Security Challenges and Performance Trade-Offs in On-Chain and Off-Chain Blockchain Storage: A Comprehensive Review
Abstract
:1. Introduction
1.1. On-Chain and Off-Chain Data Storage Paradigms
1.2. The Role of Blockchain Technology in Secure Data Management of Data Storage
1.3. Objectives and Structure of the Study
1.4. Contributions
- Comparative Analysis of Blockchain Data Storage Methods: On-chain, off-chain, and hybrid data storage methods have been systematically compared in terms of security, cost, scalability, and performance. This comparative framework provides an in-depth analysis of security trade-offs, filling a critical gap in the literature. Additionally, the study offers insights into the scalability and cost efficiency challenges in blockchain storage solutions.
- Security, Performance, and Industry-Specific Applicability of Hybrid Approaches: Hybrid storage solutions, combining the strengths of on-chain and off-chain methods, have been analyzed in detail regarding their security, performance, and cost implications. Their applicability in high-security and flexible environments, such as healthcare, finance, and the Internet of Things (IoT) industries, has been specifically examined.
- Comparative Analysis of Cryptographic Security Mechanisms and Guidelines for Blockchain Integration: Blockchain storage methods are evaluated based on encryption, access control, and data integrity. This study explores how hashing mechanisms ensure data integrity and how access control models (e.g., RBAC, ABAC) mitigate security vulnerabilities in sector-specific applications. It also examines the role of Zero-Knowledge Proofs (ZKP) and Homomorphic Encryption in enhancing blockchain-based storage security. Furthermore, blockchain-integrated solutions like IPFS, Swarm, and Blockweave are analyzed for their security and scalability. This work provides a novel perspective on addressing data security and efficiency challenges in blockchain storage.
- Methodological Recommendations for Sector-Specific Security Requirements: The applicability of blockchain storage solutions across various industries has been analyzed by considering the security and scalability requirements of different sectors. The study identifies the appropriate selection criteria for on-chain, off-chain, and hybrid storage solutions based on sector-specific constraints. Additionally, the integration of authentication, access control, and encryption techniques with blockchain has been systematically evaluated.
- Analysis of Decentralized Blockchain-Based Data Storage Systems: The technical infrastructure, use cases, and security mechanisms of decentralized blockchain-based data storage projects, including Filecoin, Arweave, Swarm, Sia, Ankr, and Storj, have been compared in detail. Their advantages in terms of data integrity, access control, and scalability have been thoroughly examined.
- Systematic Classification of Blockchain Data Storage Methods: This study presents a structured classification framework that evaluates the advantages, disadvantages, and industry-specific use cases of on-chain, off-chain, and hybrid storage models. By utilizing visualization tools such as tables and diagrams, the relationships between different storage methods and their implications for security and performance are clearly demonstrated. This framework serves as a valuable reference for academic research and contributes to existing literature on blockchain storage methodologies.
- Future Perspectives on Blockchain-Based Data Storage Solutions: The study provides a comprehensive assessment of the limitations of current blockchain-based data storage solutions and explores potential future advancements in the field. Scenarios in which hybrid storage solutions could gain broader adoption are discussed, along with strategies for optimizing security, scalability, and cost efficiency. This study provides a theoretical and practical basis for future blockchain storage research.
1.5. Methodology
- Selection of Literature and Data Sources: The literature review used leading scientific databases such as IEEE Xplore, Elsevier ScienceDirect, MDPI, Wiley, Taylor & Francis, and Springer. However, no particular publisher was given priority, and the selection was made based on the content compatibility, contribution to the subject, and up-to-dateness of the studies.
- Publication Year Criteria: Instead of setting a specific year range in the selection of articles, emphasis was placed on recent studies, but basic studies on the subject were also included. In this way, articles considered basic in the literature were also evaluated along with current research trends. In the review process, studies that would provide a comparative evaluation of blockchain data storage solutions in terms of security, scalability, and cost were particularly preferred. In order for the selected references to represent our research scope, it was taken into consideration that they included experimental studies, theoretical frameworks and case studies on different data storage methods.
- Search Method: The literature review process has been carried out with keyword-based searches and key terms such as “blockchain storage”, “on-chain vs. off-chain”, “hybrid blockchain models”, “Layer-2 scalability”, “blockchain data security”, “distributed ledger storage models”, “blockchain cryptographic techniques”, and “blockchain storage in healthcare and finance” have been used. These keywords provided focus on the subject and allowed the inclusion of new trends in the literature.
- Comparative Analysis of On-chain and Off-chain Methods: To establish a solid foundation for the study, a conceptual analysis of on-chain and off-chain storage methods has been conducted in the initial phase. This comparative assessment has facilitated a deeper understanding of the trade-offs involved in different data storage approaches. The study begins with a detailed analysis of on-chain and off-chain data storage methods:
- The advantages and disadvantages of both methods have been identified and analyzed based on performance, cost, scalability, and data security;
- These insights have contributed to a clearer evaluation of their suitability for different use cases, ultimately supporting the examination of hybrid solutions.
- Security Assessment in Blockchain Data Storage Systems: In this study, various security-related parameters have been systematically examined to assess their implications for blockchain data storage. This evaluation includes the following:
- Symmetric and asymmetric encryption techniques and their impact on data privacy;
- RBAC and ABAC access control models, comparing their suitability for various applications;
- Hash-based data integrity mechanisms and their effectiveness in preventing security vulnerabilities.
- Sectoral Applications of Blockchain Storage Solutions: In the later stages of the study, the sectoral applicability of blockchain storage solutions has been analyzed. Given the increasing adoption of blockchain technology across different industries, the study particularly evaluates the following:
- The use of on-chain, off-chain, and hybrid solutions in key sectors, including healthcare, finance, education, and public administration;
- The potential of hybrid approaches in optimizing the balance between security and performance, ensuring practical applicability in real-world scenarios.
- Performance Metrics and Layer-2 Solutions: To address scalability concerns, Layer-2 solutions have been analyzed as an alternative to enhance blockchain efficiency. Specifically, the study has examined the following:
- Transaction speed, evaluating the processing efficiency of different storage approaches;
- Storage cost, comparing economic feasibility across on-chain, off-chain, and hybrid methods.
- 8.
- Systematic Presentation of Findings: To ensure clarity and accessibility, the findings of the study have been systematically visualized using tables and diagrams.
- On-chain, off-chain, and hybrid storage methods have been comprehensively compared in terms of security, scalability, and cost efficiency.
- The comparative analysis has been structured to highlight key advantages and limitations of each approach, supporting future research directions in blockchain-based storage.
2. Blockchain-Based Data Storage Methods: On-Chain, Off-Chain, and Hybrid Approaches
2.1. On-Chain Data Storage Methods
- Block Header: Contains the unique hash value that identifies the block and maintains the integrity of the chain by referencing the previous block’s hash. The timestamp records the time the block was created, while the Merkle root serves as a cryptographic summary that ensures the integrity of all transactions within the block;
- Transaction Data: Represents the primary data component stored within the block, including sender and receiver addresses, transaction amounts, and additional metadata. Transactions are structured in a Merkle tree, allowing them to be efficiently hashed and verified;
- Block Metadata: Includes the nonce value, which is used in the Proof-of-Work (PoW) mechanism to find the correct hash, and the block size, which defines the total amount of data stored within the block.
2.1.1. Blockchain Database Structures
- Merkle Tree: A hash-based structure used to verify the integrity of transaction data. It is widely utilized in blockchain networks such as Bitcoin [21] and Ethereum [74] to enable fast and reliable transaction verification. While Merkle trees ensure data integrity, they have limitations when handling complex data structures. Besides maintaining data integrity, enhancing blockchain scalability is equally critical.
- Sharding: A technique that partitions blockchain data into smaller fragments, reducing network load and improving transaction throughput. This approach is particularly advantageous for high-transaction-volume networks, as it enables parallel processing across shards. While sharding enhances scalability, it also requires additional security measures to prevent data vulnerabilities [17,18,22].
2.1.2. Smart Contract Based Data Storage
- Smart Contract Data Storage: Stores small-sized data directly on the blockchain and is commonly used for NFT metadata, ERC-20 token information, and similar applications. While it provides security and decentralization, it incurs high transaction costs and is not suitable for large-scale data storage [60,61].
2.1.3. Blockchain Based Techniques
- Blockweave: A blockchain structure developed by the Arweave platform, designed for long-term data storage. It enables low-cost permanent data storage, but data cannot be modified, and storage costs remain relatively high [64,65,66]. In addition to permanent data storage, the use of transaction-related metadata in blockchain improves data management and provides supplementary on-chain information.
2.1.4. Logs and Transaction Data
- Blockchain Logs: Used as event logs in networks like Ethereum, they record smart contract events, providing transparency and traceability for decentralized applications (DApps). They enhance usability in DApp development and facilitate debugging for developers. However, scalability challenges may arise when dealing with large datasets [71,72,73].
2.2. Off-Chain Data Storage Methods
- Centralized Storage Systems: These involve storing data in large data centers, typically managed by commercial providers such as Amazon Web Services (AWS), Google Cloud Platform, or Microsoft Azure [42,43]. Centralized storage solutions offer high-speed access, reliability, and extensive service options. However, dependence on a central authority can limit data control, creating a single point of failure, which raises concerns about data security and continuity [15,46].
- Decentralized Storage Systems: Aligned with blockchain’s decentralization principle, these systems store data distributed across multiple nodes. P2P-based storage operates on a network where data are shared among users and is commonly represented by technologies such as IPFS [77,78], Swarm, Storj [79], and Sia [80]. These solutions eliminate reliance on centralized servers, offering benefits such as lower costs and enhanced security. However, factors like data persistence and network performance depend on active user participation, making long-term sustainability a key consideration.
2.2.1. Centralized Data Storage Systems
- Cloud Storage Systems: Cloud systems facilitate the storage of data in large-scale data centers, typically managed by a centralized authority. Leading cloud providers such as Amazon Web Services (AWS), Google Cloud Platform, and Microsoft Azure are key examples of this infrastructure. These systems provide fast access, high performance, and seamless integration with a broad range of services. They excel in reliability and scalability. However, dependence on a central entity limits data control, leading to higher costs and external security risks. Additionally, a centralized structure introduces a single point of failure, posing a risk to data continuity and security [82].
2.2.2. Decentralized Systems (P2P)
- Off-chain Data Storage with IPFS: The InterPlanetary File System (IPFS) is a content-addressable data storage protocol that operates on a decentralized network. Data are addressed based on its content and is shared across all nodes in the network. It provides a low-cost and secure data storage solution. However, data availability depends on the active participation of network users. More specifically, IPFS offers a decentralized file storage system that addresses blockchain scalability challenges. Storing large datasets directly on-chain is often costly and inefficient. To mitigate this issue, IPFS enables off-chain storage by maintaining data separately from the blockchain while storing only hash values on-chain. This approach ensures data integrity while significantly reducing storage costs [10,48,78].
- Off-chain Data Storage with Filecoin: Filecoin is a blockchain-based storage solution that utilizes the IPFS infrastructure to facilitate off-chain data storage. In this system, data contracts are stored on the blockchain, while the actual data are distributed across the IPFS network. Filecoin offers a decentralized architecture while ensuring verifiability of stored data. However, high transaction costs remain a limitation, as users must pay fees for data storage operations on the network.
- Off-chain Data Storage with Swarm: Swarm is an Ethereum-based P2P data storage protocol designed to store large datasets off-chain in a decentralized manner. It fragments and distributes data across network nodes, ensuring security and scalability. Fully integrated with the Ethereum ecosystem, Swarm enables secure storage of large files, while encryption mechanisms protect data confidentiality. It provides ease of access and flexibility, although performance limitations may arise due to network constraints [87].
- Off-chain Data Storage with Storj: Storj is a P2P-based decentralized cloud storage solution that allows users to rent out unused storage space, contributing to the network. Data are encrypted, fragmented into smaller pieces, and distributed across multiple nodes, minimizing the risk of data loss. With a strong security infrastructure, Storj ensures data traceability and verifiability through blockchain integration. However, coordination challenges among network participants may arise [88].
- Off-chain Data Storage with Sia: Sia is a blockchain-based data storage platform that enables users to rent storage space via a decentralized marketplace. It offers a low-cost, encryption-supported model that enhances data security. Data are sharded into smaller fragments and stored across multiple providers, with access restricted to the user’s private key. Additionally, smart contracts facilitate secure agreements between storage providers and users. However, compared to traditional cloud storage solutions, Sia presents scalability and usability challenges [80].
2.3. Hybrid Storage Approaches
2.3.1. Blockchain and Off-Chain Integration Approaches
2.3.2. Distributed and Decentralized Cloud Solutions
- Hybrid Cloud + Blockchain: Hybrid cloud models are integrated with blockchain to facilitate data storage within an extensive infrastructure. This approach leverages the advantages of traditional cloud services while benefiting from blockchain’s security features. However, data security depends on third-party providers, introducing certain risks [42,93].
- Lightning Network: The Lightning Network is a protocol that combines blockchain with off-chain transactions, enabling fast and low-cost microtransactions. Transactions occur off-chain, while only summary data are recorded on the blockchain. However, the Lightning Network is not suitable for managing large datasets, as it is primarily designed for microtransaction processing [94].
2.3.3. Layer-2 Optimizations
2.4. Practical Integration of On-Chain, Off-Chain, and Hybrid Blockchain Storage Approaches
2.5. Future Development Potential of Blockchain-Based Data Storage Systems
3. Security Implications and Fundamental Approaches of Blockchain-Based Data Storage Methods
3.1. Data Security and Encryption Methods
3.2. The Role of Cryptographic Methods in Blockchain-Based Data Storage Systems
3.2.1. Asymmetric Encryption
3.2.2. Symmetric Encryption
3.2.3. Zero-Knowledge Proof (ZKP)
3.2.4. Homomorphic Encryption
3.2.5. Blockchain Hashing
3.2.6. Threshold Cryptography
3.2.7. Multi-Party Computation (MPC)
3.2.8. Post-Quantum Cryptography
3.2.9. Security vs. Performance Trade-Offs in Cryptographic Techniques
- Offers strong security but incurs high computational overhead due to modular exponentiation.
- Slower than symmetric encryption, making it less suitable for large-scale transactions.
- Designed for speed and efficiency, offering high security with low processing costs.
- Used extensively for secure storage and fast encrypted communication.
- Provide privacy-preserving authentication but require significant computation.
- Proof generation and verification are resource intensive, slowing down transactions.
- Enables computations on encrypted data, offering maximum security.
- Extremely high resource consumption makes it impractical for large-scale blockchain storage.
- Lightweight and efficient, designed for rapid data integrity verification.
- Low computational overhead, making it ideal for blockchain transaction verification.
3.3. Authentication Methods
Decentralized Authentication, Applications, and Security Enhancements
3.4. Access Control Mechanisms in Relation to Blockchain Storage Types
3.5. Blockchain-Based Data Integrity and Traceability Solutions
3.5.1. Ensuring High Data Integrity with On-Chain Methods
3.5.2. Balancing Efficiency and Security in Off-Chain Approaches
3.5.3. Achieving Flexibility with Hybrid Storage Solutions
3.6. Sectoral Applications and Perspectives Regarding On-Chain, Off-Chain, and Hybrid Data Storage Methods
Real-World Implementations of Blockchain Storage Solutions
3.7. Blockchain-Based Distributed Data Storage and File Sharing Projects
4. Discussions
4.1. Performance Comparison of Blockchain Data Storage Methods
- Transaction Speed: On-chain data storage has a low transaction speed due to the requirement that all transactions be verified on the blockchain and undergo the mining process [17]. In networks such as Bitcoin and Ethereum, transaction times are inherently constrained by mining mechanisms. In contrast, off-chain solutions significantly improve transaction speed by moving data outside the blockchain [19]. This approach is particularly supported by Layer-2 solutions such as the Lightning Network [22]. Hybrid methods, on the other hand, enhance security by keeping certain data on-chain while storing large volumes of data off-chain, thereby maintaining a balance in terms of speed.
- Scalability: On-chain data storage offers low scalability due to block size limitations and network congestion [18]. Off-chain solutions provide higher scalability by storing data outside the blockchain, as they are not constrained by the blockchain’s transaction capacity [19]. Hybrid solutions create a balanced model by integrating both on-chain and off-chain methods to enhance scalability [97].
- Cost: On-chain data storage is costly due to mining expenses, transaction fees, and block size limitations [12]. In contrast, off-chain solutions are cost-effective since transactions are executed outside the blockchain [15]. Hybrid solutions reduce costs by offloading large volumes of data off-chain while preserving security by storing critical data on-chain, resulting in a moderate cost structure [22].
- Security: On-chain data storage offers the highest level of security due to its distributed ledger structure, which ensures data integrity and immutability [36]. Off-chain solutions, on the other hand, provide lower security levels as data are stored outside the blockchain and often controlled by centralized entities [47]. Hybrid solutions enhance security by leveraging on-chain verification mechanisms while storing the majority of data off-chain to optimize performance [109].
4.2. Integration Challenges in Hybrid Blockchain Data Storage Systems
4.3. Regulatory and Security Evaluation of Blockchain-Based Data Storage Solutions
4.4. Evolution, Future Trends, and Open Research Areas in Blockchain-Based Data Storage
4.4.1. The Emergence of Ethereum and Smart Contracts
4.4.2. The Rise in Off-Chain Data Storage Solutions
4.4.3. Layer-2 Solutions and Hybrid Data Storage Models
4.4.4. Ethereum 2.0, Sharding, and Advanced Hybrid Models
4.4.5. On-Chain AI and Blockchain Integration
- Enhancing Security and Automation: The integration of AI and blockchain is playing an increasingly critical role in improving decision-making processes, detecting fraud, and ensuring data security in decentralized environments. AI models operating with blockchain-based smart contracts enable reliable computations and tamper-resistant data storage.
- Fetch.ai: A system that optimizes logistics, finance, and supply chains using blockchain-based AI agents [188].
- Ocean Protocol: A decentralized data-sharing protocol that allows AI models to train on encrypted datasets [188].
- SingularityNET: A marketplace for AI services that enables commercialization without relying on a central provider [188].
- IBM Watson and Hyperledger Fabric: AI-powered blockchain-based fraud detection models that analyze financial transactions to identify anomalies [159].
- Blockchain and IoT: Securing Smart Devices and Data Exchange: IoT devices generate vast amounts of data, requiring secure, immutable, and decentralized storage. Blockchain integration enhances security by protecting against unauthorized data access and mitigating cyber threats.
- Helium Network: A decentralized IoT connectivity network that enables secure device communication [153];
- IoTeX: Utilizes blockchain-based authentication protocols to ensure encrypted data transmission for IoT devices [190];
- VeChain: Uses IoT sensors to track products in supply chains, securing data with blockchain technology [103];
4.4.6. The Road Ahead for Blockchain Storage: Emerging Paradigms in Edge Computing and the Internet of Everything Era
- On-chain metadata verification for ensuring immutability;
- Off-chain distributed storage systems (e.g., IPFS) for scalable data management;
- Edge storage and processing to enhance performance and minimize response times.
- 2024–2025+: Increased adoption of blockchain-integrated edge computing solutions, especially in smart city infrastructures, industrial automation, and healthcare data systems [194];
- 2026–2028+: Standardization of hybrid storage architectures, where on-chain metadata verification is combined with off-chain and edge computing storage models for enhanced security and scalability [182];
- 2028–2030+: Full deployment of autonomous blockchain-based edge systems, enabling decentralized AI-driven decision making in IoE environments, reducing dependency on centralized cloud infrastructures [195].
4.5. Limitations and Future Works
- Expanding Industry-Specific Implementations: Investigating blockchain storage solutions for IoT-based secure data sharing and continuous authentication, as well as custom blockchain models for satellite communications and space data management [196].
4.5.1. Energy Consumption in Blockchain-Based Storage Systems
- Sustainability Strategies for Blockchain-Based Storage: Several innovative strategies have been proposed to improve the sustainability of blockchain-based data storage solutions:
4.5.2. Limitations of Current Approaches
4.5.3. Regulatory and Compliance Challenges in Blockchain Storage Solutions
4.5.4. Cost, Performance, and Security Comparison with Traditional Storage Solutions
4.5.5. Limitations of Layer-2 Solutions
4.5.6. Future Research Directions
- Future research should explore blockchain-based Continuous Authentication (CA) for IoT systems to enhance security and reduce trust dependencies. The integration of authentication mechanisms such as behavioral biometrics and real-time identity verification can strengthen IoT security models [197]
- Blockchain can be leveraged for secure and decentralized communication networks in satellite-based systems. Customized blockchain frameworks can facilitate secure inter-satellite communications while ensuring data integrity in space networks [196].
4.5.7. The Impact of Quantum Computing on Blockchain Storage Security
- Developing lightweight post-quantum cryptographic techniques that optimize performance while ensuring security.
- Implementing hybrid cryptographic models, integrating post-quantum and classical encryption methods for transition phases.
- Exploring quantum-resistant consensus mechanisms, ensuring blockchain integrity even in post-quantum environments.
5. Conclusions
- Hybrid storage solutions have emerged as a critical approach for balancing security, scalability, and cost efficiency in blockchain-based data management. While on-chain storage ensures data integrity and transparency, its scalability issues remain a bottleneck. Conversely, off-chain storage offers cost efficiency but poses challenges in decentralization and trust management. Hybrid models present a promising trade-off, particularly for use cases that demand both security and high-volume data processing.
- Layer-2 solutions have been identified as a viable method to enhance blockchain storage efficiency. Rollups, state channels, and sidechains demonstrate potential in reducing on-chain storage loads while maintaining security guarantees. However, their adoption across industries remains a challenge due to interoperability constraints and regulatory concerns.
- The security evaluation of blockchain storage mechanisms underscores the importance of cryptographic techniques such as Zero-Knowledge Proofs (ZKP), Homomorphic Encryption, and advanced access control models (RBAC, ABAC). These mechanisms play a crucial role in ensuring data confidentiality and integrity, particularly in sectors like healthcare, finance, and IoT.
- Decentralized storage networks (Filecoin, Arweave, Swarm, Sia, Storj) provide an alternative to traditional blockchain storage by leveraging distributed infrastructures for secure and scalable data management. However, their economic and governance models still require further optimization to achieve broader adoption in enterprise environments.
- Sectoral analysis of blockchain storage applications reveals that healthcare, finance, and IoT industries benefit the most from blockchain’s secure and immutable architecture. However, regulatory frameworks, privacy concerns, and energy consumption challenges remain key barriers to mass adoption.
- Optimizing hybrid blockchain storage models to maximize efficiency and security without compromising decentralization;
- Developing standardized interoperability protocols to enable seamless data exchange between different blockchain networks;
- Enhancing quantum-resistant cryptographic techniques to future-proof blockchain storage against emerging computational threats;
- Evaluating real-world implementation challenges and assessing the economic feasibility of blockchain storage solutions in various industries;
- Addressing regulatory and compliance challenges to facilitate broader adoption of blockchain storage technologies in highly sensitive domains;
- Edge Computing and Internet of Everything (IoE) should be studied for their potential in enhancing blockchain storage scalability and efficiency.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Banitalebi Dehkordi, A. EDBLSD-IIoT: A comprehensive hybrid architecture for enhanced data security, reduced latency, and optimized energy in industrial IoT networks. J. Supercomput. 2025, 81, 359. [Google Scholar] [CrossRef]
- Lezzi, M.; Del Vecchio, V.; Lazoi, M. Using blockchain technology for sustainability and secure data management in the energy industry: Implications and future research directions. Sustainability 2024, 16, 7949. [Google Scholar] [CrossRef]
- Taherdoost, H. Blockchain and healthcare: A critical analysis of progress and challenges in the last five years. Blockchains 2023, 1, 73–89. [Google Scholar] [CrossRef]
- Almadadha, R. Blockchain technology in financial accounting: Enhancing transparency, security, and esg reporting. Blockchains 2024, 2, 312–333. [Google Scholar] [CrossRef]
- Lin, I.-C.; Kuo, Y.-H.; Chang, C.-C.; Liu, J.-C.; Chang, C.-C. Symmetry in blockchain-powered secure decentralized data storage: Mitigating risks and ensuring confidentiality. Symmetry 2024, 16, 147. [Google Scholar] [CrossRef]
- Li, L.; Qu, H.; Wang, H.; Wang, J.; Wang, B.; Wang, W.; Xu, J.; Wang, Z. A blockchain-based product traceability system with off-chain EPCIS and IoT device authentication. Sensors 2022, 22, 8680. [Google Scholar] [CrossRef]
- Lin, Y.; Xie, Z.; Chen, T.; Cheng, X.; Wen, H. Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Syst. Appl. 2024, 257, 124891. [Google Scholar] [CrossRef]
- Rani, D.; Gill, N.S.; Gulia, P.; Yahya, M.; Ahanger, T.A.; Hassan, M.M.; Abdallah, F.B.; Shukla, P.K. A secure digital evidence preservation system for an iot-enabled smart environment using ipfs, blockchain, and smart contracts. Peer-to-Peer Netw. Appl. 2025, 18, 5. [Google Scholar] [CrossRef]
- Kaur, J.; Rani, R.; Kalra, N. Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS. Clust. Comput. 2024, 27, 1047–1061. [Google Scholar] [CrossRef]
- Alizadeh, M.; Andersson, K.; Schelén, O. Efficient decentralized data storage based on public blockchain and IPFS. In Proceedings of the IEEE Asia-Pacific Conference on Computer Science and Data Engineering, Gold Coast, Australia, 16–18 December 2020; pp. 1–8. [Google Scholar]
- Merlec, M.M.; In, H.P. Blockchain-based decentralized storage systems for sustainable data self-sovereignty: A comparative study. Sustainability 2024, 16, 7671. [Google Scholar] [CrossRef]
- Benisi, N.Z.; Aminian, M.; Javadi, B. Blockchain-based decentralized storage networks: A survey. J. Netw. Comput. Appl. 2020, 162, 102656. [Google Scholar] [CrossRef]
- Verma, G. Blockchain-based privacy preservation framework for healthcare data in cloud environment. J. Exp. Theor. Artif. Intell. 2024, 36, 147–160. [Google Scholar] [CrossRef]
- Dhokrat, J.G.; Pulgam, N.; Maktum, T.; Mane, V. A Framework for Privacy-Preserving Multiparty Computation with Homomorphic Encryption and Zero-Knowledge Proofs. Informatica 2024, 48, 1–14. [Google Scholar] [CrossRef]
- Doan, T.V.; Psaras, I.; Ott, J.; Bajpai, V. Toward decentralized cloud storage with IPFS: Opportunities, challenges, and future considerations. IEEE Internet Comput. 2022, 26, 7–15. [Google Scholar] [CrossRef]
- Miyachi, K.; Mackey, T.K. hOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design. Inf. Process. Manag. 2021, 58, 102535. [Google Scholar] [CrossRef]
- Rebello, G.A.F.; Camilo, G.F.; de Souza, L.A.C.; Potop-Butucaru, M.; de Amorim, M.D.; Campista, M.E.M.; Costa, L.H.M. A survey on blockchain scalability: From hardware to layer-two protocols. IEEE Commun. Surv. Tutor. 2024, 26, 2411–2458. [Google Scholar] [CrossRef]
- Quan, B.L.Y.; Wahab, N.H.A.; Al-Dhaqm, A.; Alshammari, A.; Aqarni, A.; Abd Razak, S.; Wei, K.T. Recent advances in sharding techniques for scalable blockchain networks: A review. IEEE Access 2024, 13, 21335–21366. [Google Scholar] [CrossRef]
- Tremblay Thibault, L.; Sarry, T.; Senhaji Hafid, A. Blockchain scaling using rollups: A comprehensive survey. IEEE Access 2022, 10, 93039–93054. [Google Scholar] [CrossRef]
- Saif, M.B.; Migliorini, S.; Spoto, F. A survey on data availability in layer 2 blockchain rollups: Open challenges and future improvements. Future Internet 2024, 16, 315. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 8 February 2025).
- Kudzin, A.; Toyoda, K.; Takayama, S.; Ishigame, A. Scaling Ethereum 2.0’s cross-shard transactions with refined data structures. Cryptography 2022, 6, 57. [Google Scholar] [CrossRef]
- Li, H.; Han, D. EduRSS: A blockchain-based educational records secure storage and sharing scheme. IEEE Access 2019, 7, 179273–179284. [Google Scholar] [CrossRef]
- Verma, P.; Tripathi, V.; Pant, B. Secure Hashgraph for healthcare: Strengthening privacy and data security in patient records. IEEE Trans. Consum. Electron. 2024, 70, 1205–1213. [Google Scholar] [CrossRef]
- Ramadan, R.A.; Khalifa, H.S.; Dessouky, M.; Aboshosha, B.W. Blockchain Technology for Enhanced Security of IoT Healthcare Devices: A Novel Lightweight Hash Function Approach and Secure Management System. 2024. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4680105 (accessed on 8 February 2025).
- Musamih, A.; Salah, K.; Jayaraman, R.; Arshad, J.; Debe, M.; Al-Hammadi, Y.; Ellahham, S. A blockchain-based approach for drug traceability in healthcare supply chain. IEEE Access 2021, 9, 9728–9743. [Google Scholar] [CrossRef]
- Leal, F.; Chis, A.E.; Caton, S.; González–Vélez, H.; García–Gómez, J.M.; Durá, M.; Sánchez–García, A.; Sáez, C.; Karageorgos, A.; Gerogiannis, V.C.; et al. Smart pharmaceutical manufacturing: Ensuring end-to-end traceability and data integrity in medicine production. Big Data Res. 2021, 24, 100172. [Google Scholar] [CrossRef]
- Zaabar, B.; Cheikhrouhou, O.; Jamil, F.; Ammi, M.; Abid, M. HealthBlock: A secure blockchain-based healthcare data management system. Comput. Netw. 2021, 200, 108500. [Google Scholar] [CrossRef]
- Pandey, A.K.; Khan, A.I.; Abushark, Y.B.; Alam, M.M.; Agrawal, A.; Kumar, R.; Khan, R.A. Key issues in healthcare data integrity: Analysis and recommendations. IEEE Access 2020, 8, 40612–40628. [Google Scholar] [CrossRef]
- Flux. The Decentralized Computational Network. Available online: https://fluxwhitepaper.app.runonflux.io/ (accessed on 13 February 2025).
- Uddin, M.; Salah, K.; Jayaraman, R.; Pesic, S.; Ellahham, S. Blockchain for drug traceability: Architectures and open challenges. Health Inform. J. 2021, 27, 14604582211011228. [Google Scholar] [CrossRef]
- Yu, J.; Zhang, X.; Wang, J.; Zhang, Y.; Shi, Y.; Su, L.; Zeng, L. Robust and trustworthy data sharing framework leveraging on-chain and off-chain collaboration. Comput. Mater. Contin. 2024, 78, 2159–2179. [Google Scholar] [CrossRef]
- Sezer, B.B.; Topal, S.; Nuriyev, U. TPPSUPPLY: A traceable and privacy-preserving blockchain system architecture for the supply chain. J. Inf. Secur. Appl. 2022, 66, 103116. [Google Scholar] [CrossRef]
- Hellani, H.; Sliman, L.; Samhat, A.E.; Exposito, E. On blockchain integration with supply chain: Overview on data transparency. Logistics 2021, 5, 46. [Google Scholar] [CrossRef]
- Wu, L.; Lu, W.; Xue, F.; Li, X.; Zhao, R.; Tang, M. Linking permissioned blockchain to Internet of Things (IoT)-BIM platform for off-site production management in modular construction. Comput. Ind. 2022, 135, 103573. [Google Scholar] [CrossRef]
- Jayabalan, J.; Jeyanthi, N. Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. J. Parallel Distrib. Comput. 2022, 164, 152–167. [Google Scholar] [CrossRef]
- Tsang, Y.P.; Lee, C.K.M.; Zhang, K.; Wu, C.H.; Ip, W.H. On-chain and off-chain data management for blockchain-Internet of Things: A multi-agent deep reinforcement learning approach. J. Grid Comput. 2024, 22, 16. [Google Scholar] [CrossRef]
- Hasan, H.R.; Salah, K.; Yaqoob, I.; Jayaraman, R.; Pesic, S.; Omar, M. Trustworthy IoT data streaming using blockchain and IPFS. IEEE Access 2022, 10, 17707–17721. [Google Scholar] [CrossRef]
- Ali, M.S.; Vecchio, M.; Putra, G.D.; Kanhere, S.S.; Antonelli, F. A decentralized peer-to-peer remote health monitoring system. Sensors 2020, 20, 1656. [Google Scholar] [CrossRef]
- Hu, V.C.; Kuhn, D.R.; Ferraiolo, D.F.; Voas, J. Attribute-based access control. Computer 2015, 48, 85–88. [Google Scholar] [CrossRef]
- Sandhu, R.S. Role-based access control. Adv. Comput. 1998, 46, 237–286. [Google Scholar]
- Khanna, A.; Sah, A.; Bolshev, V.; Burgio, A.; Panchenko, V.; Jasiński, M. Blockchain–cloud integration: A survey. Sensors 2022, 22, 5238. [Google Scholar] [CrossRef]
- Liu, H.; Yang, B.; Xiong, X.; Zhu, S.; Chen, B.; Tolba, A.; Zhang, X. A financial management platform based on the integration of blockchain and supply chain. Sensors 2023, 23, 1497. [Google Scholar] [CrossRef]
- Aftab, M.U.; Hamza, A.; Oluwasanmi, A.; Nie, X.; Sarfraz, M.S.; Shehzad, D.; Qin, Z.; Rafiq, A. Traditional and hybrid access control models: A detailed survey. Secur. Commun. Netw. 2022, 2022, 1560885. [Google Scholar] [CrossRef]
- Ruj, S.; Stojmenovic, M.; Nayak, A. Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 2013, 25, 384–394. [Google Scholar] [CrossRef]
- Liu, C.; Hou, C.; Jiang, T.; Ning, J.; Qiao, H.; Wu, Y. FACOS: Enabling privacy protection through fine-grained access control with on-chain and off-chain system. IEEE Trans. Inf. Forensics Secur. 2024, 19, 7060–7074. [Google Scholar] [CrossRef]
- Zhang, Y.; Geng, H.; Su, L.; Lu, L. A blockchain-based efficient data integrity verification scheme in multi-cloud storage. IEEE Access 2022, 10, 105920–105929. [Google Scholar] [CrossRef]
- Mohanta, B.K.; Awad, A.I.; Dehury, M.K.; Mohapatra, H.; Khan, M.K. Protecting IoT-Enabled Healthcare Data at the Edge: Integrating Blockchain, AES, and Off-Chain Decentralized Storage. IEEE Internet Things J. 2025; in press. [Google Scholar] [CrossRef]
- Delgado-von-Eitzen, C.; Anido-Rifón, L.; Fernández-Iglesias, M.J. Blockchain applications in education: A systematic literature review. Appl. Sci. 2021, 11, 11811. [Google Scholar] [CrossRef]
- Namane, S.; Ben Dhaou, I. Blockchain-based access control techniques for IoT applications. Electronics 2022, 11, 2225. [Google Scholar] [CrossRef]
- Almarri, M.; Aljughaiman, A. Blockchain technology for IoT security and trust: A comprehensive SLR. Sustainability 2024, 16, 10177. [Google Scholar] [CrossRef]
- Poon, J.; Buterin, V. Plasma: Scalable Autonomous Smart Contracts. 2017. Available online: https://www.plasma.io/plasma.pdf (accessed on 8 February 2025).
- Chen, Z.; Gu, J.; Yan, H. HAE: A hybrid cryptographic algorithm for blockchain medical scenario applications. Appl. Sci. 2023, 13, 12163. [Google Scholar] [CrossRef]
- Crosby, M.; Nachiappan; Pattanayak, P.; Verma, S.; Kalyanaraman, V. Blockchain technology: Beyond bitcoin. Appl. Innov. Rev. 2016, 2, 6–19. [Google Scholar]
- Yli-Huumo, J.; Ko, D.; Choi, S.; Park, S.; Smolander, K. Where is current research on blockchain technology: A systematic review. PLoS ONE 2016, 11, e0163477. [Google Scholar] [CrossRef]
- Ajayi, A.A.; Emmanuel, I.; Soyele, A.D.; Enyejo, J.O. Enhancing digital identity and financial security in decentralized finance (DeFi) through zero-knowledge proofs (ZKPs) and blockchain solutions for regulatory compliance and privacy. Iconic Res. Eng. J. 2024, 8, 373–394. [Google Scholar]
- Xu, X.; Weber, I.M.; Staples, M. Architecture for Blockchain Applications, 1st ed.; Springer: Cham, Switzerland, 2019; pp. 1–307. [Google Scholar]
- Yu, K.; Tan, L.; Yang, C.; Choo, K.-K.R.; Bashir, A.K.; Rodrigues, J.; Sato, T. A blockchain-based Shamir’s threshold cryptography scheme for data protection in industrial internet of things settings. IEEE Internet Things J. 2022, 9, 8154–8167. [Google Scholar] [CrossRef]
- Jose, J.T.; Anju, S. Threshold cryptography based secure access control for electronic medical record in an intensive care unit. Int. J. Eng. Res. Technol. 2013, 2, 457–464. [Google Scholar]
- Jyoti, A.; Chauhan, R.K. A blockchain and smart contract-based data provenance collection and storing in cloud environment. Wireless Netw. 2022, 28, 1541–1562. [Google Scholar] [CrossRef]
- Dwivedi, S.K.; Amin, R.; Vollala, S. Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment. Peer-to-Peer Netw. Appl. 2023, 16, 1–21. [Google Scholar] [CrossRef]
- Ayub, M.; Saleem, T.; Janjua, M.U.; Ahmad, T. Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts. ACM Trans. Softw. Eng. Methodol. 2023, 32, 57. [Google Scholar] [CrossRef]
- Khan, N.; Aljoaey, H.; Tabassum, M.; Farzamnia, A.; Sharma, T.; Tung, Y.H. Proposed model for secured data storage in decentralized cloud by blockchain Ethereum. Electronics 2022, 11, 3686. [Google Scholar] [CrossRef]
- Williams, S.; Diordiiev, M. Arweave: The Permanent Information Storage Protocol. 2018. Available online: https://www.arweave.org/files/arweave-lightpaper.pdf (accessed on 8 February 2025).
- Williams, S.; Diordiiev, M.; Berman, L.; Raybould, I.; Uemlianin, I. Arweave: A Protocol for Economically Sustainable Information Permanence. 2019. Available online: https://www.arweave.org/yellow-paper.pdf (accessed on 8 February 2025).
- Frost, H. Incorporating Blockchain and Arweave Technologies into Archival Practices: An Exploration of the Rohingya Project’s R-Archive. Ph.D. Thesis, University of California, Los Angeles, CA, USA, 2024. [Google Scholar]
- Strehle, E.; Steinmetz, F. Dominating OP Returns: The Impact of Omni and Veriblock on Bitcoin. J. Grid Comput. 2020, 18, 575–592. [Google Scholar] [CrossRef]
- Niu, Y.; Wei, L.; Zhang, C.; Liu, J.; Fang, Y. An anonymous and accountable authentication scheme for Wi-Fi hotspot access with the Bitcoin blockchain. In Proceedings of the 2017 IEEE/CIC International Conference on Communications in China (ICCC), Qingdao, China, 22–24 October 2017; pp. 617–622. [Google Scholar]
- Zheng, P.; Zheng, Z.; Wu, J.; Dai, H.-N. XBlock-ETH: Extracting and Exploring Blockchain Data from Ethereum. IEEE Open J. Comput. Soc. 2020, 1, 95–106. [Google Scholar] [CrossRef]
- Martha, G.I.R.; Prabowo, H.; Gaol, F.L.; Wiputra, R. Literature Review: Analysis of Essential Metadata Attributes of Digital Goods for Transaction in the Virtual World. In Proceedings of the 2024 International Conference on Information Management and Technology, Bali, Indonesia, 28–29 August 2024; IEEE: New York, NY, USA, 2024; pp. 299–304. [Google Scholar]
- Li, W.; Feng, Y.; Liu, N.; Li, Y.; Fu, X.; Yu, Y. A secure and efficient log storage and query framework based on blockchain. Comput. Netw. 2024, 252, 110683. [Google Scholar] [CrossRef]
- Di Ciccio, C.; Meroni, G.; Plebani, P. On the adoption of blockchain for business process monitoring. Softw. Syst. Model. 2022, 21, 915–937. [Google Scholar] [CrossRef]
- Liu, Z.; Zhang, X.; Li, G.; Cui, H.; Wang, J.; Xiao, B. A Secure and Reliable Blockchain-based Audit Log System. In Proceedings of the ICC 2024 IEEE International Conference on Communications, Denver, CO, USA, 9–13 June 2024; pp. 2010–2015. [Google Scholar]
- Buterin, V. A Next-Generation Smart Contract and Decentralized Application Platform. 2014. Available online: https://blockchainlab.com/pdf/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf (accessed on 8 March 2025).
- Sai, C.S.; Subramanian, N. Covert communication on IPFS using secured Filecoin-Slate blockchain. In Proceedings of the 2022 IEEE 19th India Council International Conference, Kochi, India, 24–26 November 2022; pp. 1–6. [Google Scholar]
- Guidi, B.; Michienzi, A.; Ricci, L. Evaluating the decentralisation of Filecoin. In Proceedings of the 3rd International Workshop on Distributed Infrastructure for the Common Good, Quebec City, QC, Canada, 7 November 2022; pp. 13–18. [Google Scholar]
- Jadhav, S.; Choudhari, G.; Bhavik, M.; Bura, R.; Bhosale, V. A Decentralized Document Storage Platform using IPFS with Enhanced Security. In Proceedings of the 2024 8th International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 23–24 August 2024; IEEE: New York, NY, USA, 2024; pp. 1–11. [Google Scholar]
- Benet, J. IPFS-content addressed, versioned, p2p file system. arXiv 2014, arXiv:1407.3561. [Google Scholar]
- Wilkinson, S.; Boshevski, T.; Brandoff, J.; Buterin, V. Storj: A Peer-to-Peer Cloud Storage Network. 2014. Available online: https://storj.io/storjv2.pdf (accessed on 8 February 2025).
- Vorick, D.; Champine, L. Sia: Simple Decentralized Storage. Nebulous Inc. 2014. Available online: https://sia.tech/sia.pdf (accessed on 8 February 2025).
- Huang, H.-S.; Chang, T.-S.; Wu, J.-Y. A secure file sharing system based on IPFS and blockchain. In Proceedings of the International Electronics Communication Conference, Singapore, 8–10 July 2020; pp. 96–100. [Google Scholar]
- Li, J.; Wu, J.; Jiang, G.; Srikanthan, T. Blockchain-based public auditing for big data in cloud storage. Inf. Process. Manag. 2020, 57, 102382. [Google Scholar] [CrossRef]
- Mahalakshmi, K.; Kousalya, K.; Shekhar, H.; Thomas, A.K.; Bhagyalakshmi, L.; Suman, S.K.; Chandragandhi, S.; Bachanna, P.; Srihari, K.; Sundramurthy, V. Public auditing scheme for integrity verification in distributed cloud storage system. Sci. Program. 2021, 2021, 8533995. [Google Scholar] [CrossRef]
- Chiniah, A.; Mungur, A. On the adoption of erasure code for cloud storage by major distributed storage systems. EAI Endorsed Trans. Cloud Syst. 2022, 7, e1. [Google Scholar] [CrossRef]
- Nachiappan, R.; Calheiros, R.N.; Matawie, K.M.; Javadi, B. Optimized proactive recovery in erasure-coded cloud storage systems. IEEE Access 2023, 11, 38226–38239. [Google Scholar] [CrossRef]
- Zhang, Q.; Zhao, Z. Distributed storage scheme for encryption speech data based on blockchain and IPFS. J. Supercomput. 2023, 79, 897–923. [Google Scholar] [CrossRef]
- Tron, V.; Schonfeld, F. Swarm: The Decentralized Data Storage and Distribution Infrastructure for the Ethereum Web 3.0 Stack Whitepaper V0.3. 2019. Available online: https://www.ethswarm.org/The-Book-of-Swarm.pdf (accessed on 8 February 2025).
- Niranjana, J.; Daniel, E.; Durga, S.; Kathiresan, V. Enhancing Storage Efficiency for Health Data Records through Block chain-Based Storj Mechanism. In Proceedings of the 2024 3rd International Conference on Intelligent Technologies, Control, Optimization, and Signal Processing, Krishnankoil, Tamil Nadu, India, 14–16 March 2024; IEEE: New York, NY, USA, 2024; pp. 1–7. [Google Scholar]
- Lobo, P.A.; Sarasvathi, V. Distributed file storage model using IPFS and blockchain. In Proceedings of the 2021 2nd Global Conference for Advancement in Technology, Bangalore, India, 1–3 October 2021; IEEE: New York, NY, USA, 2021; pp. 1–6. [Google Scholar]
- Kumar, R.; Marchang, N.; Tripathi, R. Distributed off-chain storage of patient diagnostic reports in healthcare system using IPFS and blockchain. In Proceedings of the International Conference on Communication Systems and Network, Bengaluru, India, 7–11 January 2020; IEEE: New York, NY, USA, 2020; pp. 1–5. [Google Scholar]
- Zhang, A.; Lin, X. Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J. Med. Syst. 2018, 42, 140. [Google Scholar] [CrossRef]
- Shi, R.; Cheng, R.; Han, B.; Cheng, Y.; Chen, S. A Closer Look into IPFS: Accessibility, Content, and Performance. Proc. ACM Meas. Anal. Comput. Syst. 2024, 8, 20. [Google Scholar] [CrossRef]
- Liu, Y.; Liang, C.; Mang, G.; Dong, Z. Blockchain-based spectrum sharing over 6G hybrid cloud. In Proceedings of the 2021 International Wireless Communications and Mobile Computing (IWCMC), Harbin City, China, 28 June–2 July 2021. [Google Scholar]
- Bartolucci, S.; Caccioli, F.; Vivo, P. A percolation model for the emergence of the Bitcoin Lightning Network. Sci. Rep. 2020, 10, 4488. [Google Scholar] [CrossRef]
- Gangwal, A.; Gangavalli, H.R.; Thirupathi, A. A survey of layer-two blockchain protocols. arXiv 2022, arXiv:2204.08032. [Google Scholar] [CrossRef]
- Negka, L.; Spathoulas, G.P. Blockchain state channels: A state of the art. IEEE Access 2021, 9, 160277–160298. [Google Scholar] [CrossRef]
- Khan, D.; Jung, L.T.; Hashmani, M.A. Systematic literature review of challenges in blockchain scalability. Appl. Sci. 2021, 11, 9372. [Google Scholar] [CrossRef]
- Gordon, W.J.; Catalini, C. Blockchain technology for healthcare: Facilitating the transition to patient-driven interoperability. Comput. Struct. Biotechnol. J. 2018, 16, 224–230. [Google Scholar] [CrossRef]
- Tahir, N.U.A.; Rashid, U.; Hadi, H.J.; Ahmad, N.; Cao, Y.; Alshara, M.A.; Javed, Y. Blockchain-based healthcare records management framework: Enhancing security, privacy, and interoperability. Technologies 2024, 12, 168. [Google Scholar] [CrossRef]
- Li, D.; Han, D.; Crespi, N.; Minerva, R.; Sun, Z. A blockchain-based secure storage and access control scheme for supply chain finance. J. Supercomput. 2023, 79, 109–138. [Google Scholar] [CrossRef]
- Mishra, R.K.; Yadav, R.K.; Nath, P. Integration of Blockchain and IPFS: Healthcare data management & sharing for IoT Environment. Multimed. Tools Appl. 2024, 1–22. [Google Scholar]
- Ugochukwu, N.A.; Goyal, S.B.; Rajawat, A.S.; Islam, S.M.N.; He, J.; Aslam, M. An innovative blockchain-based secured logistics management architecture: Utilizing an RSA asymmetric encryption method. Mathematics 2022, 10, 4670. [Google Scholar] [CrossRef]
- Hong, Y. New model of food supply chain finance based on the Internet of Things and blockchain. Mob. Inf. Syst. 2021, 7589964. [Google Scholar] [CrossRef]
- Karaszewski, R.; Modrzyński, P.; Modrzyńska, J. The use of blockchain technology in public sector entities management: An example of security and energy efficiency in cloud computing data processing. Energies 2021, 14, 1873. [Google Scholar] [CrossRef]
- Khan, S.; Shael, M.; Majdalawieh, M.; Nizamuddin, N.; Nicho, M. Blockchain for governments: The case of the Dubai government. Sustainability 2022, 14, 6576. [Google Scholar] [CrossRef]
- Manzoor, A.; Braeken, A.; Kanhere, S.S.; Ylianttila, M.; Liyanage, M. Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain. J. Netw. Comput. Appl. 2021, 176, 102917. [Google Scholar] [CrossRef]
- Golightly, L.; Modesti, P.; Garcia, R.; Chang, V. Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN. Cyber Secur. Appl. 2023, 1, 100015. [Google Scholar] [CrossRef]
- Chadwick, D.W.; Fan, W.; Costantino, G.; De Lemos, R.; Di Cerbo, F.; Herwono, I.; Manea, M.; Mori, P.; Sajjad, A.; Wang, X.S. A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Gener. Comput. Syst. 2020, 102, 710–722. [Google Scholar] [CrossRef]
- Sun, X.; Yu, F.R.; Zhang, P.; Sun, Z.; Xie, W.; Peng, X. A survey on zero-knowledge proof in blockchain. IEEE Netw. 2021, 35, 198–205. [Google Scholar] [CrossRef]
- Kumar, R.; Kumar, J.; Khan, A.A.; Zakria; Ali, H.; Bernard, C.M.; Khan, R.U.; Zeng, S. Blockchain and homomorphic encryption based privacy-preserving model aggregation for medical images. Comput. Med. Imaging Graph. 2022, 102, 102139. [Google Scholar] [CrossRef]
- Punia, A.; Gulia, P.; Gill, N.S.; Ibeke, E.; Iwendi, C.; Shukla, P.K. A systematic review on blockchain-based access control systems in cloud environment. J. Cloud Comput. 2024, 13, 146. [Google Scholar] [CrossRef]
- Li, S.; Chen, Y.; Chen, L.; Liao, J.; Kuang, C.; Li, K.; Liang, W.; Xiong, N. Post-quantum security: Opportunities and challenges. Sensors 2023, 23, 8744. [Google Scholar] [CrossRef]
- Goint, M.; Bertelle, C.; Duvallet, C. Secure access control to data in off-chain storage in blockchain-based consent systems. Mathematics 2023, 11, 1592. [Google Scholar] [CrossRef]
- Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef]
- Zhou, L.; Diro, A.; Saini, A.; Kaisar, S.; Hiep, P.C. Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges, and opportunities. J. Inf. Secur. Appl. 2024, 80, 103678. [Google Scholar] [CrossRef]
- Akter, S.; Reza, F.; Ahmed, M. Convergence of blockchain, k-medoids and homomorphic encryption for privacy preserving biomedical data classification. Internet Things Cyber-Phys. Syst. 2022, 2, 99–110. [Google Scholar] [CrossRef]
- Pareek, N.K.; Patidar, V.; Sud, K.K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
- Odeh, A.; Keshta, I.; Al-Haija, Q.A. Analysis of blockchain in the healthcare sector: Application and issues. Symmetry 2022, 14, 1760. [Google Scholar] [CrossRef]
- Zheng, H.; You, L.; Hu, G. A novel insurance claim blockchain scheme based on zero-knowledge proof technology. Comput. Commun. 2022, 195, 207–216. [Google Scholar] [CrossRef]
- Ali, A.; Al-rimy, B.A.S.; Alsubaei, F.S.; Almazroi, A.A.; Almazroi, A.A. HealthLock: Blockchain-based privacy preservation using homomorphic encryption in Internet of Things healthcare applications. Sensors 2023, 23, 6762. [Google Scholar] [CrossRef]
- Mansoor, K.; Afzal, M.; Iqbal, W.; Abbas, Y. Securing the future: Exploring post-quantum cryptography for authentication and user privacy in IoT devices. Clust. Comput. 2025, 28, 93. [Google Scholar] [CrossRef]
- Bisht, A.; Das, A.K.; Niyato, D.; Park, Y. Efficient Personal-Health-Records Sharing in Internet of Medical Things Using Searchable Symmetric Encryption, Blockchain, and IPFS. IEEE Open J. Commun. Soc. 2023, 4, 2225–2244. [Google Scholar] [CrossRef]
- Steffen, S.; Bichsel, B.; Baumgartner, R.; Vechev, M. ZeeStar: Private smart contracts by homomorphic encryption and zero-knowledge proofs. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 22–26 May 2022. [Google Scholar]
- Hossain, G.; Yarra, D. Learning blockchain technology in high school: Towards cybersecurity education. In Proceedings of the 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2024. [Google Scholar]
- Ali, A.; Pasha, M.F.; Guerrieri, A.; Guzzo, A.; Sun, X.; Saeed, A.; Hussain, A.; Fortino, G. A novel homomorphic encryption and consortium blockchain-based hybrid deep learning model for industrial internet of medical things. IEEE Trans. Netw. Sci. Eng. 2023, 10, 2402–2418. [Google Scholar] [CrossRef]
- Reddy, B.; Madhushree; Aithal, P.S. Blockchain as a disruptive technology in healthcare and financial services: A review-based analysis on current implementations. Int. J. Appl. Eng. Manag. Lett. 2020, 4, 142–155. [Google Scholar]
- Ma, S.; Zhang, X. Integrating blockchain and zk-rollup for efficient healthcare data privacy protection system via IPFS. Sci. Rep. 2024, 14, 11746. [Google Scholar] [CrossRef] [PubMed]
- Yue, X.; Wang, H.; Jin, D.; Li, M.; Jiang, W. Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 2016, 40, 218. [Google Scholar] [CrossRef] [PubMed]
- Shruti, S.; Alapatt, J.; George, J. MediCrypt: A model with symmetric encryption for blockchain-enabled healthcare data protection. In Proceedings of the 2024 IEEE International Conference on Contemporary Computing and Communications (InC4), Bangalore, India, 15–16 March 2024. [Google Scholar]
- Sánchez Ortiz, A. Zero-Knowledge Proofs Applied to Finance. Master’s Thesis, University of Twente, Enschede, The Netherlands, 2020. [Google Scholar]
- Pan, R. The Performance Impact of Zero-Knowledge Proof on Blockchain Frameworks. Master’s Thesis, University of Amsterdam, Amsterdam, The Netherlands, 2023. [Google Scholar]
- Al-Aswad, M.A.; Hasan, R.; Elmedany, W.; Ali, M.; Balakrishna, C. Towards a blockchain-based zero-knowledge model for secure data sharing and access. In Proceedings of the 2019 IEEE 7th International Conference on Future Internet of Things and Cloud (FiCloud), Istanbul, Turkey, 26–28 August 2019; pp. 76–82. [Google Scholar]
- Babu, B.; Jothi, K.R. A secure framework for privacy-preserving analytics in healthcare records using zero-knowledge proofs and blockchain in multi-tenant cloud environments. IEEE Access 2024, 13, 8439–8455. [Google Scholar] [CrossRef]
- Aissaoua, H.; Laouid, A.; Kara, M.; Bounceur, A.; Hammoudeh, M.; Chait, K. Integrating homomorphic encryption in IoT healthcare blockchain systems. Ingénierie Des Systèmes D’information 2024, 29, 1667–1677. [Google Scholar] [CrossRef]
- Reddi, S.; Rao, P.M.; Saraswathi, P.; Jangirala, S.; Das, A.K.; Jamal, S.S.; Park, Y. Privacy-preserving electronic medical record sharing for IoT-enabled healthcare system using fully homomorphic encryption, IOTA, and masked authenticated messaging. IEEE Trans. Ind. Inform. 2024, 20, 10802–10813. [Google Scholar] [CrossRef]
- Vanin, F.N.d.S.; Policarpo, L.M.; Righi, R.d.R.; Heck, S.M.; da Silva, V.F.; Goldim, J.; da Costa, C.A. A blockchain-based end-to-end data protection model for personal health records sharing: A fully homomorphic encryption approach. Sensors 2023, 23, 14. [Google Scholar] [CrossRef]
- Muazu, T.; Mao, Y.; Muhammad, A.U.; Ibrahim, M.; Kumshe, U.M.M.; Samuel, O. A federated learning system with data fusion for healthcare using multi-party computation and additive secret sharing. Comput. Commun. 2024, 216, 168–182. [Google Scholar] [CrossRef]
- Olakanmi, O.O.; Odeyemi, K.O. Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things. Internet Things 2022, 19, 100527. [Google Scholar] [CrossRef]
- Li, W.; Yang, B.; Song, Y. Secure multi-party computing for financial sector based on blockchain. In Proceedings of the 2023 IEEE 14th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 17–18 October 2023. [Google Scholar]
- Seo, M. Fair and secure multi-party computation with cheater detection. Cryptography 2021, 5, 19. [Google Scholar] [CrossRef]
- Mansoor, K.; Afzal, M.; Iqbal, W.; Abbas, Y.; Mussiraliyeva, S.; Chehri, A. PQCAIE: Post-quantum cryptographic authentication scheme for IoT-based e-health systems. Internet Things 2024, 27, 101228. [Google Scholar] [CrossRef]
- Csenkey, K.; Bindel, N. Post-quantum cryptographic assemblages and the governance of the quantum threat. J. Cybersecur. 2023, 9, tyad001. [Google Scholar] [CrossRef]
- Bernstein, D.J.; Lange, T. Post-quantum cryptography. Nature 2017, 549, 188–194. [Google Scholar] [CrossRef] [PubMed]
- Liu, Y.; Zhang, J.; Zhan, J. Privacy protection for fog computing and the internet of things data based on blockchain. Clust. Comput. 2021, 24, 1331–1345. [Google Scholar] [CrossRef]
- Boumezbeur, I.; Zarour, K. Privacy preservation and access control for sharing electronic health records using blockchain technology. Acta Inform. Pragensia 2022, 11, 105–122. [Google Scholar] [CrossRef]
- Kaur, M.; Gupta, S.; Kumar, D.; Verma, C.; Neagu, B.-C.; Raboaca, M.S. Delegated proof of accessibility (DPOAC): A novel consensus protocol for blockchain systems. Mathematics 2022, 10, 2336. [Google Scholar] [CrossRef]
- Kuo, T.T.; Kim, H.E.; Ohno-Machado, L. Blockchain distributed ledger technologies for biomedical and health care applications. J. Am. Med. Inform. Assoc. 2017, 24, 1211–1220. [Google Scholar] [CrossRef]
- Chenthara, S.; Ahmed, K.; Wang, H.; Whittaker, F.; Chen, Z. Healthchain: A novel framework on privacy preservation of electronic health records using blockchain technology. PLoS ONE 2020, 15, e0243043. [Google Scholar] [CrossRef]
- Sonkamble, R.G.; Bongale, A.M.; Phansalkar, S.; Sharma, A.; Rajput, S. Secure data transmission of electronic health records using blockchain technology. Electronics 2023, 12, 1015. [Google Scholar] [CrossRef]
- Taherdoost, H. Privacy and security of blockchain in healthcare: Applications, challenges, and future perspectives. Sci 2023, 5, 41. [Google Scholar] [CrossRef]
- Rizzardi, A.; Sicari, S.; Cevallos Moreno, J.F.; Coen-Porisini, A. IoT-driven blockchain to manage the healthcare supply chain and protect medical records. Future Gener. Comput. Syst. 2024, 161, 415–431. [Google Scholar] [CrossRef]
- Amanat, A.; Rizwan, M.; Maple, C.; Zikria, Y.B.; Almadhor, A.S.; Kim, S.W. Blockchain and cloud computing-based secure electronic healthcare records storage and sharing. Front. Public Health 2022, 10, 938707. [Google Scholar] [CrossRef] [PubMed]
- Helium Systems Inc. Helium: A Decentralized Wireless Network. Available online: http://whitepaper.helium.com/ (accessed on 13 February 2025).
- Samarati, P.; De Vimercati, S.C. Access Control: Policies, Models, and Mechanisms. In Foundations of Security Analysis and Design; International School on Foundations of Security Analysis and Design; Springer: Berlin/Heidelberg, Germany, 2001; pp. 137–196. [Google Scholar]
- Osborn, S.L. Role-based access control. In Security, Privacy, and Trust in Modern Data Management; Springer: Berlin/Heidelberg, Germany, 2007; pp. 55–70. [Google Scholar]
- Vandenwauver, M.; Govaerts, R.; Vandewalle, J. Role based access control in distributed systems. Commun. Multimed. Secur. 1997, 3, 169–177. [Google Scholar]
- Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006; pp. 89–98. [Google Scholar]
- Nakamura, S.; Enokido, T.; Takizawa, M. Information flow control based on the CapBAC (capability-based access control) model in the IoT. Int. J. Mob. Comput. Multimed. Commun. 2019, 10, 13–25. [Google Scholar] [CrossRef]
- Kumar, R.; Aljuhani, A.; Javeed, D.; Kumar, P.; Islam, S.; Islam, A.N. Digital Twins-enabled Zero Touch Network: A smart contract and explainable AI integrated cybersecurity framework. Future Gener. Comput. Syst. 2024, 156, 191–205. [Google Scholar] [CrossRef]
- Malik, H.; Anees, T.; Faheem, M.; Chaudhry, M.U.; Ali, A.; Asghar, M.N. Blockchain and Internet of Things in smart cities and drug supply management: Open issues, opportunities, and future directions. Internet Things 2023, 23, 100860. [Google Scholar] [CrossRef]
- Harris-Braun, E.; Luck, N.; Brock, A. Holochain: Scalable Agent-Centric Distributed Computing. 2018. Available online: https://www.holochain.org/documents/holochain-white-paper-alpha.pdf (accessed on 8 February 2025).
- Ankr Network Whitepaper. Available online: https://www.ankr.com/ (accessed on 13 February 2025).
- Alhaqbani, B.; Fidge, C. Access control requirements for processing electronic health records. In Business Process Management Workshops: BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papers; Springer: Berlin/Heidelberg, Germany, 2008; pp. 371–382. [Google Scholar]
- Yu, S.; Wang, C.; Ren, K.; Lou, W. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–9. [Google Scholar]
- Chen, C.; Wang, L.; Long, Y.; Luo, Y.; Chen, K. A blockchain-based dynamic and traceable data integrity verification scheme for smart homes. J. Syst. Archit. 2022, 130, 102677. [Google Scholar] [CrossRef]
- Liu, X.; Shah, R.; Shandilya, A.; Shah, M.; Pandya, A. A systematic study on integrating blockchain in healthcare for electronic health record management and tracking medical supplies. J. Clean. Prod. 2024, 447, 141371. [Google Scholar] [CrossRef]
- Sharma, V.; Ramirez-Asis, E.; Ahmad, A.J.; Silva-Zapata, M.; Alvarado-Tolentino, J.; Kumar, H.; Krah, D. On the Internet of Things, blockchain technology for supply chain management (IoT). Wirel. Commun. Mob. Comput. 2022, 2022, 9185731. [Google Scholar] [CrossRef]
- Lopez, L.J.R.; Millan Mayorga, D.; Martinez Poveda, L.H.; Amaya, A.F.C.; Rojas Reales, W. Hybrid architectures used in the protection of large healthcare records based on cloud and blockchain integration: A review. Computers 2024, 13, 152. [Google Scholar] [CrossRef]
- Han, G.; Ma, Y.; Zhang, Z.; Wang, Y. A hybrid blockchain-based solution for secure sharing of electronic medical record data. PeerJ Comput. Sci. 2025, 11, e2653. [Google Scholar] [CrossRef]
- Zhang, P.; White, J.; Schmidt, D.C.; Lenz, G.; Rosenbloom, S.T. FHIRChain: Applying blockchain to securely and scalably share clinical data. Comput. Struct. Biotechnol. J. 2018, 16, 267–278. [Google Scholar] [CrossRef] [PubMed]
- Guo, L.; Chen, J.; Li, S.; Li, Y.; Lu, J. A blockchain and IoT-based lightweight framework for enabling information transparency in supply chain finance. Digit. Commun. Netw. 2022, 8, 576–587. [Google Scholar] [CrossRef]
- Ahmad, A.Y.A.B.; Verma, N.; Sarhan, N.M.; Awwad, E.M.; Arora, A.; Nyangaresi, V.O. An IoT and blockchain-based secure and transparent supply chain management framework in smart cities using optimal queue model. IEEE Access 2024, 12, 51752–51771. [Google Scholar] [CrossRef]
- Mangala, N.; Naveen, D.R.; Reddy, B.E.; Buyya, R.; Venugopal, K.R.; Iyengar, S.S.; Patnaik, L.M. Secure pharmaceutical supply chain using blockchain in IoT cloud systems. Internet Things 2024, 26, 101215. [Google Scholar]
- Awaji, B.; Solaiman, E. Design, implementation, and evaluation of blockchain-based trusted achievement record system for students in higher education. arXiv 2022, arXiv:2204.12547. [Google Scholar]
- Lykidis, I.; Drosatos, G.; Rantos, K. The use of blockchain technology in e-government services. Computers 2021, 10, 168. [Google Scholar] [CrossRef]
- BitTorrent Foundation. BitTorrent-Chain Whitepaper (Version 1.0). 2021. Available online: https://resources.cryptocompare.com/asset-management/818/1671203800359.pdf (accessed on 8 February 2025).
- Civic Whitepaper. Available online: https://www.allcryptowhitepapers.com/civic-whitepaper/ (accessed on 13 February 2025).
- Ben-Sasson, E.; Chiesa, A.; Genkin, D.; Tromer, E.; Virza, M. SNARKs for C: Verifying program executions succinctly and in zero knowledge. In Advances in Cryptology—CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2013, Proceedings, Part II; Springer: Berlin/Heidelberg, Germany, 2013; pp. 90–108. [Google Scholar]
- Polkadot Whitepaper. Available online: https://polkadot.com/papers/ (accessed on 13 February 2025).
- Cosmos Whitepaper. Available online: https://cosmos.network/whitepaper (accessed on 13 February 2025).
- Axelar Whitepaper. Available online: https://www.axelar.network/whitepaper (accessed on 13 February 2025).
- Bentayeb, Y.; Chaoui, K.; Badir, H. Integrating Blockchain and Edge Computing: A Systematic Analysis of Security, Efficiency, and Scalability. Int. J. Adv. Comput. Sci. Appl. 2025, 16, 622–627. [Google Scholar] [CrossRef]
- Veeramachaneni, V. Edge Computing: Architecture, Applications, and Future Challenges in a Decentralized Era. Recent Trends Comput. Graph. Multimed. Technol. 2025, 7, 8–23. [Google Scholar]
- Oliveira, M.; Chauhan, S.; Pereira, F.; Felgueiras, C.; Carvalho, D. Blockchain protocols and edge computing targeting industry 5.0 needs. Sensors 2023, 23, 9174. [Google Scholar] [CrossRef]
- Hasnain, M.; Albogamy, F.R.; Alamri, S.S.; Ghani, I.; Mehboob, B. The Hyperledger Fabric as a blockchain framework preserves the security of electronic health records. Front. Public Health 2023, 11, 1272787. [Google Scholar] [CrossRef]
- ZKsync Whitepaper. Available online: https://docs.zksync.io (accessed on 13 February 2025).
- Starknet Whitepaper. Available online: https://docs.starknet.io (accessed on 13 February 2025).
- Fetch.ai Whitepaper. Available online: https://fetch.ai/ (accessed on 13 February 2025).
- Chainlink Whitepaper. Available online: https://chain.link/whitepaper (accessed on 13 February 2025).
- IoTeX Whitepaper. Available online: https://docs.iotex.io/readme/whitepaper (accessed on 13 February 2025).
- EigenLayer Whitepaper. Available online: https://docs.eigenlayer.xyz/ (accessed on 13 February 2025).
- Al-Bassam, M. Lazyledger: A distributed data availability ledger with client-side smart contracts. arXiv 2019, arXiv:1905.09274. [Google Scholar]
- LayerZero Whitepaper. Available online: https://layerzero.network/publications/ (accessed on 13 February 2025).
- Gupta, T.; Patel, H.B. Integrating Blockchain Technology with Internet of Things and Edge Computing to Achieve Security. J. Ecohumanism 2024, 3, 5127–5136. [Google Scholar] [CrossRef]
- Rupanetti, D.; Kaabouch, N. Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities. Appl. Sci. 2024, 14, 7104. [Google Scholar] [CrossRef]
- Bhuva, D.R.; Kumar, S. Securing space cognitive communication with blockchain. In Proceedings of the 2023 IEEE Cognitive Communications for Aerospace Applications Workshop (CCAAW), Cleveland, OH, USA, 20–22 June 2023; pp. 1–6. [Google Scholar]
- Bhuva, D.R.; Kumar, S. A novel continuous authentication method using biometrics for IOT devices. Internet Things 2023, 24, 100927. [Google Scholar] [CrossRef]
Data Storage Environment | Storage Mechanism | Description | Advantages | Disadvantages | Examples |
---|---|---|---|---|---|
Blockchain Database Structures | Merkle Tree [21] | Hash-based tree structure used for data verification in Blockchain. | Data integrity and ease of verification. | Scalability is limited. | Bitcoin, Ethereum |
Sharding [17,18,22] | A scalability method where data are distributed across different nodes | High performance and network capacity | Technical complexity | Ethereum 2.0, Zilliqa, Polkadot, Harmony, Elrond, Solana, Near Protocol | |
Smart Contract Based Data Storage | Smart Contract Data Storage [60,61] | Data storage in smart contracts | Direct access and flexibility | Direct access and flexibility | NFT metadata, ERC-20 token data |
Ethereum State Storage [62,63] | State of accounts and contracts on Ethereum | Fast access and constant updates | Blockchain may become state bloat | Ethereum, Polygon, Algorand, Solana, Sonic, Avax, Bsc | |
Blockchain Based Techniques | Blockweave [64,65,66] | Blockchain structure optimized for permanent data storage | Long-term data retention, immutability | Data cannot be updated and can be costly | Arweave. |
Transaction Metadata [67,68,69,70] | Additional information and hash data associated with the transaction | Small size additional data storage | Not suitable for big data | OP_RETURN (Bitcoin), Input Data (Etherium) | |
Logs and Transaction Data | Blockchain Logs [71,72,73] | Maintaining transaction history and event records | Transparency and transaction traceability | Scalability issues in big data | Ethereum event logs |
Data Storage Environment | Storage Mechanism | Description | Advantages | Disadvantages | Examples |
---|---|---|---|---|---|
Centralized Data Storage Systems | Cloud storage systems [82,83,84,85] | Data are stored in central data centers | Fast access, high performance. Reliability and scalability. Easy integration, wide range of services | Dependency on central authority, high cost. Data security depends on an external provider. Risk of single point of failure due to centralized structure. | Amazon Web Services, Google Cloud Platform, Azure Storage. |
Decentralized Systems (P2P) | IPFS [78,86] | Content-based data storage system in a distributed network | Decentralized, low cost | Data continuity depends on user participation. | IPFS |
Filecoin [75,76] | Blockchain-based data storage and incentive mechanism built on IPFS | Strong data continuity with incentive model | High transaction costs | Filecoin | |
Swarm [87] | Ethereum-based P2P data storage protocol | Flexible and compatible with Ethereum | Performance limitations may exist | Swarm protocol | |
Storj [79] | Blockchain integrated P2P storage solution. | Strong security and incentive model | Difficulty in coordination between users | Storj network | |
Sia [80] | Blockchain-based P2P data storage platform. | Low cost, supports data encryption | The scalability of the marketplace may be limited | Siacoin |
Data Storage Environment | Storage Mechanism | Implementation Strategy | Advantages | Disadvantages | Examples |
---|---|---|---|---|---|
Blockchain + Off-chain Integrations | IPFS CIDs [15,92] | Reference information on the blockchain for off-chain data | Verifiability of data | The data itself is not stored on the blockchain | IPFS integrations |
Distributed and Decentralized Cloud Solutions | Hybrid Cloud + Blockchain [42,93] | Integrated use of cloud infrastructures and blockchain | High scalability, low cost | Security may depend on external providers | Ankr, Ocean Protocol |
Lightning Network [94] | Channel-based transactions, results integration with blockchain | Fast transactions, low costs. | Only suitable for micro transactions | Bitcoin Lightning Network | |
Layer-2 Optimizations | Rollups [19,20] | Processing transactions at Layer-2 and saving summary data at Layer-1 | High scalability | Technical complexity | Arbitrum, zkSync |
Plasma [52,95] | Processing data on subchains and recording digests to the main blockchain | A reliable Layer-2 solution | Coordination between sub-chains can be difficult | OMG Network | |
State Channels [96,97] | Off-chain transactions are on the summary blockchain only | Very low latency | Complicated installation | Lightning Network |
Layer-2 Solution | Security Model | Advantages | Challenges/Limitations |
---|---|---|---|
ZK-Rollups | Cryptographic proofs (zero-knowledge) [95] | High security, fast verification [95] | High computational cost, proof generation delays [95] |
Optimistic Rollups | Fraud proof mechanism [96] | Lower costs, Layer-1 security [96] | Fraud proof verification delay (up to a week) [96] |
Plasma | Child chains linked to Layer-1 [97] | Faster transaction processing [97] | Exit fraud risks, complex withdrawals [97] |
State Channels | Off-chain transaction channels (e.g., Lightning Network) [97] | Instant transactions, high scalability [97] | Reduced decentralization, requires online counterparties [97] |
Reference Number | Storage Approach | Application Domains | Technology | Advantages | Disadvantages | Scenarios |
---|---|---|---|---|---|---|
[33,102,103] | Hybrid | Supply Chain and Logistics | Blockchain + IoT | Traceability, Automation, Secure Logistics | Implementation Complexity | Secured Supply Tracking, Food Traceability |
[43,100] | Hybrid | Financial Data Security and Compliance | Distributed Ledger and Cryptography | Secure Transactions, Privacy | Regulatory Complexity | DeFi, Corporate Auditing |
[104,105] | Hybrid | Public Administration, e-Government | Self-Sovereign Identity Management | Transparency, Corruption Prevention | Large-Scale Complexity | Digital Identity and Public Record Management |
[50,93] | Hybrid | IoT and Blockchain Security | Cryptographic Authentication, Decentralized Spectrum Sharing | Trust, Secure Connectivity | Interoperability Issues | IoT and Smart Device Security |
[10,77] | Off-chain | Decentralized Cloud Storage | IPFS | Scalable, Low Cost, Data Redundancy | Retrieval latency | P2P Cloud Storage, Enterprise Backup |
[80] | Off-chain | Decentralized Cloud Storage | P2P Storage (Sia) | Low-cost, encrypted storage | Dependence on network participants | Decentralized cloud, personal data storage |
[64,65,66] | On-chain | Permanent Data Storage | Blockweave (Arweave) | Immutability, Long-Term Data Retention | High Transaction Costs | Long-Term and Public Data Storage |
[12] | Off-chain | Blockchain-based Storage Networks | Decentralized Networks | Security, Distributed Storage | High Latency | Distributed File Storage |
[38,106,107] | Hybrid | Secure IoT Data Sharing | Blockchain and Privacy-Preserving Tech | Secure Access, Data Protection | High Processing Costs | IoT Smart Cities and Industries |
[108] | Hybrid | Cyber Threat Data Sharing | Blockchain + Edge Computing | Security, Trust | High Processing Overhead | Secure Cybersecurity Infrastructure |
Reference Number | Cryptographic Method | Storage Type | Application Domain | Security Requirement | Sectoral Applications | Advantages | Disadvantages |
---|---|---|---|---|---|---|---|
[114,118,126,127,128] | Asymmetric Encryption | On-chain, Off-chain | Authentication and data integrity | High | Healthcare, finance | High security, authorized access | Processing time is high |
[117,122,123,124,129] | Symmetric Encryption | Off-chain | Big data transfer | Medium | Healthcare, education, logistic | Provides fast data transfer | Key management issues |
[56,109,115,119,130,131,132] | Zero-Knowledge Proof (ZKP) | On-chain, Off-chain, Hybrid | Authentication and access control | High | Public sector, finance | Ensures privacy, verifies data | High computational cost |
[120,125,133,134,135,136] | Homomorphic Encryption | Off-chain, Hybrid | Performing operations on encrypted data | High | Healthcare, IoT | Protects data privacy, provides analysis | Implementation complexity |
[16,23,24,25] | Blockchain Hashing | On-chain | Data integrity and validation | Medium | Education, healthcare | Provides immutability | Inefficient on large datasets |
[58,59] | Threshold Cryptography | On-chain, Off-chain, Hybrid | Access control, key management | High | Healthcare, IoT | Provides decentralized key management | Implementation complexity |
[137,138,139,140] | Multi-Party Computation (MPC) | Off-chain, Off-chain, Hybrid | Private data sharing, access control | High | Healt, finance, IoT | Enables secure computation with data privacy | Computational complexity, high transaction cost |
[121,141,142,143] | Post-Quantum Cryptography | On-chain, Off-chain | Quantum-resistant data security | High | IoT, public sector, health | Resistant to quantum threats | Limited application in standardization |
Cryptographic Technique | Security Level | Computational Overhead | Performance Impact | Use Cases | References |
---|---|---|---|---|---|
Asymmetric Encryption (RSA, ECDSA, Ed25519) | High | High due to key size and modular exponentiation | Slow for large-scale transactions, high processing cost | Digital signatures, secure authentication, blockchain consensus mechanisms | [114,118,126,127,128] |
Symmetric Encryption (AES-256, ChaCha20) | High | Low, optimized for speed and efficiency | Fast and efficient, suitable for real-time processing | Encrypted storage, secure messaging, VPN encryption | [117,122,123,124,129] |
Zero-Knowledge Proofs (ZKP–SNARKs, STARKs) | Very High | Very High, requires complex proof generation | Slows down authentication due to proof verification time | Anonymous transactions, identity verification, privacy-focused blockchain applications | [56,109,115,119,130,131,132] |
Homomorphic Encryption (Fully Homomorphic Encryption—FHE) | Very High | Extremely High, impractical for real-time operations | Extremely slow, impractical for large-scale blockchain storage | Cloud computing, privacy-preserving smart contracts | [120,125,133,134,135,136] |
Hashing Mechanisms (SHA-256, Keccak, Blake2) | Medium | Low, designed for quick computation | Minimal impact, designed for rapid verification | Blockchain transaction integrity, data verification, proof-of-work mechanisms | [16,23,24,25] |
Access Control Mechanism | On-Chain | Off-Chain | Hybrid | Operational Characteristics of the Mechanisms |
---|---|---|---|---|
DAC (Discretionary Access Control) | ✔ | ✔ | DAC allows users to flexibly modify access rights but cannot be implemented on-chain due to blockchain’s immutability. Off-chain systems are suitable as they provide user authorization without requiring a central authority. Hybrid models enhance security by managing authorization off-chain while maintaining access records on-chain. | |
MAC (Mandatory Access Control) | ✔ | ✔ | MAC, which requires centralized authorization, aligns well with blockchain’s immutable and auditable structure. Off-chain solutions are unsuitable due to their decentralized nature. Hybrid models balance policy enforcement by storing access control rules on-chain while processing decision mechanisms off-chain for greater flexibility. | |
RBAC (Role-Based Access Control) | ✔ | ✔ | ✔ | Since roles can be stored immutably on the blockchain, on-chain implementation is feasible. However, for large-scale organizations, off-chain storage is preferable. Hybrid models provide flexible solutions by balancing security and scalability. |
ABAC (Attribute-Based Access Control) | ✔ | ✔ | ✔ | On-chain storage is appropriate for immutable attributes, but off-chain solutions improve update speed for frequently changing attributes. Hybrid models ensure flexibility by keeping static attributes on-chain while dynamically managing updates off-chain. |
PBAC (Policy-Based Access Control) | ✔ | ✔ | ✔ | For transparent policy recording, on-chain storage is ideal. Off-chain solutions enable quick responses to dynamic policy changes. Hybrid models maintain core policies on-chain while updating dynamic components off-chain to ensure balance. |
CBAC (Context-Based Access Control) | ✔ | ✔ | ✔ | Context-based access management can be implemented on-chain using immutable data. Off-chain storage provides real-time processing of contextual data, making it advantageous. Hybrid models log contextual changes on-chain while utilizing off-chain solutions to enhance processing speed. |
LBAC (Lattice-Based Access Control) | ✔ | ✔ | Lattice-based hierarchical access levels require immutable definitions, making on-chain storage suitable. Off-chain management is less effective. Hybrid models ensure on-chain security while managing updates off-chain, improving flexibility. | |
IBAC (Identity-Based Access Control) | ✔ | ✔ | ✔ | For user authentication, on-chain storage ensures immutable identity verification records. However, off-chain solutions are more practical for large-scale identity management. Hybrid models keep verification records on-chain while handling dynamic identity management off-chain. |
CapBAC (Capability-Based Access Control) | ✔ | ✔ | ✔ | Capability-Based Access Control (CapBAC), which governs token-based access rights, ensures on-chain security. Off-chain solutions are preferable for managing large datasets. Hybrid models enhance the scalability and security of capability-based access control mechanisms. |
OBAC (Organization-Based Access Control) | ✔ | ✔ | ✔ | Organization-Based Access Control (OBAC) policies are secured by storing them on-chain, but off-chain solutions are advantageous for frequently updated policies. Hybrid models integrate secure on-chain records with flexible off-chain processing mechanisms for dynamic policy management. |
Storage Method | Data Integrity Mechanism | Traceability | Sectoral Applications | Advantages | Disadvantages | Reference Number |
---|---|---|---|---|---|---|
On-chain | Hash-based verification | High | Healthcare, finance | Reliable verification, full traceability | High transaction cost | [31] |
Off-chain | Only hash data on blockchain | Medium | Education, Healthcare, logistic | Low cost, efficiency | Inadequate in areas requiring data security | [36] |
Hybrid | On-chain and off-chain integration | High | Healthcare, IoT | Provides balanced cost and safety | Requires complex configuration | [6,28,32,33,34,35,37,47,165] |
Reference Number | Sector | Recommended Storage Method | Application Domains | Security Need | Security Advantages | Disadvantages | Sample Projects |
---|---|---|---|---|---|---|---|
[151,152,166,167,168,169,170] | Healthcare | Hybrid (Blockchain + IPFS and Smart Contracts) | Patient data, electronic health records (EHR) | High | Ensures privacy and security, legal data protection | Integration challenges | MedRec, FHIRChain |
[43,100] | Finance | On-chain (DLT and Cryptography) | Credit history, transaction records | Medium | Provides data integrity and immutability | Costly and slow transaction speeds | Hyperledger Fabric |
[7,49,174] | Education | Off-chain (Blockchain + IPFS) | Sharing certificates, diploma, and degree | Low | Cost effectiveness, high data access speed | Dependency on centralized systems | IPFS Education Projects |
[103,171,172,173] | Supply Chain | Hybrid (Blockchain + IoT) | Product traceability, logistics management | High | Traceability, fast data processing | Complex configuration | IBM Food Trust |
[104,105,175] | Public Sector | On-chain (Self-Sovereign Identity and Digital ID Management) | Authentication, records management | High | Transparency, secure access | High transaction cost and speed limitations | Civic |
[50,51] | Internet of Things (IoT) | Hybrid (Blockchain + Cryptographic Authentication) | Sensor data, location data | Medium | Efficiency, low cost | Lack of data integrity and traceability | Helium Network |
Project Name | Underlying Infrastructure | Storage Type | Security Features | Application Domains | Advantages | Disadvantages | Reference Number |
---|---|---|---|---|---|---|---|
Filecoin | IPFS | Off-chain | Encryption, verifiable hashing | Distributed file storage | Decentralization, high security | Scaling challenges for big data | [75,76] |
Storj | Has its own distributed network | Off-chain | Encryption, multi-node storage | Cloud file storage | Strong encryption, user incentives | Slow, dependency on node participation | [79] |
Flux | IPFS, has its own infrastructure | Hybrid | Hash-based security | Decentralized applications (DApps) | High security and flexibility | High transaction costs | [30] |
Arweave | Arweave Protocol | On-chain | Permanent storage, hashing | Long-term data retention | Permanent data storage, censorship resistance | High transaction costs | [64,65,66] |
Sia | Has its own distributed network | Off-chain | Encryption, data shredding | Decentralized cloud storage | Economical storage, encryption support | Limitations in security protocols | [80] |
BitTorrent | Swarm, P2P Protocol | Off-chain | Component-based distribution | File sharing, content transfer | Fast content delivery, low bandwidth usage | Risk of hacking, security vulnerabilities | [176] |
Ankr | Has its own infrastructure | Hybrid | Encryption, source authentication | Enterprise solutions, cloud services | Resource efficiency, low cost | Complex configuration, intense competition | [162] |
Holo | Holochain | Off-chain | Cryptographic signatures | Dapp hosting | High scalability, user control | Early development stage | [161] |
Helium | Blockchain and IoT | Hybrid | Data transmission encryption | IoT data transfer, wireless network | Low-Cost Connectivity and Network Expansion Incentives | Limited coverage, limited to IoT | [153] |
Civic | Blockchain | On-chain | Authentication, data privacy | IoT security, user data control | Secure authentication, user-specific access | Compatibility difficulties, delays | [177] |
Criteria | On-Chain | Off-Chain | Hybrid | References |
---|---|---|---|---|
Transaction Speed | Low—Full node validation slows transactions | High—Off-chain solutions (Lightning Network, Rollups) improve speed | Medium-High—Hybrid balances both | [17,19,22] |
Scalability | Low—Block size and network congestion limit scalability | High—Off-chain solutions significantly enhance scalability | Medium—Hybrid solutions mitigate scalability issues | [18,19,97] |
Cost | Very High—Transaction fees depend on network demand | Low—Off-chain solutions lower transaction fees | Medium—Hybrid solutions balance cost factors | [12,15,22] |
Security | Very High—Data integrity and security ensured by consensus mechanisms | Low—Relies on third-party trust | Medium—Hybrid maintains some on-chain security | [36,47,109] |
Year | Data Storage and Processing Model | Application Domain | Key Applications | Underlying Technologies | Reference Number |
---|---|---|---|---|---|
2008 | On-chain | Finance | Bitcoin (Transaction Storage) | Merkle Trees, Proof-of-Work | [21] |
2013, 2014 | On-chain | Finance | Ethereum (Smart Contracts) | Ethereum State Storage, Solidity, and EVM | [74] |
2014 | Off-chain | Healthcare | IPFS, MedRec (EHR) | IPFS, Off-chain Hash Storage, Content Addressing | [78] |
2017 | Hybrid | Education | EduChain (Education records) | Blockchain-based Educaton Systems | [7,49] |
2018 | Off-chain | IoT | Blockchain-IoT Security | State Channels | [50,51] |
2018 | Layer-2 | Finance | Plasma-Based Scaling Solutions | State Channels, Optimistic Rollups | [17,52] |
2020 | Hybrid | Public | Blockchain for Government Services | e-Government, Digital Identity, Blockchain Identity Management | [175] |
2021 | Layer-2 | Finance | Zero-Knowledge Rollups | zk-SNARKs, zk-STARKs, Validity Proofs | [178,179] |
2022 | Hybrid | Cloud Computing | Hybrid Blockchain-Cloud Systems | Layer-2 Rollups, zk-SNARKs, Sharding | [42] |
2023 | Hybrid | Supply Chain | Blockchain-based drug supply chain | Plasma, Optimistic Rollups, Zero-Knowledge Proofs | [160,173] |
2023 | Layer-2 | Finance | Zero-Knowledge Rollups (ZKsync, StarkNet, Polygon zkEVM) | zk-SNARKs, zk-STARKs, Validity Proofs | [17,19] |
2024–2025 | On-chain | Finance and AI | AI-based Smart Contracts | AI + Blockchain, Large Language Models (LLM) + Smart Contracts | [159] |
2024–2025 | Hybrid | Interoperability Solutions | Cross-Blockchain Data Integration | Polkadot, Cosmos, Axelar, Interoperability Protocols | [179,180,181] |
2024–2025 | Layer-2 | Finance and Enterprise | Modular Blockchains (ZeroLayer, EigenLayer, Celestia) | Restaking, Data Availability Layers, Rollup-as-a-Service | [18] |
2025 | Layer-2 | IoT | Blockchain-IoT Integration, Smart Device Security | IoT Blockchain Net, Data Oracles, Privacy-Preserving Smart Contracts | [51,121] |
2025+ | Edge-integrated Hybrid (Edge Storage + On-chain Metadata + Off-chain Distributed Storage) | Healthcare, Industry 5.0, Smart Cities, Autonomous Systems, IoE | Real-time data processing, Decentralized data storage, Edge data analytics, Secure IoT communications | Blockchain, Edge Computing, IPFS, Asymmetric and Symmetric Cryptography | [182,183,184] |
Consensus Mechanism | Energy Consumption | Security Level | Scalability | Sustainability Impact | Examples |
---|---|---|---|---|---|
Proof-of-Work (PoW) | High [45,88] | Very High [92] | Low [101] | High carbon footprint [106] | Bitcoin, Ethereum (pre-merge) [21,22] |
Proof-of-Stake (PoS) | Low [94] | High [103] | High [108] | Energy-efficient [99] | Ethereum 2.0 [22], Cardano |
Delegated PoS (DPoS) | Very Low [85] | Medium [88] | Very High [92] | Sustainable [101] | EOS, TRON [190] |
Proof-of-Authority (PoA) | Very Low [106] | Medium [94] | High [99] | Sustainable [108] | VeChain, BSC [103] |
Criteria | Traditional Centralized Storage | Blockchain-Based Storage |
---|---|---|
Cost | Lower cost, cloud-based storage (AWS, Google Cloud) has flexible pricing models [103]. | Higher costs due to mining fees, redundancy, and data replication [97]. |
Performance | High performance, real-time processing [104]. | Lower throughput due to consensus mechanisms [110]. |
Scalability | Easily scalable with cloud services [103]. | Limited scalability, high transaction fees [97]. |
Security | Centralized security measures (firewalls, access control) [105]. | Cryptographic security, tamper-proof records [102]. |
Data Integrity | Prone to data breaches and insider threats [104]. | Data immutability ensures integrity [110]. |
Examples | SQL Databases, AWS S3, Google Cloud Storage [103]. | Filecoin, IPFS, Arweave [97]. |
Feature | Layer-1 Blockchain | Layer-2 Solutions |
---|---|---|
Security | Maximum security, but slow transaction finality [52] | Dependent on Layer-1, vulnerable to data availability attacks [96] |
Transaction Speed | Low (~15–30 TPS on Ethereum) [97] | High (~2000 TPS with ZK-Rollups, near-instant with State Channels) [97] |
Decentralization | Fully decentralized [52] | Partial decentralization (some Layer-2 solutions require trust assumptions) [96] |
Scalability | Limited, high transaction fees [52,97] | High scalability, but off-chain storage risks [96] |
Implementation Complexity | Directly operates on smart contracts [52] | Requires additional protocols and integration layers [95] |
Examples | Ethereum, Bitcoin [97] | ZK-Rollups, Optimistic Rollups, Plasma, State Channels [95,96] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Eren, H.; Karaduman, Ö.; Gençoğlu, M.T. Security Challenges and Performance Trade-Offs in On-Chain and Off-Chain Blockchain Storage: A Comprehensive Review. Appl. Sci. 2025, 15, 3225. https://doi.org/10.3390/app15063225
Eren H, Karaduman Ö, Gençoğlu MT. Security Challenges and Performance Trade-Offs in On-Chain and Off-Chain Blockchain Storage: A Comprehensive Review. Applied Sciences. 2025; 15(6):3225. https://doi.org/10.3390/app15063225
Chicago/Turabian StyleEren, Haluk, Özgür Karaduman, and Muharrem Tuncay Gençoğlu. 2025. "Security Challenges and Performance Trade-Offs in On-Chain and Off-Chain Blockchain Storage: A Comprehensive Review" Applied Sciences 15, no. 6: 3225. https://doi.org/10.3390/app15063225
APA StyleEren, H., Karaduman, Ö., & Gençoğlu, M. T. (2025). Security Challenges and Performance Trade-Offs in On-Chain and Off-Chain Blockchain Storage: A Comprehensive Review. Applied Sciences, 15(6), 3225. https://doi.org/10.3390/app15063225