1. Introduction
The widespread adoption of cloud services has transformed enterprise IT by providing elastic scalability, resource efficiency, and cost savings. Yet, this transition has also exposed organizations to new categories of security threats, particularly related to identity and access management. Traditional mechanisms such as password-based logins and static role-based access control (RBAC) models are increasingly inadequate in the face of modern threats like phishing, credential stuffing, insider attacks, and delayed privilege revocation. Real-world breaches—including the Capital One incident—have demonstrated how reliance on single-factor authentication and centralized permission systems can lead to massive data exposures [
1].
To address these limitations, researchers and practitioners are turning to blockchain technology, which offers a decentralized, tamper-proof ledger ideal for transparent security auditing and policy enforcement. Smart contracts extend blockchain’s utility by enabling the automated execution of predefined access rules without requiring centralized intermediaries. Prior studies have investigated blockchain for securing IoT authentication [
2] and for identifying vulnerabilities in smart contract logic that could be improved with machine learning-based defenses [
3]. However, most of these approaches still fall short in handling cloud-specific constraints such as user scalability, latency-sensitive transactions, and interoperability across heterogeneous cloud platforms.
Despite these advancements, gaps remain in integrating blockchain and smart contracts into cloud environments effectively. Previous works often fall short in addressing the specific challenges encountered in real-world cloud environments, such as high latency in real-time access permission updates; lack of federated identity synchronization across heterogeneous cloud platforms; and the absence of reliable, auditable logs for policy enforcement and violations [
4,
5]. These shortcomings become critical in multi-tenant or hybrid cloud deployments, where centralized access control systems cannot guarantee consistent policy enforcement or real-time revocation across globally distributed regions. To overcome these limitations, this study introduces an innovative framework that leverages blockchain-based smart contracts combined with multi-factor authentication (MFA). Unlike prior works, this system not only mitigates threats like unauthorized access and data breaches but also enhances scalability, traceability, and usability through decentralized and tamper-proof operations [
6].
The proposed framework’s novelty lies in its ability to provide tamper-proof, automated, and transparent access control in real time, ensuring high security without compromising performance. A prototype system, implemented using Ethereum blockchain and Solidity programming, demonstrates significant improvements in key metrics, including a 0% success rate for unauthorized access and efficient handling of concurrent user loads [
7,
8,
9,
10]. By bridging existing gaps in cloud security, this study contributes to advancing the application of blockchain and smart contracts in real-world cloud environments, paving the way for scalable, secure, and reliable cloud solutions [
11,
12,
13,
14].
This study focuses on addressing the limitations of existing frameworks
Recent research by [
33] highlights the potential of integrating blockchain with machine learning techniques to enhance authentication in industrial IoT environments [
34,
35,
36,
37,
38]. Their work demonstrates how transfer learning models [
39], when combined with blockchain’s immutability, can significantly strengthen identity verification processes and mitigate evolving cyber threats [
40,
41,
42]. This insight reinforces the relevance of blockchain-based authentication for scalable and secure access control, aligning with our proposed framework that embeds smart contracts with multi-factor authentication in cloud environments [
43,
44,
45].
The primary aim of this research is to develop and evaluate a novel framework that leverages smart contracts and blockchain to enhance the security of cloud services. This study specifically addresses the following key limitations found in the existing literature:
Lack of scalable and real-time access control enforcement in decentralized cloud environments, leading to delayed permission updates and increased attack surfaces.
Absence of interoperability across heterogeneous cloud platforms and identity management systems, which limits the applicability of existing blockchain-based approaches.
Limited support for tamper-proof logging and traceability, making it difficult to conduct reliable audits or reconstruct access histories in traditional systems.
Weak integration of multi-factor authentication (MFA) with blockchain smart contracts, which restricts the ability to enforce layered security in real time.
Inadequate protection against advanced threat vectors such as flash loan exploits and oracle manipulation, which are common in decentralized applications but underexplored in cloud security frameworks.
This framework addresses these challenges by combining decentralized smart contracts with multi-factor authentication (MFA) to enforce access control policies in an automated, transparent, and auditable manner.
This study makes substantial contributions to cloud security through both theoretical insights and practical implementations. First, the research replaces centralized mechanisms with a decentralized and transparent system, eliminating single points of failure and enhancing trust in cloud environments. Second, it provides a detailed analysis of how smart contracts can automate and enforce access control policies effectively, mitigating vulnerabilities that are common in traditional approaches. Third, the framework was empirically validated through rigorous testing, demonstrating high resistance to attacks, efficient resource utilization, and scalability under moderate user loads.
The novelty of this research lies in its seamless integration of blockchain-based smart contracts with MFA to provide real-time auditing and dynamic role-based access control. This enables organizations to enhance their security posture while maintaining compliance with regulatory requirements through the transparent and auditable records of blockchain transactions. A functional prototype of the framework, developed using Ethereum and Solidity, serves as a reference for future implementations. By addressing gaps in scalability and usability, the study provides a scalable, efficient, and user-centric solution to modern cloud security challenges. This work lays the foundation for further adoption and refinement of blockchain-based security frameworks in cloud environments.
Research Motivation and Contributions
This research is motivated by the pressing need for decentralized, tamper-proof, and real-time access control systems in modern cloud environments. Traditional access control mechanisms—such as password-based authentication and role-based access control (RBAC)—are increasingly susceptible to credential theft, phishing attacks, and centralized failure points. These limitations pose significant risks to data confidentiality, integrity, and system availability, especially in critical infrastructures and high-assurance cloud platforms.
The key contributions of this paper are as follows:
We design a blockchain-driven cloud access control framework that tightly integrates smart contracts with Multi-Factor Authentication (MFA) to achieve tamper-proof, decentralized, and real-time user authentication.
We develop and deploy a full-stack prototype using Ethereum and Solidity, demonstrating 0% unauthorized access attempts under rigorous test conditions using both single-factor and MFA-based scenarios.
The framework encodes mathematically modeled smart contracts to enforce dynamic, role-based permissions while verifying multiple authentication factors such as OTP and biometrics on-chain.
We benchmark the system under increasing load conditions (up to 1000 concurrent users), evaluating performance across security, scalability, latency, throughput, and usability metrics.
We embed mitigation logic for advanced threats like flash loan exploits and oracle manipulation, expanding beyond traditional attack models considered in prior blockchain-cloud integration works.
We validate cross-platform interoperability by deploying the system across Ethereum and Hyperledger Fabric environments using Cosmos-SDK relayer logic to test consistent policy enforcement across heterogeneous cloud networks.
Why integrate Multi-Factor Authentication (MFA)? Multi-Factor Authentication (MFA) adds a critical layer of defense by requiring two or more distinct forms of identity verification—such as passwords, one-time passwords (OTPs), or biometrics. MFA is particularly crucial in cloud environments prone to identity spoofing, phishing, and session hijacking—attack types not mitigated by single credentials. In the context of cloud environments, where identity spoofing, credential stuffing, and session hijacking are frequent attack vectors, MFA enhances resilience by enforcing layered verification. By integrating MFA directly into the smart contract logic, the proposed framework ensures tamper-proof policy enforcement and immutable logging of all authentication events, enabling decentralized, automated, and auditable access control. This combined approach not only improves real-time decision-making and traceability but also strengthens defense-in-depth across distributed cloud infrastructures [
4].
2. Literature Review
Cloud computing has revolutionized IT resource management by offering scalability, flexibility, and cost-efficiency. However, this shift has also introduced critical concerns regarding data security and privacy, including data breaches, identity theft, and non-compliance with regulatory standards. Traditional authorization and authentication methods, such as password-based systems and centralized access control, have often proven inadequate in addressing these challenges. As a result, there has been growing interest in blockchain technology and smart contracts to overcome these limitations. Smart contracts, as self-executing agreements with predefined conditions, offer a decentralized, transparent, and tamper-proof framework for managing digital transactions, enhancing the security of access control mechanisms in cloud environments.
2.1. Recent Advancements in Smart Contract Applications
Several studies have demonstrated the potential of smart contracts to address cloud security issues. Khalil et al. [
1] proposed a novel NFT-enabled blockchain architecture for IoT authentication, highlighting improved security but encountering scalability challenges. Similarly, Hyperledger Fabric-based permissioned blockchain systems have minimized latency while improving performance in cloud applications, but their centralized nature limits broader interoperability [
8]. Furthermore, machine learning algorithms integrated with smart contracts have enabled dynamic and adaptive authorization, improving resilience in cloud services, as discussed by Zhang et al. [
17].
Smart contract implementations on platforms such as EOSIO and NEO have also been explored. EOSIO leverages parallel processing for real-time authentication, while NEO focuses on digital identity systems to enhance verification processes. However, both platforms face scalability issues when handling large user loads [
6,
20]. Similarly, Stellar’s consensus protocol has shown promise for secure and decentralized smart contracts, but its reliance on public blockchain protocols raises privacy concerns [
12].
2.2. Advanced Techniques in Smart Contracts
Innovative techniques such as zero-knowledge proofs (ZKPs) and attribute-based encryption (ABE) have been integrated into smart contracts to enhance user authentication without exposing sensitive data. For example, Alevizos et al. [
10] demonstrated the potential of ZKPs for secure authentication. Federated learning integrated with Algorand’s pure proof-of-stake mechanism has shown the capability to make dynamic authorization decisions based on user behavior, further enhancing security [
3]. However, these techniques remain constrained by interoperability issues and resource-intensive computations, particularly in large-scale deployments [
33,
34].
2.3. Limitations of Current Approaches
While smart contracts have shown significant potential, several challenges remain. Scalability continues to be a critical limitation, as existing blockchain systems struggle to manage high transaction volumes or concurrent users. Moreover, interoperability between blockchain systems and diverse cloud platforms is not yet seamless.
Table 1 presents a comparative analysis of existing approaches and the proposed framework across key features relevant to cloud access control—namely, smart contract integration, MFA support, interoperability, real-time enforcement, and auditability. While prior works offer partial improvements in specific areas such as intrusion detection or encryption scalability, they generally lack comprehensive support for decentralized, tamper-proof, and real-time access control. In contrast, the proposed system provides full coverage of these dimensions, demonstrating its novelty and practical advantages.
In addition to prior blockchain-based access control approaches, several blockchain-enabled database architectures—such as LedgerDB, VeDB, and SecuDB—have emerged to address secure data storage, query integrity, and tamper detection. LedgerDB [
42] offers a centralized yet cryptographically verifiable ledger optimized for auditability but lacks decentralized identity enforcement or real-time access policy support. VeDB [
43] integrates hardware-assisted trusted components for secure relational databases, focusing on data integrity and throughput rather than role-based access control or multi-cloud deployment. SecuDB [
44] introduces privacy-preserving data processing using trusted execution environments (TEEs) but remains limited to enclave-level security and does not natively support smart contract-based or federated identity systems. In contrast, our proposed framework prioritizes decentralized, multi-factor-authenticated identity and access control (IAM), combining smart contract automation with auditable, real-time policy enforcement across distributed cloud platforms. This distinction positions our work as a robust solution for scalable, policy-driven access governance in heterogeneous and dynamic cloud environments.
The existing literature on cloud security highlights several limitations that hinder the effectiveness of current solutions. Traditional methods, such as password-based authentication and role-based access control (RBAC), are increasingly vulnerable to sophisticated cyber threats like phishing, credential theft, and brute force attacks. These centralized systems often present single points of failure, making them susceptible to insider threats and large-scale breaches. While multi-factor authentication (MFA) and biometric verification provide enhanced security, they can introduce usability challenges and additional implementation complexities. Moreover, existing blockchain-based frameworks for cloud security, while promising, face scalability issues, limiting their performance under high user loads. Interoperability across heterogeneous cloud environments remains another critical challenge, as current approaches lack the flexibility to integrate seamlessly with diverse platforms and services. Additionally, regulatory compliance and evolving security requirements pose further barriers to the widespread adoption of advanced frameworks. Despite notable advancements in the use of blockchain and smart contracts for decentralized access control, there is a significant research gap in optimizing these systems for large-scale deployments while maintaining performance, usability, and compliance with security standards. Addressing these limitations is crucial to develop robust, scalable, and practical solutions for secure cloud environments.
A significant research gap exists in the current literature regarding the scalability and interoperability challenges of implementing advanced smart contracts for authorization and authentication in cloud computing. While existing studies have explored various aspects such as cryptographic techniques, biometric authentication, and decentralized identity management, there remains a need for comprehensive research that addresses how smart contracts can effectively manage complex access control policies across heterogeneous cloud environments. Specifically, there is limited understanding of the practical implementation and integration of smart contracts with diverse cloud platforms, as well as their ability to adapt to evolving security threats and regulatory requirements. Closing this gap is crucial for developing robust and scalable solutions that enhance the security, reliability, and flexibility of cloud computing systems.
3. Methodology
The proposed framework was developed considering several critical factors to ensure its robustness and effectiveness in cloud security. First, role-based access control is implemented to enable dynamic access control, ensuring that users are granted the appropriate permissions based on their role. This is complemented by the integration of multi-factor authentication (MFA), utilizing factors such as one-time passwords (OTPs) and biometric authentication, to provide an added layer of security and minimize the risk of unauthorized access. The framework also addresses various attack vectors, including replay attacks, oracle manipulation, and flash loan exploits, by incorporating corresponding defense mechanisms directly within the smart contract logic. Additionally, the system is designed to be compatible with different blockchain network types, including Proof of Authority (PoA) and Proof of Work (PoW), providing flexibility and security across diverse blockchain environments. Performance optimization was a key consideration, with a focus on transaction throughput, latency, and gas efficiency to ensure scalability and cost-effectiveness. Finally, the system supports cross-chain identity resolution mechanisms, enabling seamless integration and identity verification across multiple blockchain platforms, which is essential for ensuring interoperability in a multi-cloud ecosystem.
The methodology builds on existing gaps identified in the literature, such as scalability limitations, lack of interoperability, and insufficient real-time monitoring capabilities in traditional systems. Unlike prior solutions, the proposed framework:
Implements dynamic role-based access control through smart contracts.
Incorporates multi-layer security using MFA integrated into the blockchain infrastructure.
Ensures real-time transaction auditing and immutable record-keeping via blockchain.
This framework aims to address common security threats, including unauthorized access, data breaches, and identity theft, while offering a scalable and efficient solution for modern cloud environments.
3.1. Research Design
The research design for this study is meticulously structured to ensure a comprehensive approach to developing and evaluating a novel framework for smart contract-based authorization and authentication in cloud services. This section elaborates on the theoretical foundations, system architecture, development process, and evaluation criteria of the proposed framework, as shown in
Figure 1.
3.1.1. Design Considerations
The following design factors were taken into account before developing the framework:
Support for multiple authentication factors (e.g., password, biometric, OTP).
Enforcement of dynamic role-based access policies.
Decentralization of access control to avoid single points of failure.
Real-time auditability via blockchain logs.
Compatibility with existing cloud service APIs and potential for cross-chain extension.
Defense against known attacks, including reentrancy, phishing, and flash loans.
3.1.2. System Architecture
The proposed framework integrates smart contracts with cloud services to automate and enforce access control policies. The system architecture includes several key components:
Users: Entities that request access to cloud resources.
Access Request Module: Interfaces through which users submit access requests.
Authorization Server: Validates access requests and interacts with the blockchain.
Smart Contracts: Encodes access control policies and executes them autonomously.
Blockchain Network: Records all transactions and access control decisions, ensuring immutability and transparency.
Multi-Factor Authentication (MFA): Adds an additional layer of security by requiring multiple verification factors.
The interaction among these components is illustrated in a detailed flowchart and mathematical model.
3.1.3. Development Process
The development process involves several stages:
Requirement Analysis: Identifying the security requirements and potential vulnerabilities in existing cloud services.
Smart Contract Development: Writing and testing smart contracts using Solidity on the Ethereum blockchain.
System Integration: Integrating smart contracts with the cloud infrastructure and setting up the blockchain environment.
User Interface Development: Creating a user-friendly interface for submitting access requests and managing authorizations.
3.1.4. Mathematical Modeling
Mathematical modeling is used to formalize the authorization and authentication processes. This involves defining user roles, permissions, and the interactions between them through a set of equations.
Smart Contract-Based Authorization
Let U be the set of users, R the set of roles, and P the set of permissions. Define A as the authorization matrix, where if user has role and 0 otherwise. The smart contract S enforces these policies.
Objective Function:
where
is the cost associated with assigning role rrr.
The smart contract SSS ensures:
This function minimizes the total cost of role assignments while ensuring secure and decentralized access control.
Secure Multi-Factor Authentication (MFA)
For secure multi-factor authentication, let M be the set of authentication factors (e.g., password, biometric, token) and FFF the set of users who have successfully authenticated using at least two factors. Define
if user
uses factor
and 0 otherwise.
subject to:
The goal is to maximize the number of users who authenticate using at least two different factors. The smart contract verifies these factors before granting access, reducing the risk of unauthorized access.
3.2. System Design
Figure 2 presents the System design diagram illustrating the interaction among users, multi-factor authentication (MFA), blockchain, and smart contracts. Users authenticate via MFA before access requests are verified and enforced by smart contracts on the blockchain. The diagram also emphasizes areas of improvement based on reviewer feedback, including system scalability, enhanced threat resilience, and architecture clarity.
3.2.1. Key Components
Smart Contracts: These are self-executing contracts with the terms of the agreement directly written into code. They automate the enforcement of access control policies, ensuring that permissions are granted only to authenticated and authorized users.
Blockchain Integration: The system uses a decentralized ledger to record all transactions and access control decisions. This ledger is immutable and transparent, providing a secure audit trail for all access events.
Multi-Factor Authentication (MFA): To enhance security, the system incorporates multiple authentication factors, such as passwords, biometrics, and tokens. This ensures that even if one authentication factor is compromised, unauthorized access is still prevented.
The system’s design can be formalized using mathematical equations that describe the authorization and authentication processes. These equations ensure that the smart contracts correctly enforce access control policies and that the blockchain securely records all transactions.
Figure 3 shows the Updated system architecture showing detailed interaction among users, the MFA module, smart contracts, and cloud APIs.
The diagram illustrates interactions among blockchain validator nodes, the smart contract layer, the multi-factor authentication (MFA) module, access control interfaces, and cloud resource APIs. Data flow arrows represent verification and authorization pathways, while user roles (end user, auditor, administrator) are clearly defined.
Smart Contract-Based Authorization
Let U be the set of users, R the set of roles, and P the set of permissions. Define A as the authorization matrix, where
if user
has role
and 0 otherwise. Let S be the smart contract that enforces authorization policies.
where
is the cost associated with assigning role rrr.
The smart contract S ensures:
The cost function
can be further detailed as:
where cic_ici represents individual cost components such as computational resources, storage, and maintenance.
Blockchain Integration
The blockchain records all access control transactions. Let T be the set of transactions, where each transaction
records an access event. Define
as the hash of transaction
, ensuring the immutability and integrity of the transaction data.
The blockchain is modeled as a sequence of blocks BBB, where each block contains a set of transactions and the hash of the previous block
. This forms a secure chain of records.
Multi-Factor Authentication (MFA)
For MFA, let MMM be the set of authentication factors (e.g., password, biometric, token) and FFF the set of users who have successfully authenticated using at least two factors. Define
if user
uses factor
and 0 otherwise.
subject to:
The smart contract verifies these factors before granting access. Let V(u)V(u)V(u) be the verification function:
If , the user is granted access; otherwise, access is denied.
Biometric Hashing and Anti-Collision Assurance
All biometric factors (e.g., fingerprint templates) are hashed using SHA-256 with nonce-based salting to prevent collision-based fraud. We measured the anti-collision resistance rate using 10,000 biometric records and observed a collision probability of <1 × 10−6, confirming the robustness of our biometric hashing pipeline.
Overall System Flow
The system flow can be described as follows:
User Request: A user uuu submits an access request .
Authorization Server: The authorization server processes and forwards it to the smart contract S.
Smart Contract Execution: The smart contract S checks the authorization matrix A and the user’s authentication factors .
Blockchain Record: If the user is authorized and authenticated, a transaction ttt is created and added to the blockchain B.
Access Grant: The user u is granted access if and .
3.2.2. Prototype Development
The development of the prototype system involves a series of detailed steps to ensure the implementation of a robust and scalable framework for smart contract-based authorization and authentication in cloud services. This section provides an in-depth look at the development process, from smart contract creation to the final user interface design.
3.2.3. Experimental Conditions
The prototype system was developed to simulate real-world cloud environments, where security threats such as unauthorized access, phishing attacks, and brute force attempts are prevalent. The experimental conditions replicated scenarios involving varying user loads, multiple access requests, and potential attack vectors to test the system’s robustness. Tools like Ethereum blockchain, programmed with Solidity, were used for smart contract implementation. The system was deployed and tested on a private Ethereum network to validate its performance.
The dataset used for testing was generated to mimic real-world access control scenarios, including diverse roles, permissions, and authentication factors. The dataset comprised 500 access requests involving various authentication conditions (e.g., single-factor and multi-factor authentication). Performance metrics, such as response time, scalability, and security, were evaluated under controlled conditions.
We used the Ropsten Ethereum testnet for deploying and testing the smart contracts. This testnet was chosen because it mirrors the mainnet environment while offering a cost-effective and secure testing environment. Using Ropsten allowed us to simulate real-world conditions without incurring significant transaction fees.
3.2.4. Smart Contract Development
The heart of the proposed system lies in its smart contracts, which are responsible for enforcing access control policies. The development process for these smart contracts involves several stages:
Requirement Analysis:
Identify specific security requirements and potential vulnerabilities within the cloud service environment.
Define the roles and permissions structure, along with the rules governing access control.
Design Phase:
Implementation:
Write the smart contracts using Solidity, the programming language for Ethereum.
Key smart contract functions include addUser(), assignRole(), authenticateUser(), and logAccess().
function authenticateUser(address user) public view returns (bool) { require(users[user].authenticated == true, “User not verified”); require(block.timestamp <= users[user].sessionExpiry, “Session expired”); return authorizedRoles[users[user].role]; } |
Table 2 provides the gas consumption estimates for key smart contract functions using Remix and Hardhat tools. The addUser() and assignRole() functions incur higher gas costs due to storage operations, while authenticateUser() is relatively lightweight, as it performs only state verification. These insights help optimize contract efficiency and predict transaction costs during deployment.
- 4.
Testing:
Perform unit testing of each smart contract function to ensure correct implementation.
Use test networks like Ropsten or Rinkeby for deploying and testing contracts without incurring real transaction costs.
- 5.
Deployment:
contract AccessControl { address owner; struct User { uint id; string role; } mapping(address => User) users; mapping(string => bool) authorizedRoles; constructor() { owner = msg.sender; } modifier onlyOwner() { require(msg.sender == owner, "Only owner can perform this action"); _; } function addUser(address _user, uint _id, string memory _role) public onlyOwner { users[_user] = User(_id, _role); } function authorizeRole(string memory _role) public onlyOwner { authorizedRoles[_role] = true; } function authenticateUser(address _user) public view returns (bool) { return authorizedRoles[users[_user].role]; } } |
3.2.5. Blockchain Setup
The blockchain setup is a critical step in ensuring that the system securely handles the transactions generated by the smart contracts. It involves multiple stages, each of which plays a key role in ensuring the integrity, security, and functionality of the system. The setup process is divided into the following steps:
Network Configuration:
The first step is to select an appropriate Ethereum network based on the development stage and security requirements of the project. During initial testing, it is common to use testnets such as Ropsten or Rinkeby, which mimic the Ethereum mainnet environment but allow for testing without incurring real transaction costs. For deployment in a production environment, the mainnet is used to ensure real-world security and stability.
Once the network is selected, the nodes must be configured properly to ensure that they are synchronized. This involves setting up Ethereum nodes that are capable of interacting with the blockchain, validating transactions, and maintaining the ledger.
Node Setup:
The next step is to set up Ethereum nodes using tools like Geth (Go Ethereum) or Parity. These tools allow for the creation and management of Ethereum nodes that participate in the blockchain network.
After the nodes are set up, it is essential to secure them to maintain the integrity of the blockchain network. This involves securing the nodes using firewalls, monitoring for unusual activity, and ensuring that they are up-to-date with the latest security patches.
We used a private Ethereum network deployed via the Geth client in Proof-of-Authority (PoA) mode. The network consisted of 5 validator nodes and 2 peer nodes simulating end-user interactions. The block interval was configured at 5 s for stable testing throughput. This setup was selected over public testnets (e.g., Rinkeby) to reduce latency and avoid external traffic, ensuring controlled benchmarking conditions.
Blockchain Participants and Role Definitions
In our implementation, the blockchain participants include:
Cloud Service Provider Node (Validator): Responsible for validating and appending access control transactions to the blockchain.
Client Gateway Node (User Entry Point): Submits access requests and initiates authentication.
Security Auditor Node (Observer): Monitors blockchain transactions for compliance and audit purposes.
These roles simulate a decentralized cloud consortium where each stakeholder maintains a node to ensure transparency and integrity.
Blockchain Evaluation
We evaluated the blockchain layer using metrics such as transaction throughput, block propagation time, and finality delay. Under a controlled load (1000 transactions), the system achieved:
Average block propagation time: 4.2 s;
Finality (confirmation of block immutability): ~12 s;
Transaction throughput: 18 TPS (Transactions per second) on private Ethereum network.
- 3.
Smart Contract Integration:
Once the blockchain network is configured, the next step is to integrate the deployed smart contracts with the cloud services. This requires linking the functions of the smart contracts to the application logic that drives the cloud service. By doing so, the cloud services can leverage the blockchain for authorization, authentication, and secure access control.
To facilitate seamless communication between the blockchain and cloud services, libraries such as Web3.js or ethers.js are used. These JavaScript libraries enable the interaction with the Ethereum blockchain by providing an easy way to send and receive transactions, interact with smart contracts, and read data from the blockchain.
- 4.
Security Measures:
Security is a key consideration when setting up the blockchain. It is important to implement additional security measures to protect against common vulnerabilities such as re-entrancy attacks and front-running attacks. These types of attacks are well known in the Ethereum ecosystem and can undermine the integrity of smart contract execution if not properly mitigated.
To prevent these vulnerabilities, secure coding practices must be followed when developing smart contracts. Additionally, network nodes should be regularly updated and patched to protect against newly discovered vulnerabilities. This proactive approach ensures that the blockchain network remains secure and resilient to potential attacks.
Regular security audits of smart contracts should be conducted to identify any weaknesses in the contract code and rectify them before deployment on the Ethereum mainnet.
The network includes three main roles: (1) End Users, who submit access requests; (2) Smart Contract Deployers, responsible for policy enforcement logic; and (3) Validators, who confirm and append transactions. Trust is maintained through PoA consensus, where validators are pre-approved and cryptographically authenticated. All transaction records are tamper-proof and auditable via the shared ledger.
3.2.6. User Interface
A user-friendly interface is essential for seamless interaction with the blockchain-based system, ensuring that users can easily manage and access the services while maintaining security. The UI is designed with both usability and security in mind, allowing users to interact with smart contracts through a secure and intuitive platform. The development process of the user interface is divided into the following stages:
Design:
- ◦
The design phase focuses on creating a simple, intuitive UI/UX that balances ease of use with robust security features. The user interface must be accessible to both novice and advanced users while ensuring that it does not compromise on security.
- ◦
Wireframes and mockups are created to visualize the layout, interactions, and flow of the user interface. This planning phase helps to outline the user’s journey, from logging in to interacting with smart contracts, ensuring that the user can easily navigate between different sections of the system.
- ◦
Feedback from preliminary user testing is gathered during the design phase to improve the interface and refine the layout. This iterative process helps ensure that the design meets user expectations and is intuitive for users with varying technical expertise.
Implementation:
- ◦
The frontend of the UI is developed using modern JavaScript frameworks like React or Angular. These frameworks are chosen because of their capability to build dynamic, responsive interfaces that can efficiently handle real-time interactions with the blockchain.
- ◦
The backend services are implemented using Node.js or Python, providing the server-side functionality required to handle user requests, interface with the Ethereum blockchain, and manage smart contract interactions. These backend technologies are used to ensure fast response times, scalability, and efficient handling of user requests.
- ◦
The frontend and backend communicate with each other using APIs, with libraries like Web3.js or ethers.js facilitating interaction between the UI and blockchain. These libraries enable the frontend to send transactions to the blockchain, call smart contract functions, and retrieve data from the blockchain to display on the user interface.
Integration:
- ◦
The integration phase ensures that the frontend and backend systems work seamlessly with the blockchain. The smart contract functions are linked to the UI, allowing users to interact directly with the blockchain, whether for authentication, authorization, or data retrieval.
- ◦
Ensuring smooth and responsive communication between the frontend and the smart contracts is key to user satisfaction. The system provides real-time feedback to users, such as confirming successful login or notifying them of failed transactions or security issues.
Testing and Debugging:
- ◦
Extensive user testing is conducted to evaluate the usability of the interface. This includes testing with real users to assess ease of navigation, responsiveness, and the overall user experience. User feedback from this stage is critical to identify pain points and refine the interface.
- ◦
During debugging, any issues identified during testing, such as performance bottlenecks, security vulnerabilities, or user interface bugs, are addressed. The debugging phase also focuses on optimizing the system to ensure a smooth, error-free user experience.
Deployment:
- ◦
Once the interface is developed and tested, it is deployed on a secure and scalable cloud platform, such as AWS or Azure, to ensure accessibility from any device. Cloud deployment enables the system to handle fluctuating user traffic and scale resources as needed.
- ◦
The deployment environment is configured for both security and scalability. Measures such as SSL/TLS encryption are used to protect user data and secure communication between the user interface and the backend services. The cloud infrastructure is also optimized to handle large user loads without compromising performance.
UI Workflow for User Authentication
The user interface workflow for authentication is designed to be secure yet user-friendly. Below are the key steps in the authentication process:
Login Page:
- ◦
Users enter their credentials (such as username and password) to initiate the authentication process. This step ensures that only authorized individuals can access the system.
MFA Verification:
- ◦
After entering their credentials, users are prompted to provide additional authentication factors, such as a One-Time Password (OTP) or biometric verification (e.g., fingerprint, face recognition). This multi-factor authentication (MFA) adds an extra layer of security.
Access Request:
- ◦
Once authenticated, users can submit requests to access specific resources or services within the system. These requests are processed by the smart contracts, which validate the user’s authorization.
Dashboard:
- ◦
Upon successful authentication and authorization, users are directed to a personalized dashboard. The dashboard displays the user’s permissions, access logs, and any pending requests. This dashboard serves as the central hub for all user interactions with the system, providing clear visibility into their access history and ongoing actions.
3.2.7. Prototype Testing and Validation
The final prototype undergoes rigorous testing and validation to ensure its robustness, scalability, security, and overall effectiveness. This multi-phase process involves verifying each component and assessing the system as a whole, ensuring that it meets both technical and user requirements. The testing and validation process is structured as follows:
To assess interoperability, we deployed an extended policy test using Hyperledger Fabric’s CA module and simulated cross-chain identity synchronization via Cosmos-SDK relayer logic. Policy consistency was verified across both Ethereum and Fabric chains under identical role rules, demonstrating seamless multi-cloud access management with no drift.
4. Results and Discussions
This section presents the results obtained from the implementation and evaluation of the proposed smart contract-based authorization and authentication framework for cloud services. The section is organized into several sections, including the performance metrics, security assessment, scalability analysis, usability evaluation, and a comprehensive discussion of the findings. Each section provides detailed tables and values to illustrate the results clearly and comprehensively. The proposed framework’s performance was compared to previous studies to evaluate its efficacy in key metrics such as security, scalability, usability, and efficiency. In terms of security, the framework achieved a 100% success rate in blocking unauthorized access attempts, outperforming prior methods like blockchain-enabled Intrusion Detection Systems (IDS), which primarily enhanced detection but did not ensure prevention. For scalability, the framework maintained an average response time of 80 ms for up to 100 concurrent users, surpassing traditional systems that experience significant latency at similar loads. When tested with over 500 users, however, the response time increased to 200 ms, demonstrating a need for scalability improvements. In the context of usability, the user satisfaction score for the framework was 4.5 out of 5, attributed to its intuitive multi-factor authentication (MFA) interface and real-time access approval process. This contrasts with other frameworks that often sacrifice usability for security enhancements. Regarding efficiency, the system recorded a CPU utilization of 25% and an average memory usage of 1.2 GB, making it resource-efficient compared to existing frameworks that typically consume more computational power for transaction validation. These results illustrate the proposed system’s superiority in mitigating critical security challenges while maintaining operational efficiency and scalability.
4.1. Performance Metrics
The performance of the prototype system was evaluated based on several key metrics: security, scalability, usability, and efficiency. These metrics were assessed through a series of experiments conducted in a controlled environment using a private Ethereum network.
The system’s security was tested against several attack vectors, including unauthorized access, phishing attacks, and brute force attempts. As summarized in
Table 3, the results indicate that the framework effectively prevents unauthorized access (0% success rate) and demonstrates strong resistance to brute force attacks (1% success rate) and phishing (5% success rate). These findings underline the robustness of the proposed framework in mitigating common cloud security threats. The use of blockchain’s immutability and multi-factor authentication (MFA) played a significant role in reducing attack success rates. Compared to traditional systems, which are often vulnerable to such attacks, the framework’s automated enforcement of access control policies proved highly effective. The integration of MFA ensured that even if one authentication factor was compromised, unauthorized access was still blocked. The system’s performance in this regard aligns with or surpasses similar studies in the field, making it a highly reliable security solution for cloud environments.
4.1.1. Security Metrics
The security of the system was tested by simulating various attack vectors such as unauthorized access attempts, phishing attacks, and brute force attacks. The results are summarized in
Table 3 and
Figure 4.
The results indicate a high level of security, with a very low success rate for attacks, as shown in
Figure 5.
4.1.2. Scalability Metrics
Scalability was assessed by measuring the system’s performance under varying loads. The number of concurrent users was gradually increased, and the response time was recorded. The results are shown in
Table 4. Scalability testing focused on the system’s performance under varying user loads. As shown in
Table 4, the average response time remained low (50–120 ms) for up to 100 concurrent users, indicating that the system performs efficiently under moderate loads. However, response times increased significantly for higher loads, reaching 200 ms for 500 concurrent users. This performance suggests that the framework is well suited for small to medium-sized cloud environments but may require optimization or additional resources, such as load balancing or sharding, to handle larger workloads. These findings highlight a key limitation that aligns with challenges noted in prior studies, emphasizing the need for future work to enhance the system’s scalability.
Figure 5 further illustrates the impact of increasing user loads on response times, reinforcing the importance of addressing this limitation.
The system maintains reasonable response times up to 100 concurrent users but shows increased latency at higher loads.
The scalability evaluation results, shown in
Table 4, indicate that the proposed system maintains a low average response time of 50–120 ms under user loads of up to 100 concurrent users, with peak response times remaining within acceptable limits (≤150 ms). However, as the load increases to 500 users, the average response time rises to 200 ms, and the peak latency reaches 300 ms, highlighting performance degradation under high concurrency. To address these limitations, we propose the integration of Layer-2 scaling solutions such as zk-rollups and optimistic rollups, which shift access validation to secondary chains while preserving blockchain security. Furthermore, the use of sharding for parallel access policy execution and off-chain computation using trusted oracles can reduce smart contract bottlenecks. These enhancements would enable the system to scale horizontally and maintain real-time performance in large-scale, high-traffic cloud environments.
4.1.3. Usability Metrics
Usability was evaluated through user surveys and feedback. The users rated various aspects of the system, such as ease of use, interface design, and overall satisfaction. The results are summarized in
Table 5.
The high ratings indicate that users found the system easy to use and were generally satisfied with the interface design.
4.1.4. Efficiency Metrics
Efficiency was measured by analyzing resource consumption and system response times. The results are shown in
Table 6. Efficiency metrics focused on resource utilization and transaction processing times. As shown in
Table 6, the system demonstrated efficient use of resources, with an average CPU usage of 20% and memory usage of 512 MB. Transaction processing times averaged 100 ms, even under high transaction volumes (1000 transactions), indicating that the system is capable of handling real-time operations effectively. These results confirm the framework’s suitability for resource-constrained environments, making it a practical solution for organizations seeking to enhance cloud security without incurring excessive computational costs. Compared to other blockchain-based systems, which often suffer from high resource consumption, the proposed framework offers a more efficient alternative.
The system demonstrates efficient resource utilization and processing times.
4.2. Security Assessment
The security assessment involved a detailed analysis of the system’s resistance to common attack vectors and vulnerabilities. The assessment focused on the robustness of the smart contracts, the integrity of the blockchain records, and the effectiveness of the multi-factor authentication.
Security in the proposed system is proven through multiple layers:
Formal smart contract verification using MythX, Slither, and Oyente to identify vulnerabilities such as reentrancy, integer overflow, and unchecked call returns.
Penetration testing under simulated attacks (brute force, replay, phishing, oracle manipulation) confirmed a 0% success rate for unauthorized access.
Biometric hash collision testing on 10,000 records showed the collision rate <1 × 10−6.
Immutable transaction logs recorded on the Ethereum PoA chain ensure non-repudiation.
To further strengthen the system, we addressed flash loan and oracle manipulation attacks, which are prevalent in decentralized finance but underexplored in cloud security. Flash loan mitigation is handled through time-locked contract logic and minimum collateral enforcement, while oracle attacks are resisted using multiple signed feeds and hash-locked inputs. These safeguards were successfully tested in simulation using adversarial scripts on the Ethereum testnet.
Table 7 lists key vulnerabilities identified using MythX, Slither, and Oyente, along with the mitigation steps implemented. These include fixes for reentrancy, unchecked call returns, and overflow risks to ensure contract security.
4.2.1. Smart Contract Security
The smart contracts were audited for vulnerabilities such as re-entrancy, overflow/underflow, and access control flaws. No critical vulnerabilities were found, and the contracts passed all security checks.
Table 8 presents the results of simulated attacks on the smart contract system. Post-mitigation success rates were reduced to nearly zero for brute force, Sybil, and replay attacks. Response times remained within acceptable limits, and the system resource consumption (CPU and memory) showed resilience, confirming the effectiveness of implemented security controls.
4.2.2. Blockchain Integrity
The bar chart (
Figure 6) presents the distribution of integrity check mechanisms implemented during blockchain validation. Chain consistency checks accounted for the highest count (200), followed by cryptographic hash verification (150), timestamp checks (100), and other custom rules (50). The data reflects the emphasis on maintaining historical ledger accuracy and tamper-proof consistency across nodes.
The pie chart (
Figure 7) visualizes the success rate of various integrity verification techniques. All primary methods—cryptographic hash, timestamp verification, and others—maintained a 25% success share, while chain consistency verification had a slightly lower success rate at 24.9%. These rates suggest near-uniform reliability, with minor variance due to synchronization delays in distributed ledger propagation.
4.2.3. Multi-Factor Authentication Effectiveness
Figure 8 presents a comparative analysis of MFA configurations based on their success and failure rates. The bar chart on the left demonstrates that the Password + OTP method yielded the highest success rate, with 95 successful out of 100 attempts, followed by Biometric + OTP (90 successes) and Password + Biometric (85 successes). Failures were primarily observed in the latter method, likely due to biometric mismatches or sensor errors. The pie chart on the right highlights the proportional success contribution of each method, with Password + OTP leading at 35.2%. These results emphasize the practical reliability of OTP-based combinations and support their adoption in high-assurance authentication systems.
Detailed Analysis of Attack Outcomes
The brute force attack success rate (1%) was due to a specific scenario where weak passwords were not blacklisted and a simulated attacker was able to guess a credential in fewer than 2000 attempts. This highlights the importance of implementing password entropy policies and account lockout mechanisms, which will be integrated in future versions.
In phishing simulations, 5 out of 100 attempts succeeded when users unknowingly submitted their second authentication factor to a spoofed frontend. While MFA blocked final access, the UI failed to alert users early enough. This points to a lack of phishing awareness cues, which will be addressed via UI warnings and training modules. All other attacks (e.g., replay, reentrancy, and token reuse) were successfully blocked due to the smart contract’s stateful validation logic and hash-based session checks.
4.2.4. Flash Loan and Oracle Attack Mitigation
We evaluated the framework against high-risk DeFi-related threats, notably, flash loan and oracle manipulation attacks. Flash loans can be exploited to temporarily acquire large token volumes and manipulate contract states. Our system mitigates this risk by enforcing temporal constraints and minimum collateral requirements in contract logic. For oracle attacks, we employ hash-locked inputs and multiple oracle feeds to prevent single-point failure or data tampering. Future versions will integrate Chainlink or Band Protocol for secure off-chain data feeds.
4.3. Scalability Analysis
The scalability analysis focused on the system’s ability to handle increasing loads without significant degradation in performance. The results indicate that the system can support up to 100 concurrent users with minimal impact on response times. However, beyond this threshold, the response times increase significantly, suggesting a need for optimization or additional resources to support higher loads, as shown in
Figure 9.
We acknowledge that at 500 concurrent users, latency reaches 200 ms, which may exceed real-time cloud SLAs. To mitigate this, future work will implement state channels, sharding, and off-chain computation layers (e.g., Layer-2 Ethereum) to improve throughput. A gas fee fluctuation simulation will also be conducted using a live transaction history to evaluate its impact on high-load consistency.
Although the framework performs efficiently under moderate loads (≤100 users), latency increases beyond this point. To address this, we propose the future integration of Layer-2 scaling solutions such as optimistic rollups or zk-rollups to offload transactions from the main chain. Additionally, sharding strategies can be applied to parallelize access control processing, and state channels may be explored to reduce on-chain interactions. Off-chain computation using trusted oracles can also improve response times in high-concurrency environments.
4.4. Usability Evaluation
The usability evaluation was based on feedback from a group of 50 users who interacted with the system over a period of one week. Users found the interface intuitive and appreciated the seamless integration of multi-factor authentication. Some users suggested improvements in the layout of certain elements to enhance the user experience further, as shown in
Figure 10.
Usability was assessed through user surveys and feedback, with results summarized in
Table 5. The system received high ratings for ease of use (4.5/5), interface design (4.2/5), and overall satisfaction (4.4/5). Users appreciated the intuitive interface and the seamless integration of MFA, which enhanced their sense of security without compromising convenience. While the feedback was generally positive, some users suggested minor improvements to the interface layout to enhance the overall user experience further. These suggestions indicate that while the system meets usability expectations, there is room for refinement. Compared to traditional systems, which often prioritize security at the expense of usability, the proposed framework strikes a balance that is well received by users.
Figure 10 visualizes the usability evaluation results, highlighting the system’s strengths and areas for improvement.
The usability study was conducted with 50 participants to assess the system’s accessibility, interface clarity, and overall user experience. These participants included 30 cloud service administrators from private sector organizations, 10 graduate-level computer science students who had completed coursework in cloud computing, and 10 professional software testers experienced in identity and access management (IAM) systems. All participants possessed at least a basic working knowledge of cloud platforms such as AWS or Microsoft Azure and were familiar with standard authentication processes. This diverse composition ensured the evaluation reflected both technical and semi-technical user perspectives, providing a balanced assessment of system usability under real-world operating conditions.
Pre- and post-use surveys were collected using a 5-point Likert scale. Key feedback included improved perception of transparency and ease of access. See
Figure 10 for average ratings by category.
4.5. Efficiency Evaluation
Efficiency was measured in terms of resource utilization and transaction processing times. The system demonstrated efficient use of CPU and memory resources, with average CPU usage at 20% and memory usage at 512 MB. The average transaction processing time was 100 ms, indicating that the system can handle a high volume of transactions efficiently, as shown in
Figure 11.
4.6. Simulation-Based Performance Evaluation
This section presents a detailed performance analysis of the proposed system using a Geth-based private Ethereum testbed. Simulations were conducted with user loads ranging from 10 to 1000 concurrent users under varying operational and configuration settings.
4.6.1. Authentication Latency vs. Number of Users
To assess system responsiveness under load, we measured average authentication latency as the number of concurrent users increased. Results show that latency scales gradually with user load:
The results in
Table 9 indicate the system remains performant up to 100 users with sub-150 ms latency. Beyond this, performance degrades non-linearly, signaling the need for load optimization strategies such as sharding or caching.
Figure 12 shows how authentication latency increases with the number of concurrent users. Latency remains low (≤132 ms) for up to 100 users but rises sharply beyond that, reaching 248 ms at 1000 users—indicating the need for load balancing at scale.
4.6.2. Smart Contract Execution Time
Each smart contract function was profiled using Hardhat for average execution time (
Table 10).
The average execution time across functions was approximately 97 ms, demonstrating acceptable transaction-level performance.
The chart (
Figure 13) visualizes the average execution time of core smart contract functions. All functions complete within ~100 ms, with authenticateUser() being the fastest at 92 ms, demonstrating the system’s suitability for real-time applications.
4.6.3. Gas Cost Analysis
Using Remix and Hardhat’s gas profiler, we computed gas usage per core operation (
Table 11).
These costs are within standard ranges for Solidity-based access control systems. Optimization with batch transactions or off-chain logic could reduce consumption further.
This plot (
Figure 14) compares gas costs across login, logout, and access request functions. Access request consumes the most gas (~52,000 units), followed by login, while logout is the most efficient operation.
4.6.4. Transaction Throughput
Throughput, measured as transactions per second (TPS), varied with user load (
Table 12).
The system maintained 18 TPS under normal load (50 users) but degraded under stress, emphasizing scalability as an area for future enhancement.
Throughput declines as the user load increases. The system achieves 22 TPS at 10 users but drops to 7 TPS at 1000 users (
Figure 15). This trend highlights the scalability limitations under high concurrency and suggests the need for optimization.
4.6.5. Block Size and Transaction Size Impact
We evaluated how increasing block and transaction sizes affected performance (
Table 13).
Larger blocks introduced network propagation delays, resulting in 23% performance degradation at 2 MB. Efficient transaction packaging is critical for preserving throughput.
This dual-axis graph (
Figure 16) shows that larger block sizes (up to 2 MB) increase the average commit time from 5.1 s to 7.8 s while reducing TPS performance by up to 23%. Optimal block sizing is necessary to balance performance and efficiency.
4.7. Comparative Evaluation
To evaluate the performance of the proposed framework under realistic cloud access conditions, we conducted benchmark testing using the Ropsten Ethereum testnet. The evaluation setup involved simulating user access requests using a custom Python 3.9 load generator integrated with Web3.py, targeting smart contracts deployed on a local blockchain gateway connected to Amazon EC2-based cloud services.
The framework was benchmarked against three state-of-the-art blockchain-based IAM systems: Khalil et al. [
1], Nguyen et al. [
18], and Zhang et al. [
17]. As shown in
Table 14, our method outperforms them in latency (97 ms vs. 221/143/185 ms), throughput (18 TPS vs. 6/10/11), and coverage of MFA + RBAC. These results were derived using the same Ropsten testnet and identical load generation scripts for fair comparison.
All systems were tested under identical network conditions with concurrent access by 500 simulated users. Key metrics included latency, transaction throughput, authentication success rate, and support for key architectural features (MFA, RBAC, audit logs, real-time revocation).
Table 14 compares the proposed framework with three recent approaches. It shows significantly lower latency (97 ms) and higher throughput (18 TPS), along with stronger security via MFA and RBAC. The system also ensures full decentralization, outperforming prior models that rely on limited or single-factor mechanisms. To benchmark our framework, we compared it against three recent smart contract-based IAM systems under identical Ropsten testnet conditions, using the same access load generator for fair comparison.
4.8. Discussions
The results of the experiments and evaluations demonstrate that the proposed smart contract-based framework for cloud security is effective, secure, and user-friendly. The detailed analysis of security metrics shows that the system is highly resistant to common attack vectors, providing robust protection against unauthorized access and other security threats.
The scalability analysis highlights the system’s capacity to handle moderate loads efficiently, with the potential for optimization to support higher loads. The usability evaluation confirms that users find the system easy to use and are generally satisfied with the interface design.
The efficiency evaluation shows that the system makes good use of available resources and can process a large number of transactions quickly. These results suggest that the proposed framework can significantly enhance the security of cloud services without compromising performance or user experience.
To enhance the overall clarity and analytical depth of the system evaluation, the results have been systematically structured into distinct subsections (
Section 4.1,
Section 4.2,
Section 4.3,
Section 4.4 and
Section 4.5), each dedicated to a specific performance dimension: security, scalability, usability, and efficiency. Each subsection presents detailed quantitative findings, comparative performance benchmarks, and contextual analysis to substantiate the outcomes. For instance, the scalability assessment reveals a consistent response time up to 100 concurrent users, followed by a marked non-linear increase beyond this threshold—indicating a need for architectural improvements such as horizontal scaling or load balancing. The security evaluation offers a comprehensive breakdown of attack vectors, highlighting the system’s resilience and providing explanations for any partial breaches. These refinements contribute to a more coherent presentation of results and reinforce the validity of the framework’s practical implications in real-world cloud environments.
In conclusion, the prototype system demonstrates the feasibility and effectiveness of using smart contracts and blockchain technology to improve authorization and authentication in cloud services. The findings from this section provide a strong foundation for further research and development in this area, paving the way for more secure and reliable cloud computing environments.
The proposed work demonstrates significant improvements compared to existing studies in cloud security and blockchain-based solutions. Several prior works have explored blockchain’s potential in cloud environments, such as leveraging smart contracts for secure access control and data integrity. For instance, Khalil et al. [
1] investigated blockchain-based authentication for IoT devices, highlighting its ability to enhance security, but noted scalability challenges in high-load scenarios. Similarly, Nguyen et al. [
2] discussed the integration of blockchain with cloud computing but faced interoperability issues across heterogeneous platforms. Ananthakrishna and Yadav [
3] proposed hybrid encryption techniques to enhance scalability, but the lack of real-time authorization mechanisms limited its practical application. Other studies, such as that by Pasqua et al. [
4], emphasized the use of static analysis for Ethereum smart contracts, focusing on vulnerability detection rather than overall cloud security. Additionally, work by Zhang et al. [
5] demonstrated blockchain-based frameworks for secure data sharing but did not address multi-factor authentication. In contrast, the proposed system integrates smart contracts with multi-factor authentication, achieving robust security while ensuring scalability and usability. A comprehensive approach addresses the limitations highlighted in prior studies, including interoperability, real-time processing, and usability, thus providing a novel and effective solution for cloud environments.
5. Future Work and Research Challenges
The proposed blockchain-driven smart contract framework establishes a secure and scalable foundation for cloud-based access control. However, there are several promising directions for future enhancement and exploration:
5.1. Cross-Chain Interoperability
To ensure broader applicability across heterogeneous blockchain environments, the system can be extended to support cross-chain communication. Platforms such as Polkadot, Cosmos, and Chainlink CCIP can facilitate secure message passing and asset exchange between different chains. This would allow decentralized access control to operate seamlessly across multiple infrastructure providers, thereby enhancing flexibility and reducing vendor lock-in.
5.2. Integration of Decentralized Identity (DID)
Incorporating decentralized identity (DID) frameworks (e.g., uPort, Sovrin, Veres One) can shift access authentication from centralized user accounts to self-sovereign identity models [
41]. This would allow users to control their credentials and selectively disclose attributes using verifiable credentials. Combining DID with smart contract-based MFA mechanisms could enable robust, privacy-preserving access control in compliance with modern digital identity standards (e.g., W3C DID, Verifiable Credentials).
5.3. Automated Smart Contract Verification
To further strengthen the trustworthiness of deployed contracts, the system should leverage automated formal verification tools. Solutions such as Certora Proverb [
38], Securify [
39], Slither [
35], and Mythril [
40] allow for static and symbolic analysis of smart contract behavior to identify vulnerabilities like integer overflow, reentrancy, and access control bypass. Regular contract audits and integration with CI/CD pipelines for verification before deployment can drastically reduce the attack surface.
5.4. Scalability Optimization and Edge Integration
As user loads increase, additional work is needed to optimize scalability through layer-2 solutions, such as Rollups, or sidechains for handling high transaction volumes. Moreover, integrating this access control model with edge computing environments could enable localized, low-latency security for IoT and real-time systems, which remains a largely unexplored challenge.
5.5. Regulatory Compliance and Legal Alignment
Future versions of the framework must consider compliance with data protection laws such as GDPR, CCPA, and HIPAA. This involves designing privacy-by-default mechanisms, secure audit trails, and user consent models within smart contracts. Developing legally aligned smart contracts that can be updated with regulatory changes is a pressing challenge for real-world deployment.
6. Conclusions
This study introduced a blockchain-based access control framework that integrates smart contracts with Multi-Factor Authentication (MFA) to address security, scalability, and usability challenges in cloud environments. The proposed framework utilizes the decentralized and tamper-proof nature of blockchain to enforce transparent, automated access policies while maintaining user accountability. Security evaluation confirmed strong resistance to unauthorized access, phishing, and brute force attacks. Usability assessments showed high user satisfaction, driven by the seamless integration of MFA and an intuitive interface. Performance results demonstrated that the system maintains low latency and efficient resource utilization under moderate traffic conditions. However, a decline in performance under high user concurrency highlights the need for future scalability enhancements. This work also reinforces the broader applicability of blockchain beyond cryptocurrencies, emphasizing its role in developing secure and auditable cloud-native solutions. By aligning decentralized policy enforcement with user-centric authentication models, the framework delivers both robustness and usability—two key priorities in modern cloud security design. Future research will focus on integrating sharding, load balancing, and off-chain processing to improve scalability. Additional improvements may include adaptive authentication mechanisms and real-time anomaly detection to further enhance system resilience. Overall, the study establishes a solid foundation for adopting blockchain-based access control in real-world cloud infrastructures.