BLOCKCHAIN-BACKED ZERO TRUST NETWORKING FOR SECURE EVENT LOGGING AND POLICY-GUIDED DATA ACCESS
DOI:
https://doi.org/10.64751/ajaccm.2026.v6.n2.pp500-509Keywords:
Zero Trust Network Access, Secure File Access, Blockchain Technology, Advanced Encryption Standard (AES), Role-Based Access Control.Abstract
The rapid growth of digital data sharing and remote access has increased the need for secure, reliable, and transparent access control mechanisms. Traditional network security models rely on perimeterbased defenses, assuming that users inside the network are trustworthy. However, with the rise of insider threats, data breaches, and distributed environments, these models have become insufficient. Ensuring data integrity, confidentiality, and accountability has become a major challenge in modern systems. Conventional file access systems typically depend on centralized architectures and static authentication mechanisms. These systems are vulnerable to single points of failure, unauthorized access, and data tampering. Moreover, activity logs stored in centralized servers can be altered or deleted, making it difficult to trace malicious actions. Lack of fine-grained access control and transparency further weakens system security. To address these issues, there is a need for a more robust and trustless security model that continuously verifies users and ensures secure data handling. A decentralized approach combined with strong encryption and immutable logging can significantly enhance system reliability and trust. The proposed system introduces a secure file access framework based on Zero Trust Network Access (ZTNA) principles, integrating blockchain technology for tamper-proof logging and verification. Files are encrypted using Advanced Encryption Standard (AES) before storage, ensuring data confidentiality. Blockchain is utilized to store file hashes, user credentials, and activity logs, providing immutability and transparency. Role-based access control is implemented to restrict data access based on user privileges, allowing only authorized users to retrieve sensitive information. This approach enhances data security, prevents unauthorized modifications, and ensures accountability through permanent audit trails. By eliminating reliance on centralized control and enabling continuous verification through ZTNA, the system provides a scalable and resilient solution for secure data sharing in modern distributed environments.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.







