ORIGINAL RESEARCH article
Front. Blockchain
Sec. Blockchain Security and Privacy
Volume 8 - 2025 | doi: 10.3389/fbloc.2025.1636056
BC2P-1305: An Enhanced Data Security in Cloud Computing Network Using Blockchain based ChaCha20-Poly1305 Cryptography
Provisionally accepted- SRM Institute of Science and Technology (Deemed to be University), Kattankulathur, India
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
As cloud computing becomes more prevalent, the need for robust data security to address issues related to confidentiality, integrity, and access control has grown significantly. This paper introduces BC2P-1305, a cloud security framework that combines blockchain technology with the ChaCha20-Poly1305 cryptographic algorithm. The framework utilizes ChaCha20-Poly1305 for efficient encryption and authentication, offering low latency and strong protection against cryptographic attacks. Blockchain is employed for secure, tamper-proof metadata storage and integrity checks, while smart contracts automate and enforce detailed access control policies. Additionally, a secure key management system ensures that decryption keys are provided only to authorized users. Experimental results show that BC2P-1305 outperforms current technologies such as AES-GCM and RSA (2048-bit) across several performance metrics. Encryption latency is reduced by 40% compared to AES-GCM and 75% compared to RSA, while decryption latency is 35% and 80% lower, respectively. The blockchain transaction processing time using a Proof-of-Authority consensus mechanism is 60% faster than that of Proof-of-Work systems. Furthermore, BC2P-1305 shows a 30% reduction in CPU and memory usage and a 20% improvement in throughput over AES-GCM. These findings demonstrate that BC2P-1305 is scalable, efficient, and well-suited for securing cloud data, offering a promising solution to modern cloud security challenges.
Keywords: Access control, Blockchain, Cloud computing, data security, encryption
Received: 27 May 2025; Accepted: 24 Sep 2025.
Copyright: © 2025 Golla Bala and S. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Renuka Golla Bala, gr3259@srmist.edu.in
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.