Blockchain-Enabled Cybersecurity for Cloud and IoT Environments using Artificial Intelligence
DOI:
https://doi.org/10.15662/IJARCST.2024.0702001Keywords:
Blockchain, Cybersecurity, Cloud Computing, Internet of Things (IoT), Permissioned Blockchain, Smart Contracts, Data Integrity, Access Control, 2023Abstract
Cloud computing and the Internet of Things (IoT) have become foundational pillars of modern digital infrastructure, but their proliferation has concurrently escalated cybersecurity threats—ranging from data tampering and identity spoofing to unauthorized access. In response, blockchain technology has emerged as a promising mechanism to strengthen security through its decentralized, immutable, and transparent characteristics. This study, situated in the context of 2023, investigates the integration of blockchain-based mechanisms to bolster cybersecurity in cloud and IoT ecosystems. Our approach encompasses a hybrid architecture combining a permissioned blockchain layer with lightweight consensus protocols optimized for IoT devices, coupled with smart-contract-driven access control and data integrity verification. We evaluate the framework in two scenarios: a cloud-based data-sharing platform and a real-world IoT sensor network. Key performance indicators include latency, throughput, security effectiveness (e.g., resistance to data manipulation, unauthorized access), and resource overhead in constrained IoT devices. Experimental results demonstrate that the blockchain-enhanced model enforces robust authentication and traceability without centralized trust dependencies. For the cloud platform, unauthorized data alterations were effectively prevented, and auditability improved drastically, with tamper events detectable immediately. In IoT environments, the consensus mechanism imposed moderate latency (~100–200 ms extra) but stayed within acceptable operational thresholds and consumed only ~5–8% additional energy. Smart contracts enabled fine-grained access control, significantly reducing attack surfaces. We discuss the trade-offs between security gains and system performance, emphasizing design considerations such as consensus selection, blockchain scalability, and IoT resource constraints. The study confirms that blockchain can play a pivotal role in securing cloud–IoT convergence, albeit with careful architectural design to maintain efficiency. In conclusion, blockchain-enabled cybersecurity frameworks offer enhanced integrity, authentication, and auditability. Future research should focus on optimizing consensus for ultra-low-power devices, interoperability across platforms, and real-time threat response integration.
References
1. Wang, X., & Li, Y. (2023). Blockchain-based mitigation of tampering and spoofing in IoT environments. Sensors, 23(1), 112.
2. Revathi, K. G., Ananth, B. J., Saravanan, M. L., & Kumar, A. R. (2021). Gps enabled vehicle location identification using gsm and fare collection using smart card. Turkish Journal of Computer and Mathematics Education, 12(10), 2657-2668.
3. Sugumar, R. (2024). Quantum-Resilient Cryptographic Protocols for the Next-Generation Financial Cybersecurity Landscape. International Journal of Humanities and Information Technology, 6(02), 89-105.
4. Mathew, A., & Alex, H. (2023). From Code to Cure: The Role of AI in Accelerating Drug Discovery. Advances and Challenges in Science and Technology, 2, 94-102.
5. Gopinathan, V. R. (2023). Cloud-first AI security architecture for protecting enterprise digital ecosystems and financial networks. International Journal of Research and Applied Innovations, 6(6), 10031-10039.
6. Singh, S., & Kumar, R. (2023). Permissioned blockchain for cloud data integrity and access control. ACM Transactions on Internet Technology, 23(2), Article 18.
7. Bellundagi, M. (2023). Integrating Machine Learning with Business Rule Management Systems for Adaptive Enterprise. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(1), 8023-8039.
8. Hema Latha Boddupally. (2019). Designing End-to-End Observability Architectures For High-Reliability .NET Cloud Applications In Production Environments. International Journal of Scientific Research & Engineering Trends, 5(6). https://doi.org/10.5281/zenodo.18042689
9. Narayanan, S. (2023). Operationalizing AI risk frameworks in financial services: A second line of defense perspective. World Journal of Advanced Research and Reviews, 20(1), 1436–1446. https://philarchive.org/archive/NAROAR
10. Lee, J., et al. (2023). A proof of authority consensus protocol optimized for edge based IoT devices. IEEE Internet of Things Journal, 10(4), 2234–2245.
11. Murugeshwari, B., Selvaraj, D., Sudharson, K., & Radhika, S. (2023). Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography. Intelligent Automation & Soft Computing, 35(1).
12. Vankayala, S. C. (2020). Reinventing test automation reliability: Adaptive locator intelligence and self-healing execution pipelines for enterprise QA. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 6(1), 226–242. https://doi.org/10.32628/CSEIT23906127
13. Raja, G. V. (2023). Modernizing Enterprise Systems using AI with Machine Learning and Cloud Computing for Intelligent Systems. International Journal of Future Innovative Science and Technology (IJFIST), 6(6), 11713.
14. Parupalli, A., & Pandya, S. (2022). Compliance-Driven Data Governance: A Survey on GDPR and HIPAA in Cloud Databases. 12, 828-836.
15. Vinurajkumar, S., Bobby, J. S., Thiyam, D. B., & Rajasekar, M. (2023, December). Optimized Feature Selection for Brain Cancer Detection. In 2023 International Conference on Energy, Materials and Communication Engineering (ICEMCE) (pp. 1-6). IEEE.
16. Rao, G. R. (2023). Hidden Trade-Offs in Modern Frontend Architecture. International Journal of Computer Technology and Electronics Communication, 6(5), 7615-7625.
17. Deivendran, P., Babu, P. S., Malathi, G., Anbazhagan, K., & Kumar, R. S. (2023). Emotion Recognition for Challenged People Facial Appearance in Social using Neural Network. arXiv preprint arXiv:2305.06842.
18. Soundappan, S. J. (2021). DataOps: Orchestrating Reliable ML Data Pipelines. International Journal of Research and Applied Innovations, 4(4), 5533-5537.
19. Niture, N. (2023). Machine Learning and Cryptographic Algorithms--Analysis and Design in Ransomware and Vulnerabilities Detection. Authorea Preprints.
20. Macha, Y., & Pulichikkunnu, S. K. (2023). An Explainable AI System for Fraud Identification in Insurance Claims via Machine-Learning Methods. Int. J. Adv. Res. Sci. Commun. Technol, 3(3), 1391-1400.
21. Patel, R., Singh, S., & Kumar, A. (2022). Hybrid blockchain and off chain storage frameworks for secure data handling. Journal of Cloud Computing, 11, Article 45.
22. Sabin Begum, R., & Sugumar, R. (2019). Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud. Cluster Computing, 22(Suppl 4), 9581-9588.
23. Lanka, S. (2023). Blurring boundaries where artificial intelligence ends and human potential begins. International Journal of Computer Technology and Electronics Communication, 6(4), 7331–7341.
24. Yamsani, N. (2022). Applying Machine Learning for Automated Data Quality and Anomaly Detection in Enterprise Data Pipelines. International Journal of Research and Applied Innovations, 5(1), 9457-9466.
25. Adepu, G. (2022). Machine learning-driven environmental monitoring systems for real-time regulatory compliance and risk detection. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(2), 22–37.
26. Gurram, S. (2023). Why Data Engineering, Not Model Scale, Became the True Bottleneck in Generative AI. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(4), 9028-9036.
27. Zhang, L., Chen, H., & Zhao, F. (2022). Decentralized access control in IoT via blockchain. International Journal of Distributed Sensor Networks, 18(3), 1–11.
28. Adepu, R. (2022). Building secure multi-cloud infrastructure for mission-critical enterprise workloads. The International Journal of Research Publications in Engineering, Technology and Management, 5(5), 14–32.
29. Mathew, A., & Mai, C. (2018, May). Study of Various Data Recovery and Data Back Up Techniques in Cloud Computing & Their Comparison. In 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 2021-2024). IEEE.
30. Jayaraman, S., Rajendran, S., & P, S. P. (2019). Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud. International Journal of Business Intelligence and Data Mining, 15(3), 273-287.
31. Mallireddy, S. (2023). How Servicenow Impacted Accelerating Clinical Trials. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(6), 1-7.
32. Mannanuddin, K., Vimal, V. R., Srinivas, A., Uma Mageswari, S. D., Mahendran, G., Ramya, J., ... & Vidhya, R. G. (2023). RETRACTED: Enhancing medical image analysis: A fusion of fully connected neural network classifier with CNN-VIT for improved retinal disease detection. Journal of Intelligent & Fuzzy Systems, 45(6), 12313-12328.


