
Immutable blockchain transactions cannot be deleted or
wallet and deleted or reassigned. Tokens use cryptographic
changed. Keeping a tamper-proof record of data access and
keys to restrict data access to permitted owners. Tokens allow
changes helps Big Data systems maintain data integrity and
flexible access management in Big Data systems. They can be
enforce access control. Immutability of blockchain helps
provided to users and used to monitor their dataset access,
organisations protect data access logs from unauthorised
ensuring auditable and immutable rights. Blockchain
changes. Every transaction and access event is on the
consensus techniques validate and agree on ledger state.
blockchain. Stakeholders can audit the access control process
because every system change is public [15]. This transparency These consensus techniques dramatically affect access control
lets users track data access and verify restrictions. Blockchain's decisions in blockchain-based systems. Miners must solve
immutable record of transactions makes it easy to track data computationally difficult challenges to validate transactions in
access and use in Big Data environments that require stringent Proof-of-Work (PoW).
responsibility and regulatory compliance. Blockchain's
Despite its security, real-time access control may be resource-
scalability, data integrity, and privacy make it a promising Big
intensive for Big Data systems. Due to its high energy
Data access management option.
consumption, PoW is unsuitable for several circumstances.
PoS is an energy-efficient PoW alternative [18]. PoS validates
transactions based on the amount of cryptocurrency
participants "stake" as collateral. This system's speed and
energy efficiency may improve real-time Big Data access
control. PoS may prioritise or validate access requests based on
staked amounts or participant reputation in access control
scenarios. PBFT is a consensus method for reliability and fault
tolerance in harsh environments. PBFT can reliably choose
access in a Big Data access control system even with hostile
network members. Big Data needs determine blockchain-based
access control's consensus mechanisms, which affect security,
scalability, and performance.
IV. CASE STUDIES AND APPLICATIONS OF
BLOCKCHAIN-BASED ACCESS CONTROL
Blockchain could transform access management in many
Figure 2 Blockchain-based Access Control Workflow (Source:
industries, particularly those handling sensitive or scattered
Self-Created)
data. Blockchain-based access control has been used in cloud
computing, healthcare, financial systems, and more.
IJTRD | Nov – Dec 2024
Available [email protected] 262
International Journal of Trend in Research and Development, Volume 11(6), ISSN: 2394-9333
www.ijtrd.com
A. Blockchain for access control in cloud platforms to government services safely and decentralized, the
blockchain can enhance confidence and reduce data breaches.
Blockchain-based solutions are being investigated by
researchers and cloud service companies to improve cloud V. SECURITY AND PRIVACY CONSIDERATIONS
access control. IBM's use of blockchain and cloud security to
Blockchain technology is a popular choice for application
secure data flow and permission across cloud platforms is an
security, particularly in access control systems. Its
example. These blockchain-based cloud solutions use smart
decentralization and immutability enhance data security,
contracts for access control. These contracts automatically give
reduce illicit access, and ensure data integrity. However, it also
or revoke access based on criteria. Blockchain data access logs
raises privacy concerns, particularly in sensitive fields like
are transparent and immutable [19]. An audit trail that any
healthcare, financial services, and personal data management.
system participant can verify assures that only authorized users
Blockchain's immutability ensures data integrity, making it
can access crucial cloud data.
crucial for auditing and preventing fraud. Openness in network
Permissioned blockchain networks, which restrict access to transactions makes access requests easier to monitor and audit.
trusted organizations and cloud customers, are also
PKI and digital signatures protect access control [23]. Since
widespread. Cloud systems struggle with unauthorized access
data cannot be deleted or changed, blockchain compromises
and insider risks; this configuration addresses both.
human privacy. This may violate GDPR privacy rules.
Decentralizing access control and using blockchain's
Compliance is also difficult because public blockchain
transparency make cloud services safer, auditable, and attack-
transactions may reveal sensitive information.Blockchain-
resistant. This is crucial in Big Data settings with many users
based access control faces energy consumption, scalability, and
and data.
policy enforcement issues requiring smart contracts.
B. Blockchain for secure data access in banking Blockchain technology is secure, but humans can hack or build
smart contracts, so smart contracts must be audited and tested.
Blockchain technology is being used in banking and finance to
These obstacles must be overcome to implement blockchain
protect consumer data and verify transactions. JPMorgan's
technology in access control systems.
Quorum permissioned blockchain ensures legal compliance
and safe, decentralized financial transaction management. VI. FUTURE DIRECTIONS AND RESEARCH
Quorum uses blockchain to secure client transactions, audit OPPORTUNITIES
trails, and data access. Blockchain technology can be used in
The scalability of blockchain technology is being studied,
financial systems to control access to financial data for
especially for big data and other large-scale applications.
reporting. Old-school banks used centralized systems and
Current systems like Proof of Work have high latency and low
stored many customer records. Due to this, data breaches and
throughput. Researchers are investigating Proof of Stake, layer
access control violations are more likely [20].
2 protocols, and sharding to scale the system.
Blockchain technology simplifies the process by generating an
AI and ML algorithms can improve blockchain-based access
indelible record of all monetary transactions and restricting
control by making smarter, faster, and context-aware decisions.
access to smart contracts on the blockchain. Blockchain
Future research may focus on making AI decisions more
technology manages access to private financial records using
transparent, auditable, and secure. IoT, quantum computing,
cryptographic tokens. Tokens can help investors access
and 5G networks will also affect blockchain-based Big Data
financial details or make secure transactions. The blockchain
access control.
restricts data access to authorized token holders by design.
CONCLUSION
C. Other Industry Examples
Big Data access control is more secure, reliable, and
Beyond healthcare, cloud computing, and financial systems,
decentralised with blockchain technology. It excels at data
blockchain-based access control is being applied in various
access management accountability and sensitive data
other industries where data security and privacy are paramount.
protection due to its transparency and immutability.
Supply Chain Management: Blockchain's transparent and Blockchain technology offers organisations a new way to
immutable record makes it useful for supply chain securely and efficiently manage access as data volumes and
management. This is especially true in retail, shipping, and complexity rise. Blockchain technology has great potential but
manufacturing. Blockchain technology would allow only struggles with scalability, energy consumption, and privacy.
approved suppliers, manufacturers, and distributors to access Future research on quantum-resistant blockchain architectures,
sensitive supply chain data. Big Data logistics organizations AI integration, and scalable consensus methods may solve
must securely transfer huge volumes of transaction and real- these issues. New technologies like 5G and the Internet of
time tracking data. Walmart and IBM's Food Trust blockchain Things will present opportunities and threats to blockchain-
program uses blockchain technology to make food supply based access control systems. Blockchain could solve many
chains more transparent and secure [21]. Access control limits data access and security issues. Blockchain technology is
sensitive food product origin information to authorized users to expected to revolutionise Big Data access control by improving
prevent fraud and ensure data integrity. data security and enabling unreliable systems in various
industries.
Government Data Management: Blockchain is being adopted
by increasing governments to protect public data and records. References
Blockchain can manage government systems like land
[1] L. Tan, N. Shi, C. Yang, and K. Yu, "A blockchain-based
registries and voting records [22]. Blockchain technology's
access control framework for cyber-physical-social system
immutability allows stakeholders, including people, to verify
big data," IEEE Access, vol. 8, pp. 77215–77226, 2020.
access control regulations. Estonia's e-government programs
[2] D. Han, Y. Zhu, D. Li, W. Liang, A. Souri, and K. C. Li,
are boosted by blockchain-based access control in several
"A blockchain-based auditable access control system for
government services. To better handle citizen data and access
private data in service-centric IoT environments," IEEE

IJTRD | Nov – Dec 2024


Available [email protected] 263
International Journal of Trend in Research and Development, Volume 11(6), ISSN: 2394-9333
www.ijtrd.com
Transactions on Industrial Informatics, vol. 18, no. 5, pp. Generation Computer Systems, vol. 131, pp. 209–226,
3530–3540, 2021. 2022.
[3] H. Xu, Q. He, X. Li, B. Jiang, and K. Qin, "BDSS-FA: A [19] L. Sun, D. Zhou, D. Liu, J. Tang, and Y. Li, "BPDAC: A
blockchain-based data security sharing platform with fine- Blockchain Based and Provenance Enabled Dynamic
grained access control," IEEE Access, vol. 8, pp. 87552– Access Control Scheme," IEEE Access, vol. 11, 2023.
87561, 2020. [20] M. Xie et al., "ABBDAC: A Novel Attribute-Based
[4] X. He, H. Guo, and X. Cheng, "Blockchain‐based privacy Blockchain Data Access Control Scheme in Cloud
protection scheme for IoT‐assisted educational big data Environment," IEEE Internet of Things Journal, 2024.
management," Wireless Communications and Mobile [21] Y. Chen, L. Meng, H. Zhou, and G. Xue, "A
Computing, vol. 2021, no. 1, Art. no. 3558972, 2021. Blockchain‐Based Medical Data Sharing Mechanism with
[5] J. Wu, S. A. Haider, M. Bhardwaj, A. Sharma, and P. Attribute‐Based Access Control and Privacy Protection,"
Singhal, "[Retracted] Blockchain‐Based Data Audit Wireless Communications and Mobile Computing, vol.
Mechanism for Integrity over Big Data Environments," 2021, no. 1, Art. no. 6685762, 2021.
Security and Communication Networks, vol. 2022, no. 1, [22] F. M. Awaysheh, M. Alazab, M. Gupta, T. F. Pena, and J.
Art. no. 8165653, 2022. C. Cabaleiro, "Next-generation big data federation access
[6] C. Yang, L. Tan, N. Shi, B. Xu, Y. Cao, and K. Yu, control: A reference model," Future Generation Computer
"AuthPrivacyChain: A blockchain-based access control Systems, vol. 108, pp. 726–741, 2020.
framework with privacy protection in cloud," IEEE [23] F. Chen et al., "Data access control based on blockchain in
Access, vol. 8, pp. 70604–70615, 2020. medical cyber physical systems," Security and
[7] C. Bakir, "New blockchain based special keys security Communication Networks, vol. 2021, no. 1, Art. no.
model with path compression algorithm for big data," 3395537, 2021.
IEEE Access, vol. 10, pp. 94738–94753, 2022.
[8] H. Ghayvat, S. Pandya, P. Bhattacharya, M. Zuhair, M.
Rashid, S. Hakak, and K. Dev, "CP-BDHCA: Blockchain-
based Confidentiality-Privacy preserving Big Data scheme
for healthcare clouds and applications," IEEE Journal of
Biomedical and Health Informatics, vol. 26, no. 5, pp.
1937–1948, 2021.
[9] S. Y. A. Zaidi et al., "An attribute-based access control for
IoT using blockchain and smart contracts," Sustainability,
vol. 13, no. 19, Art. no. 10556, 2021.
[10] M. Zhaofeng, W. Lingyun, W. Xiaochang, W. Zhen, and Z.
Weizhe, "Blockchain-enabled decentralized trust
management and secure usage control of IoT big data,"
IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4000–
4015, 2019.
[11] S. Wang, X. Wang, and Y. Zhang, "A secure cloud storage
framework with access control based on blockchain,"
IEEE Access, vol. 7, pp. 112713–112725, 2019.
[12] Z. Yang et al., "An attribute-based access control scheme
using blockchain technology for IoT data protection,"
High-Confidence Computing, vol. 4, no. 3, Art. no.
100199, 2024.
[13] K. Azbeg, O. Ouchetto, and S. J. Andaloussi, "Access
control and privacy-preserving blockchain-based system
for diseases management," IEEE Transactions on
Computational Social Systems, vol. 10, no. 4, pp. 1515–
1527, 2022.
[14] S. Namane and I. Ben Dhaou, "Blockchain-based access
control techniques for IoT applications," Electronics, vol.
11, no. 14, Art. no. 2225, 2022.
[15] M. Ma, G. Shi, and F. Li, "Privacy-oriented blockchain-
based distributed key management architecture for
hierarchical access control in the IoT scenario," IEEE
Access, vol. 7, pp. 34045–34059, 2019.
[16] X. Yu, "Research on Security Storage and Access Control
System of Big Data in Universities Based on Blockchain
Technology," in 2024 IEEE 2nd International Conference
on Sensors, Electronics and Computer Engineering
(ICSECE), Aug. 2024, pp. 1203–1210.
[17] S. Sun, R. Du, S. Chen, and W. Li, "Blockchain-based IoT
access control system: towards security, lightweight, and
cross-domain," IEEE Access, vol. 9, pp. 36868–36878,
2021.
[18] N. Deepa et al., "A survey on blockchain for big data:
Approaches, opportunities, and future directions," Future

IJTRD | Nov – Dec 2024


Available [email protected] 264

You might also like