A Comparative Study of Encryption-Based Access Control Schemes in Ethereum, Hyperledger Fabric, and Corda

  • Godwin Mandinyenya Doctorate Student
  • Vusumuzi Malele North-West University

Abstract

Blockchain technology has emerged as a transformative solution for decentralized and immutable data storage, offering transparency and security across various industries. However, ensuring authorized data access remains a critical challenge in blockchain systems. Encryption-based access control mechanisms are pivotal in mitigating unauthorized access, yet their implementation varies significantly across different blockchain platforms. This study provides a comprehensive comparison of encryption-based access control schemes in three prominent blockchain platforms: Ethereum, Hyperledger Fabric, and Corda. The analysis focuses on their strengths, weaknesses, and suitability for various use cases, evaluating security, scalability, and usability. The findings reveal distinct trade-offs among the platforms, highlighting the need for tailored solutions based on specific application requirements. Future research directions, including hybrid access control models and post-quantum cryptography, are also discussed.

References

Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf.

Zhang, Y., et al. (2019). Access Control in Blockchain Systems: Challenges and Opportunities. IEEE Transactions on Dependable and Secure Computing.

Wang, H., et al. (2020). Attribute-Based Encryption for Fine-Grained Access Control in Blockchain Systems. Journal of Network and Computer Applications.

Hu, V. C., et al. (2013). Guide to Attribute-Based Access Control (ABAC) Definition and Considerations. NIST Special Publication.

Buterin, V. (2014). Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform. https://ethereum.org/en/whitepaper/.

Goyal, V., et al. (2006). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proceedings of the 13th ACM Conference on Computer and Communications Security.

Androulaki, E., et al. (2018). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proceedings of the Thirteenth EuroSys Conference.

Brown, R. G. (2016). Corda: An Introduction. R3 CEV.

Li, J., et al. (2021). Hybrid Access Control Models for Blockchain: A Survey. IEEE Access.

Atzei, N., et al. (2017). A Survey of Attacks on Ethereum Smart Contracts. International Conference on Principles of Security and Trust.

Androulaki, E., et al. (2018). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proceedings of the Thirteenth EuroSys Conference.

Brown, R. G. (2016). Corda: An Introduction. R3 CEV.

Li, J., et al. (2021). Hybrid Access Control Models for Blockchain: A Survey. IEEE Access.

Zheng, Z., et al. (2020). Blockchain Applications in Healthcare: A Systematic Review. Journal of Medical Systems.

J. Xu, L. Chen, Z. Wang, and S. Zhang, “A scalable attribute-based encryption scheme for blockchain-based access control,” IEEE Internet of Things Journal, vol. 9, no. 3, pp. 2180–2194, Feb. 2022. doi: 10.1109/JIOT.2021.3074986

M. Al-Bassam and M. Sonnino, “Ethereum 2.0: On the verge of scalability and security improvements,” IEEE Security & Privacy, vol. 20, no. 1, pp. 50–59, Jan.–Feb. 2022. doi: 10.1109/MSEC.2021.3134582

A. Ferrer, R. G. Brown, and M. Valenta, “Security and privacy in Corda-based distributed ledger applications,” Future Generation Computer Systems, vol. 139, pp. 121–133, Feb. 2023. doi: 10.1016/j.future.2022.09.012

Y. Liu, J. Li, and H. Wang, “Comparative evaluation of blockchain platforms for enterprise applications,” IEEE Access, vol. 10, pp. 87426–87439, 2022. doi: 10.1109/ACCESS.2022.3194872

S. Nakamura, P. K. Sharma, and M. Chen, “Access control in blockchain networks: A survey and taxonomy,” ACM Computing Surveys, vol. 55, no. 10, pp. 1–34, Nov. 2023. doi: 10.1145/3559852

Published
2025-07-15
How to Cite
Mandinyenya, G., & Malele, V. (2025). A Comparative Study of Encryption-Based Access Control Schemes in Ethereum, Hyperledger Fabric, and Corda. Jurnal Ilmiah Computer Science, 4(1), 10-22. https://doi.org/10.58602/jics.v4i1.52