A Decentralized Security Model for Preventing Data Breaches in Distributed Environments

Main Article Content

Rakesh Kumar Mali

Abstract

Distributed computing environments became an important component of the contemporary business, cloud computing, Internet of Things and data-centric apps. However, they rest on the huge number of interconnected nodes, which can lead to an increased susceptibility to unauthorized access, insider attacks, poor authentication and huge data breaches. The research study proposes a non-centralized method of security against security breaches in distributed environments due to the reduction in the use of a central authority and increase in trust, transparency and resiliency among the networked systems. The proposed model enhances the security in the various levels through the identity verification, distributed access control, encrypted data sharing, node level authentication and real-time anomaly detection. In the model where security choices are decentralized, then the impact of a compromised node and single points of failures becomes lesser. Cryptographic hashing ensures data integrity and traceability, and access permissions are automated using smart contracts. It is also possible to use this framework of continuously monitoring the activity to forecast the potential suspicious behaviour and also transferring the undesired data prior to the breach happening. The article suggests that decentralization of security architecture can offer superior confidentiality, integrity, availability and accountability of the uncommon distributed infrastructures. Overall, the proposed model offers an extensible and adaptable system of protection of sensitive information on the cloud, edge, and enterprise networks. In its own way, it contributes to the body of knowledge regarding cybersecurity in the sense that it provides a practical security model, which can be compatible with the growing need of trustless, transparent, and breach-resilience distributed systems.

Article Details

Section

Articles

How to Cite

A Decentralized Security Model for Preventing Data Breaches in Distributed Environments. (2024). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(1), 9989-9999. https://doi.org/10.15662/IJRPETM.2024.0701011

References

[1] X. Chen, J. Ji, C. Luo, W. Liao, and P. Li, “When machine learning meets blockchain: A decentralized, privacy-preserving and secure design,” in Proc. IEEE Int. Conf. Big Data (Big Data), Seattle, WA, USA, Dec. 2018.

[2] Y. Lu, X. Huang, Y. Dai, S. Maharjan, and Y. Zhang, “Blockchain and federated learning for privacy-preserved data sharing in industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 4177–4186, 2020.

[3] A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “MedRec: Using blockchain for medical data access and permission management,” in Proc. Int. Conf. Open Big Data, Vienna, Austria, Aug. 2016.

[4] G. Zyskind, O. Nathan, and A. S. Pentland, “Decentralizing privacy: Using blockchain to protect personal data,” in Proc. IEEE Security and Privacy Workshops, San Jose, CA, USA, May 2015, pp. 180–184.

[5] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in Proc. IEEE Symp. Security and Privacy (SP), San Jose, CA, USA, May 2016, pp. 839–858.

[6] A. Dorri, S. S. Kanhere, and R. Jurdak, “Towards an optimized blockchain for IoT,” in Proc. IEEE/ACM 2nd Int. Conf. Internet-of-Things Design and Implementation (IoTDI), Pittsburgh, PA, USA, Apr. 2017, pp. 173–178.

[7] Z. Huang, X. Su, Y. Zhang, C. Shi, H. Zhang, and L. Xie, “A decentralized solution for IoT data trusted exchange based on blockchain,” in Proc. 3rd IEEE Int. Conf. Computer and Communications (ICCC), Chengdu, China, Dec. 2017, pp. 1180–1184.

[8] O. J. A. Pinno, A. R. A. Gregio, and L. C. De Bona, “ControlChain: Blockchain as a central enabler for access control authorizations in the IoT,” in Proc. IEEE Global Communications Conf. (GLOBECOM), Singapore, Dec. 2017, pp. 1–6.

[9] D. Di Francesco Maesa, P. Mori, and L. Ricci, “Blockchain based access control,” in Proc. IFIP Int. Conf. Distributed Applications and Interoperable Systems, Berlin, Germany: Springer, 2017, pp. 206–220.

[10] H. Xiong, H. Zhang, and J. Sun, “Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing,” IEEE Systems Journal, vol. 13, no. 3, pp. 2739–2750, 2019.

[11] G. Zhang, T. Li, Y. Li, P. Hui, and D. Jin, “Blockchain-based data sharing system for AI-powered network operations,” Journal of Communications and Information Networks, vol. 3, no. 3, pp. 1–8, 2018.

[12] L. Liu, J. Feng, Q. Pei, C. Chen, Y. Ming, B. Shang, and M. Dong, “Blockchain-enabled secure data sharing scheme in mobile-edge computing: An asynchronous advantage actor–critic learning approach,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2342–2353, 2021.

[13] O. Novo, “Blockchain meets IoT: An architecture for scalable access management in IoT,” IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1184–1195, 2018.

[14] G. Ali, N. Ahmad, Y. Cao, M. Asif, H. Cruickshank, and Q. E. Ali, “Blockchain based permission delegation and access control in Internet of Things (BACI),” Computers & Security, vol. 86, pp. 318–334, 2019.

[15] S. Dhar and I. Bose, “Securing IoT devices using zero trust and blockchain,” Journal of Organizational Computing and Electronic Commerce, vol. 31, no. 1, pp. 18–34, 2020