Secure Data Sharing in Decentralized Networks: Encryption Techniques, Access Control Mechanisms, and Data Integrity Verification
Abstract views: 108 / PDF downloads: 57
DOI:
https://doi.org/10.31039/plic.2024.11.239Keywords:
distributed systems, computer network security, data privacy, internet of things, decentralized networksAbstract
The introduction of decentralized systems in a rapidly changing technological world has introduced many issues and risks regarding privacy and secure data exchange. This paper addresses the complexities of secure data exchange within decentralized systems, focusing on encryption techniques, access control mechanisms, and data integrity verification. We begin by analyzing the impending risks and limitations within decentralized systems, including the potential for unauthorized access and data breaches from vulnerable points present in decentralized system entities. Subsequently, we analyze and explore modern methods of encryption to safeguard confidential data while also ensuring privacy. Furthermore, we examine access control strategies and integrity verification protocols, which play crucial roles in ensuring that data remains secure against unwarranted access and reliable across distributed ecosystems. Our findings emphasize the need for robust and intricate security measures adapted to the unique framework of decentralized systems. This study aims to advance the understanding of privacy and security in decentralized systems while serving as a stepping stone and valuable resource for future research.
References
Admin. (2018, September 14). What is Distributed Computing, its Pros and Cons? Open Cirrus; Open Cirrus. https://opencirrus.org/distributed-computing-pros-cons/#:~:text=In%20a%20nutshell%2C%20distributed%20computing
Am. (2024, February 20). Understanding Attribute-Based Access Control (ABAC). Medium. https://medium.com/@alokemajumder/understanding-attribute-based-access-control-abac-6eda89301860
APWG. (2020). Phishing Activity Trends Report, 4th Quarter 2020. Anti-Phishing Working Group. Retrieved from https://apwg.org/trendsreports/.
Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A Survey of Attacks on Ethereum Smart Contracts (SoK). Lecture Notes in Computer Science, 10323, 164-186.
AWS. (2023). What is Decentralization? Amazon Web Services, Inc. https://aws.amazon.com/blockchain/decentralization-in-blockchain/
Brook, C. (2023, June 8). Attribute-Based Access Control: Pros, Cons & Use Cases. Www.digitalguardian.com. https://www.digitalguardian.com/blog/attribute-based-access-control
Chandrakant, K. (2024, March 18). Fundamentals of Distributed Systems | Baeldung on Computer Science (G. Piwowarek, Ed.). Www.baeldung.com; Baeldung. https://www.baeldung.com/cs/distributed-systems-guide
Eagar, M. (2017, November 4). What is the difference between decentralized and distributed systems? Medium; Positive Mavericks — Blockchain Leadership Development. https://medium.com/distributed-economy/what-is-the-difference-between-decentralized-and-distributed-systems-f4190a5c6462
Ferraiolo, D., Cugini, J., & Kuhn, D. (1995, January). Role-Based Access Control (RBAC): Features and Motivations. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=916537
freeCodeCamp.org. (2018, April 27). A Thorough Introduction to Distributed Systems. FreeCodeCamp.org; freeCodeCamp.org. https://www.freecodecamp.org/news/a-thorough-introduction-to-distributed-systems-3b91562c9b3c/
geeksforgeeks. (2023, April 6). Advantages and Disadvantages Of Distributed Systems. GeeksforGeeks. https://www.geeksforgeeks.org/advantages-and-disadvantages-of-distributed-systems/
Goswami, P., Neetu Faujdar, Debnath, S., Khan, A., & Singh, G. (2024). Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability. Journal of Cloud Computing, 13(1). https://doi.org/10.1186/s13677-024-00605-z
Hadnagy, C., & Fincher, M. (2018). Social Engineering: The Science of Human Hacking. John Wiley & Sons.
Hayes, A. (2024, June 29). Blockchain Facts: What is it, how it works, and how it can be used. Investopedia. https://www.investopedia.com/terms/b/blockchain.asp
Lindell, Y. (2020). Secure multiparty computation. Communications of the ACM, 64(1), 86–96. https://doi.org/10.1145/3387108
Magnusson, A. (2024, January 29). Man-in-the-Middle (MITM) Attack: Definition, Examples & More | StrongDM. Discover.strongdm.com. https://www.strongdm.com/blog/man-in-the-middle-attack
McCarthy, M. (2023, February 9). Understanding Role-Based Access Control (RBAC). Www.strongdm.com. https://www.strongdm.com/rbac
McMillan, R. (2014). The Inside Story of Mt. Gox, Bitcoin’s $460 Million Disaster. Wired. Retrieved from https://www.wired.com/2014/03/bitcoin-exchange/.
N-Able. (2018, November 30). The Difference between Centralized and Decentralized Networks. N-Able. https://www.n-able.com/blog/centralized-vs-decentralized-network
Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., & Cammarota, R. (2017). Software and Hardware Implementation of Lattice-based Cryptography Schemes. Retrieved July 17, 2024, from https://www.cecs.uci.edu/files/2018/06/2017-tr-1.pdf
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero trust architecture. https://doi.org/10.6028/nist.sp.800-207
Simplilearn. (2024, July 2). What Is Data Encryption: Types, Algorithms, Techniques and Methods. Simplilearn.com. https://www.simplilearn.com/data-encryption-methods-article
Sonoda, D. (2020, May 30). Role-based access control overview. Medium. https://dsonoda.medium.com/role-based-access-control-overview-257de64534c
Staff Contributor. (2019, October 31). RBAC vs. ABAC Access Control: What’s the Difference? DNSstuff. https://www.dnsstuff.com/rbac-vs-abac-access-control
Systems, Z. P. E. (2021, September 1). Centralized vs. Distributed Network Management: Which One to Choose? ZPE Systems. https://zpesystems.com/centralized-vs-distributed-network-management-zs/
Technologies, B., & Technologies, B. (n.d.). Centralized vs Decentralized vs Distributed Systems · Berty Technologies. Berty Technologies. https://berty.tech/blog/decentralized-distributed-centralized
What is Blockchain on AWS? (n.d.). [Video]. Amazon Web Services, Inc. https://aws.amazon.com/what-is/blockchain/
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Nahaar Mirza, Tensae Laki, Taha Asif, Mehmet Uzgoren
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
Share: copy and redistribute the material in any medium or format. The licensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms: Attribution-NonCommercial-NoDerivatives-No additional restrictions.
Authors retain copyright and agree to license their articles with a Creative Commons Attribution-NonCommercial-