Towards Enhancing Privacy Preservation in Cloud Based Applications: A Hybrid Approach using Bloom Filters and Blockchain PKI for Secure Multi Party Collaboration

Abstract

Preserving privacy in cloud-based apps is a significant issue, especially in multi-party collaborations, where data security, authentication, and effective administration are essential. This study presents a hybrid paradigm that integrates Bloom Filters with Blockchain Public Key Infrastructure to improve data privacy and security. Bloom Filters facilitate effective data validation with little processing resources, whilst Blockchain PKI guarantees decentralized and tamper-resistant authentication. This method resolves current deficiencies in scalability, computing efficiency, and robustness, presenting prospective applications in sectors such as education, healthcare, and IoT. The advantages, obstacles, and constraints are examined to offer a conceptual comprehension of the suggested method.

Country : India

1 Ami Choksi2 Dr. Ravi Gulati

  1. PhD Scholar, Veer Narmad South Gujarat University, Surat, India
  2. Professor, Veer Narmad South Gujarat University, Surat, India

IRJIET, Volume 10, Issue 1, January 2026 pp. 190-197

doi.org/10.47001/IRJIET/2026.101024

References

  1. Keshk, M., Turnbull, B., Sitnikova, E., Vatsalan, D., & Moustafa, N. (2021). Privacy-preserving schemes for safeguarding heterogeneous data sources in cyber-physical systems. IEEE Access, 9, 55077-55097.
  2. Tran, Q. N., Turnbull, B. P., Wu, H. T., De Silva, A. J. S., Kormusheva, K., & Hu, J. (2021). A survey on privacy-preserving blockchain systems (PPBS) and a novel PPBS-based framework for smart agriculture. IEEE Open Journal of the Computer Society, 2, 72-84.
  3. Feng, X., Cui, K., Wang, L., Liu, Z., & Ma, J. (2024). PBAG: A Privacy-Preserving Blockchain-Based Authentication Protocol With Global-Updated Commitment in IoVs. IEEE Transactions on Intelligent Transportation Systems.
  4. Zhang, J., & Datta, A. (2023). Blockchain-enabled Data Governance for Privacy-Preserved Sharing of Confidential Data. arXiv preprint arXiv:2309.04125.
  5. IZADEEN, G. Y., ABDULLAH, N. A. M., RASHID, Z. N., JGHEF, Y. S., SAMI, T. M. G., & ABDULNABI, N. L. PRIVACY PRESERVATION IN: INFORMATION, WEB TECHNOLOGY, SEMANTIC WEB, PARALLEL AND CLOUD COMPUTING.
  6. Hameed, K., Barika, M., Garg, S., Amin, M. B., & Kang, B. (2022). A taxonomy study on securing Blockchain-based Industrial applications: An overview, application perspectives, requirements, attacks, countermeasures, and open issues. Journal of Industrial Information Integration, 26, 100312.
  7. Khan, S., Luo, F., Zhang, Z., Ullah, F., Amin, F., Qadri, S. F., ... & Wu, K. (2023). A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies. IEEE Communications Surveys & Tutorials.
  8. Honar Pajooh, H., Rashid, M., Alam, F., & Demidenko, S. (2021). Multi-layer blockchain-based security architecture for internet of things. Sensors, 21(3), 772.
  9. Khan, K., Nisha, S. S., & Sathik, M. M. (2021). Secure and efficient retrieval of video file using bloom filter and hybrid encryption algorithms. J. Math. Comput. Sci., 11(5), 5525-5535.
  10. Khedr, W. I. (2020). A novel Bloom-filter-based scheme for secure text ownership protection. Wireless Networks, 26, 3831-3845.
  11. Nakamoto, S., & Bitcoin, A. (2008). A peer-to-peer electronic cash system. Bitcoin.–URL: https://bitcoin. org/bitcoin. pdf, 4(2), 15.
  12. Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017, June). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress) (pp. 557-564). Ieee.
  13. Viriyasitavat, W., Da Xu, L., Bi, Z., & Hoonsopon, D. (2019). Blockchain technology for applications in internet of things—mapping from system design perspective. IEEE Internet of Things Journal, 6(5), 8155-8168.
  14. Guo, Y., Zhang, C., Wang, C., & Jia, X. (2022). Towards public verifiable and forward-privacy encrypted search by using blockchain. IEEE Transactions on Dependable and Secure Computing, 20(3), 2111-2126.
  15. Liang, X., Zhao, J., Shetty, S., & Li, D. (2017, October). Towards data assurance and resilience in IoT using blockchain. In MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM) (pp. 261-266). IEEE.
  16. Yuan, Y., & Wang, F. Y. (2016). Blockchain: the state of the art and future trends. Acta automatica sinica, 42(4), 481-494.
  17. Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE access, 4, 2292-2303.
  18. Shafagh, H., Hithnawi, A., Burkhalter, L., Fischli, P., & Duquennoy, S. (2017, November). Secure sharing of partially homomorphic encrypted IoT data. In Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems (pp. 1-14).
  19. Conti, M., Kumar, E. S., Lal, C., & Ruj, S. (2018). A survey on security and privacy issues of bitcoin. IEEE communications surveys & tutorials, 20(4), 3416-3452.
  20. Di Luzio, A., Mei, A., & Stefa, J. (2017, June). Consensus robustness and transaction de-anonymization in the ripple currency exchange system. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (pp. 140-150). IEEE.
  21. Benet, J. (2014). Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561.
  22. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Advances in Cryptology: Proceedings of CRYPTO 84 4 (pp. 47-53). Springer Berlin Heidelberg.
  23. Merkle, R. C. (2019). Protocols for public key cryptosystems. In Secure communications and asymmetric cryptosystems (pp. 73-104). Routledge.
  24. Fan, K., Ren, Y., Wang, Y., Li, H., & Yang, Y. (2018). Blockchain‐based efficient privacy preserving and data sharing scheme of content‐centric network in 5G. IET communications, 12(5), 527-532.
  25. Zyskind, G., & Nathan, O. (2015, May). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE security and privacy workshops (pp. 180-184). IEEE.
  26. Esposito, C., De Santis, A., Tortora, G., Chang, H., & Choo, K. K. R. (2018). Blockchain: A panacea for healthcare cloud-based data security and privacy?. IEEE cloud computing, 5(1), 31-37.
  27. Nakamoto, S. (2008). Bitcoin P2P e-cash paper. The Cryptography Mailing List. Nakamoto Institute.
  28. Buterin, V. (2014). A next-generation smart contract and decentralized application platform. White paper, 3(37), 2-1.
  29. Mettler, M. (2016, September). Blockchain technology in healthcare: The revolution starts here. In 2016 IEEE 18th international conference on e-health networking, applications and services (Healthcom) (pp. 1-3). IEEE.
  30. Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2020). A survey on the security of blockchain systems. Future generation computer systems, 107, 841-853.
  31. Kim, H. M., & Laskowski, M. (2018). Toward an ontology‐driven blockchain design for supply‐chain provenance. Intelligent Systems in Accounting, Finance and Management, 25(1), 18-27.
  32. Sun, S., Du, R., Chen, S., & Li, W. (2021). Blockchain-based IoT access control system: towards security, lightweight, and cross-domain. IEEE Access, 9, 36868-36878.
  33. Chen, L., Lee, W. K., Chang, C. C., Choo, K. K. R., & Zhang, N. (2019). Blockchain based searchable encryption for electronic health record sharing. Future generation computer systems, 95, 420-429.
  34. Yue, D., Li, R., Zhang, Y., Tian, W., & Peng, C. (2018, December). Blockchain based data integrity verification in P2P cloud storage. In 2018 IEEE 24th international conference on parallel and distributed systems (ICPADS) (pp. 561-568). IEEE.