A Comparative Study of Encryption-Based Access Control Schemes in Ethereum, Hyperledger Fabric, and Corda
Abstract
Blockchain technology has emerged as a transformative solution for decentralized and immutable data storage, offering transparency and security across various industries. However, ensuring authorized data access remains a critical challenge in blockchain systems. Encryption-based access control mechanisms are pivotal in mitigating unauthorized access, yet their implementation varies significantly across different blockchain platforms. This study provides a comprehensive comparison of encryption-based access control schemes in three prominent blockchain platforms: Ethereum, Hyperledger Fabric, and Corda. The analysis focuses on their strengths, weaknesses, and suitability for various use cases, evaluating security, scalability, and usability. The findings reveal distinct trade-offs among the platforms, highlighting the need for tailored solutions based on specific application requirements. Future research directions, including hybrid access control models and post-quantum cryptography, are also discussed.
References
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf.
Zhang, Y., et al. (2019). Access Control in Blockchain Systems: Challenges and Opportunities. IEEE Transactions on Dependable and Secure Computing.
Wang, H., et al. (2020). Attribute-Based Encryption for Fine-Grained Access Control in Blockchain Systems. Journal of Network and Computer Applications.
Hu, V. C., et al. (2013). Guide to Attribute-Based Access Control (ABAC) Definition and Considerations. NIST Special Publication.
Buterin, V. (2014). Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform. https://ethereum.org/en/whitepaper/.
Goyal, V., et al. (2006). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proceedings of the 13th ACM Conference on Computer and Communications Security.
Androulaki, E., et al. (2018). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proceedings of the Thirteenth EuroSys Conference.
Brown, R. G. (2016). Corda: An Introduction. R3 CEV.
Li, J., et al. (2021). Hybrid Access Control Models for Blockchain: A Survey. IEEE Access.
Atzei, N., et al. (2017). A Survey of Attacks on Ethereum Smart Contracts. International Conference on Principles of Security and Trust.
Androulaki, E., et al. (2018). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proceedings of the Thirteenth EuroSys Conference.
Brown, R. G. (2016). Corda: An Introduction. R3 CEV.
Li, J., et al. (2021). Hybrid Access Control Models for Blockchain: A Survey. IEEE Access.
Zheng, Z., et al. (2020). Blockchain Applications in Healthcare: A Systematic Review. Journal of Medical Systems.
J. Xu, L. Chen, Z. Wang, and S. Zhang, “A scalable attribute-based encryption scheme for blockchain-based access control,” IEEE Internet of Things Journal, vol. 9, no. 3, pp. 2180–2194, Feb. 2022. doi: 10.1109/JIOT.2021.3074986
M. Al-Bassam and M. Sonnino, “Ethereum 2.0: On the verge of scalability and security improvements,” IEEE Security & Privacy, vol. 20, no. 1, pp. 50–59, Jan.–Feb. 2022. doi: 10.1109/MSEC.2021.3134582
A. Ferrer, R. G. Brown, and M. Valenta, “Security and privacy in Corda-based distributed ledger applications,” Future Generation Computer Systems, vol. 139, pp. 121–133, Feb. 2023. doi: 10.1016/j.future.2022.09.012
Y. Liu, J. Li, and H. Wang, “Comparative evaluation of blockchain platforms for enterprise applications,” IEEE Access, vol. 10, pp. 87426–87439, 2022. doi: 10.1109/ACCESS.2022.3194872
S. Nakamura, P. K. Sharma, and M. Chen, “Access control in blockchain networks: A survey and taxonomy,” ACM Computing Surveys, vol. 55, no. 10, pp. 1–34, Nov. 2023. doi: 10.1145/3559852
Copyright (c) 2025 Godwin Mandinyenya, Vusumuzi Malele

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.








