Geo-Blockchain Split-ID Verification (GBSIV) Framework: A Secure and Adaptive Authentication Model for Cloud Document Verification

Main Article Content

B. Angel Rubavathy, Rebecca Jeyavadhanam Balasundaram, S. Albert Antony Raj

Abstract

Cloud computing revolutionized the storage and retrieval of data, but privacy concerns and unauthorized access still hover on the horizon. Current systems such as Digi Locker only provide e-document storage without end-to-end security components such as fine-grained access control, decentralized identity management and adaptive authentication. OTP-based verification systems continue to be vulnerable to interception, intrinsic cloud document verification vulnerabilities such as OTP system security vulnerabilities, decentralized identity infrastructure vulnerabilities. Thus introduced our proposed work the Geo-Blockchain Split-ID Verification (GBSIV) Framework that incorporates blockchain-based OTP authentication, Self-Sovereign Identity (SSI) and geospatial authentication for cloud document security. GBSIV Framework achieves effective resource allocation based on a multi-tenant approach, Sensitive Document Analyzer offers encryption and OTP-based authentication to facilitate secure access to documents Blockchain based split verification for decentralized verification providing transparency and security to authentication. The main feature is the Geo-Blockchain Split OTP Mechanism, where OTPs are split and distributed by various secure paths (SMS, email, encrypted messaging apps) to make it impossible for interception attacks to occur. Geospatial Location Enforcement provides additional enhancement in security through limiting document access to specific geographical locations. The blockchain-based system, including privacy and government-issued authentication support. By synthesizing these higher-order security controls, the GBSIV Framework constitutes a scalable, secure and responsive model of verification that offers sophisticated protection for sensitive document validation to high-security scenarios.

Article Details

Section
Articles