Granular Access Control in Decentralized Blockchain Networks using AI algorithms

Authors

  • Prof. David Kim Associate Professor of Data Science, Hanyang University, Seoul, South Korea Author

Keywords:

Artificial Intelligence, decentralized networks, blockchain, blockchain protocols

Abstract

In the growing blockchain technology decentralised networks demand strong and scalable access control solutions. ABAC and RBSE struggles with distributed systems. In blockchain network, Granular access control may leverage AI algorithms. To restrict access based on user behaviour, transaction pattern and network conditions dynamically, AI model utilizes Ml, DL and RL. This paper focuses on AI, blockchain, decentralized AI implementation and their advantages over traditional frameworks.

Downloads

Download data is not yet available.

References

Chen, H., & Liu, Y. (2021). Deep learning for access control in blockchain networks: A survey. Journal of Blockchain Technology, 5(2), 45-59.

Kshetri, N., & Voas, J. (2020). Blockchain-based access control for decentralized applications. IEEE Software, 37(1), 28-34.

Xie, Y., & Li, J. (2022). AI-driven security solutions in blockchain networks: Challenges and opportunities. Security and Privacy, 2(3), 145-159.

S. Kumari, “AI-Driven Cloud Transformation for Product Management: Optimizing Resource Allocation, Cost Management, and Market Adaptation in Digital Products ”, IoT and Edge Comp. J, vol. 2, no. 1, pp. 29–54, Jun. 2022

Pillai, Vinayak. “Implementing Efficient Data Operations: An Innovative Approach”. Asian Journal of Multidisciplinary Research & Review, vol. 3, no. 6, Dec. 2022, pp. 231-67, https://ajmrr.org/journal/article/view/241.

S. Kumari, “Agile Cloud Transformation in Enterprise Systems: Integrating AI for Continuous Improvement, Risk Management, and Scalability”, Australian Journal of Machine Learning Research & Applications, vol. 2, no. 1, pp. 416–440, Mar. 2022

Zhu, Yue, and Johnathan Crowell. "Systematic Review of Advancing Machine Learning Through Cross-Domain Analysis of Unlabeled Data." Journal of Science & Technology 4.1 (2023): 136-155.

Sangaraju, Varun Varma, and Senthilkumar Rajagopal. "Applications of Computational Models in OCD." In Nutrition and Obsessive-Compulsive Disorder, pp. 26-35. CRC Press.

Sivaraman, Hariprasad. "Self-Healing Test Automation Frameworks Using Reinforcement Learning for Full-Stack Test Automation." Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-E210. DOI: doi. org/10.47363/JAICC/2022 (1) E210 J Arti Inte & Cloud Comp 1.4 (2022): 2-4.

Singu, Santosh Kumar. "Impact of Data Warehousing on Business Intelligence and Analytics." ESP Journal of Engineering & Technology Advancements 2.2 (2022): 101-113.

S. Kumari, “AI-Enhanced Agile Development for Digital Product Management: Leveraging Data-Driven Insights for Iterative Improvement and Market Adaptation”, Adv. in Deep Learning Techniques, vol. 2, no. 1, pp. 49–68, Mar. 2022

S. Kumari, “AI-Driven Cybersecurity in Agile Cloud Transformation: Leveraging Machine Learning to Automate Threat Detection, Vulnerability Management, and Incident Response”, J. of Art. Int. Research, vol. 2, no. 1, pp. 286–305, Apr. 2022

Sangaraju, Varun Varma, and Kathleen Hargiss. "Zero trust security and multifactor authentication in fog computing environment." Available at SSRN 4472055.

Sivaraman, Hariprasad. (2022). Adaptive Thresholding in ML-Driven Alerting Systems for Reducing False Positives in Production Environments. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT. 6. 10.55041/IJSREM11938.

Pillai, V. “Data Analytics and Engineering in Automobile Data Systems”. Journal of Science & Technology, vol. 4, no. 6, Dec. 2023, pp. 140-79, https://thesciencebrigade.com/jst/article/view/520

S. Kumari, “Cybersecurity in Digital Transformation: Using AI to Automate Threat Detection and Response in Multi-Cloud Infrastructures ”, J. Computational Intel. & Robotics, vol. 2, no. 2, pp. 9–27, Aug. 2022

Sivaraman, Hariprasad. "Behavior-Based DDoS Detection for Multi-Vector Attacks in Hybrid Cloud Environments." Sivaraman H. Behavior-Based DDoS Detection for Multi-Vector Attacks in Hybrid Cloud Environments.

Zhang, H., & Wu, Z. (2021). Reinforcement learning for decentralized access control in blockchain networks. Journal of Cryptography and Information Security, 10(2), 98-110.

Zheng, Z., & Zhang, H. (2020). Blockchain and artificial intelligence: The convergence of two disruptive technologies. Blockchain Research Journal, 9(4), 80-92.

Singh, A., & Sharma, V. (2021). Privacy-preserving AI models for blockchain networks. International Journal of Cybersecurity, 13(2), 99-114.

Kumar, S., & Agarwal, R. (2022). Machine learning algorithms for blockchain security: A review. Computational Intelligence and Security, 11(1), 12-25.

Patel, M., & Jain, A. (2021). Blockchain and machine learning for secure access control. International Journal of Information Security, 15(3), 45-59.

Wang, Y., & Tan, X. (2020). Federated learning for decentralized access control in blockchain systems. Journal of AI and Blockchain, 3(4), 203-215.

Zhang, W., & Li, P. (2021). Dynamic access control for blockchain systems using AI techniques. Journal of Cybersecurity Research, 7(1), 66-78.

Downloads

Published

20-01-2023

How to Cite

[1]
Prof. David Kim, “Granular Access Control in Decentralized Blockchain Networks using AI algorithms”, American J Data Sci Artif Intell Innov, vol. 3, pp. 1–5, Jan. 2023, Accessed: Mar. 07, 2026. [Online]. Available: https://ajdsai.org/index.php/publication/article/view/5