Secure Data Sharing in Decentralized Networks: Encryption Techniques, Access Control Mechanisms, and Data Integrity Verification


Abstract views: 88 / PDF downloads: 40

Authors

  • Tensae Laki HS Academy, Pflugerville, USA
  • Taha Asif HS Academy, Pflugerville, USA
  • Nahaar Mirza HS of Innovation, Katy, USA
  • Mehmet Uzgoren Rice University, USA

DOI:

https://doi.org/10.31039/plic.2024.11.239

Keywords:

distributed systems, computer network security, data privacy, internet of things, decentralized networks

Abstract

The introduction of decentralized systems in a rapidly changing technological world has introduced many issues and risks regarding privacy and secure data exchange. This paper addresses the complexities of secure data exchange within decentralized systems, focusing on encryption techniques, access control mechanisms, and data integrity verification. We begin by analyzing the impending risks and limitations within decentralized systems, including the potential for unauthorized access and data breaches from vulnerable points present in decentralized system entities. Subsequently, we analyze and explore modern methods of encryption to safeguard confidential data while also ensuring privacy. Furthermore, we examine access control strategies and integrity verification protocols, which play crucial roles in ensuring that data remains secure against unwarranted access and reliable across distributed ecosystems. Our findings emphasize the need for robust and intricate security measures adapted to the unique framework of decentralized systems. This study aims to advance the understanding of privacy and security in decentralized systems while serving as a stepping stone and valuable resource for future research.

References

Admin. (2018, September 14). What is Distributed Computing, its Pros and Cons? Open Cirrus; Open Cirrus. https://opencirrus.org/distributed-computing-pros-cons/#:~:text=In%20a%20nutshell%2C%20distributed%20computing

Am. (2024, February 20). Understanding Attribute-Based Access Control (ABAC). Medium. https://medium.com/@alokemajumder/understanding-attribute-based-access-control-abac-6eda89301860

APWG. (2020). Phishing Activity Trends Report, 4th Quarter 2020. Anti-Phishing Working Group. Retrieved from https://apwg.org/trendsreports/.

Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A Survey of Attacks on Ethereum Smart Contracts (SoK). Lecture Notes in Computer Science, 10323, 164-186.

AWS. (2023). What is Decentralization? Amazon Web Services, Inc. https://aws.amazon.com/blockchain/decentralization-in-blockchain/

Brook, C. (2023, June 8). Attribute-Based Access Control: Pros, Cons & Use Cases. Www.digitalguardian.com. https://www.digitalguardian.com/blog/attribute-based-access-control

Chandrakant, K. (2024, March 18). Fundamentals of Distributed Systems | Baeldung on Computer Science (G. Piwowarek, Ed.). Www.baeldung.com; Baeldung. https://www.baeldung.com/cs/distributed-systems-guide

Eagar, M. (2017, November 4). What is the difference between decentralized and distributed systems? Medium; Positive Mavericks — Blockchain Leadership Development. https://medium.com/distributed-economy/what-is-the-difference-between-decentralized-and-distributed-systems-f4190a5c6462

Ferraiolo, D., Cugini, J., & Kuhn, D. (1995, January). Role-Based Access Control (RBAC): Features and Motivations. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=916537

freeCodeCamp.org. (2018, April 27). A Thorough Introduction to Distributed Systems. FreeCodeCamp.org; freeCodeCamp.org. https://www.freecodecamp.org/news/a-thorough-introduction-to-distributed-systems-3b91562c9b3c/

geeksforgeeks. (2023, April 6). Advantages and Disadvantages Of Distributed Systems. GeeksforGeeks. https://www.geeksforgeeks.org/advantages-and-disadvantages-of-distributed-systems/

Goswami, P., Neetu Faujdar, Debnath, S., Khan, A., & Singh, G. (2024). Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability. Journal of Cloud Computing, 13(1). https://doi.org/10.1186/s13677-024-00605-z

Hadnagy, C., & Fincher, M. (2018). Social Engineering: The Science of Human Hacking. John Wiley & Sons.

Hayes, A. (2024, June 29). Blockchain Facts: What is it, how it works, and how it can be used. Investopedia. https://www.investopedia.com/terms/b/blockchain.asp

Lindell, Y. (2020). Secure multiparty computation. Communications of the ACM, 64(1), 86–96. https://doi.org/10.1145/3387108

Magnusson, A. (2024, January 29). Man-in-the-Middle (MITM) Attack: Definition, Examples & More | StrongDM. Discover.strongdm.com. https://www.strongdm.com/blog/man-in-the-middle-attack

McCarthy, M. (2023, February 9). Understanding Role-Based Access Control (RBAC). Www.strongdm.com. https://www.strongdm.com/rbac

McMillan, R. (2014). The Inside Story of Mt. Gox, Bitcoin’s $460 Million Disaster. Wired. Retrieved from https://www.wired.com/2014/03/bitcoin-exchange/.

N-Able. (2018, November 30). The Difference between Centralized and Decentralized Networks. N-Able. https://www.n-able.com/blog/centralized-vs-decentralized-network

Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., & Cammarota, R. (2017). Software and Hardware Implementation of Lattice-based Cryptography Schemes. Retrieved July 17, 2024, from https://www.cecs.uci.edu/files/2018/06/2017-tr-1.pdf

Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero trust architecture. https://doi.org/10.6028/nist.sp.800-207

Simplilearn. (2024, July 2). What Is Data Encryption: Types, Algorithms, Techniques and Methods. Simplilearn.com. https://www.simplilearn.com/data-encryption-methods-article

Sonoda, D. (2020, May 30). Role-based access control overview. Medium. https://dsonoda.medium.com/role-based-access-control-overview-257de64534c

Staff Contributor. (2019, October 31). RBAC vs. ABAC Access Control: What’s the Difference? DNSstuff. https://www.dnsstuff.com/rbac-vs-abac-access-control

Systems, Z. P. E. (2021, September 1). Centralized vs. Distributed Network Management: Which One to Choose? ZPE Systems. https://zpesystems.com/centralized-vs-distributed-network-management-zs/

Technologies, B., & Technologies, B. (n.d.). Centralized vs Decentralized vs Distributed Systems · Berty Technologies. Berty Technologies. https://berty.tech/blog/decentralized-distributed-centralized

What is Blockchain on AWS? (n.d.). [Video]. Amazon Web Services, Inc. https://aws.amazon.com/what-is/blockchain/

Downloads

Published

2024-09-09

How to Cite

Tensae Laki, Taha Asif, Nahaar Mirza, & Mehmet Uzgoren. (2024). Secure Data Sharing in Decentralized Networks: Encryption Techniques, Access Control Mechanisms, and Data Integrity Verification. Proceedings of London International Conferences, (11), 76–88. https://doi.org/10.31039/plic.2024.11.239