Strengthening Web3 Data Confidentiality Through Blockchain-Enabled Multifactor Authentication: A Comparative Security Evaluation


Authors : Asheshemi Nelson Oghenekevwe; Okoro Akpohrobaro Daniel; Ayeh Blessing Elohor; Ayo Michael Ifioko; Obode Aghogho Micheal; Atuduhor Oghenerukevwe Regha

Volume/Issue : Volume 10 - 2025, Issue 10 - October


Google Scholar : https://tinyurl.com/musddwpz

Scribd : https://tinyurl.com/4ucerjfw

DOI : https://doi.org/10.38124/ijisrt/25oct1052

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : Developments of Web 3.0 technologies present vital problems regarding data confidentiality, authentication of users and their privacy in decentralised systems. The traditional multifactor authentication (MFA) systems have been effective when deployed in Web2 environments but have failed in protecting sensitive information in the decentralised environment because they use centralised servers and are also dependent on static security factors. The paper explores the concept of multifactor authentication that is based on blockchain technology as the effective method of improving the use of data confidentiality in Web3. A blockchain-augmented MFA infrastructure was created on the basis of an Ethereum smart contract, decentralised storage, and biometric data that were cryptographically encrypted. Simulation demonstrated significant increases in security relative to conventional MFA systems, a significant drop in the probability of breaching (0.0270 to 0.0040), an improvement in the entropies, a decrease in the likelihood of session hijacking, and limited mutual information leakage. Also, the blockchain-based system becomes more resistant to Man-in-the-Middle (MITM) and phishing attacks, mitigating them by about 60 per cent and 50 per cent success rates, respectively. Whereas the blockchain MFA made some minor sacrifices in latency and computation cost in the course of authentication, such a trade of costs is productive in the Web3 environment where security and data integrity remain of utmost importance. The study could be useful to developers, security practitioners and policymakers who intend to develop more secure, scalable, and user-centric authentication mechanisms in decentralised apps. As a potential improvement, it is suggested that future research should implement the aspect of consensus optimisation and Layer-2 to increase the efficiency and scalability further.

Keywords : Blockchain, Data Confidentiality, Decentralized Applications, Multifactor Authentication, Privacy, Security, Web3.

References :

  1. Abdelhamid, M., Sliman, L., Ben Djemaa, R., & Perboli, G. (2024). A Review on Blockchain Technology, Current Challenges, and AI-Driven Solutions. ACM Computing Surveys57(3), 1-39.
  2. Almadani, M. S., Alotaibi, S., Alsobhi, H., Hussain, O. K., & Hussain, F. K. (2023). Blockchain-based multi-factor authentication: A systematic literature review. Internet of Things23, 100844.
  3. Berrios Moya, J. A., Ayoade, J., & Uddin, M. A. (2025). A Zero-Knowledge Proof-Enabled Blockchain-Based Academic Record Verification System. Sensors25(11), 3450.
  4. BV, C. (2023). Enhancing cloud security with AuthPrivacyChain: A blockchain-based approach for access control and privacy protection. Enhancing Cloud Security with AuthPrivacyChain: A Blockchain-based Approach for Access Control and Privacy Protection11(6s), 370-384.
  5. Faruk, M. J. H., Raya, P., Siam, M. K., Cheng, J. Q., Shahriar, H., Cuzzocrea, A., & Bringas, P. G. (2024). A Systematic Literature Review of Decentralized Applications in Web3: Identifying Challenges and Opportunities for Blockchain Developers. In 2024 IEEE International Conference on Big Data (BigData) (pp. 6240-6249). IEEE.
  6. Gupta, M., Tanwar, S., Bhatia, T. K., Badotra, S., & Hu, Y. C. (2024). A comparative study on blockchain-based distributed public key infrastructure for IoT applications. Multimedia Tools and Applications83(12), 35471-35496.
  7. He, J., Zheng, D., Guo, R., Chen, Y., Li, K., & Tao, X. (2021). Efficient identity-based proxy re-encryption scheme in blockchain-assisted decentralized storage system. International Journal of Network Security23(5), 776-790.
  8. Khashan, O. A., Alamri, S., Alomoush, W., Alsmadi, M. K., Atawneh, S., & Mir, U. (2023). Blockchain-Based Decentralized Authentication Model for IoT-Based E-Learning and Educational Environments. Computers, Materials & Continua75(2).
  9. Oduselu-Hassan, O. E. (2025). A Second-Order Imex-Rk Approach for Energy-Stable Phase Field Crystal Simulations. Asian Basic and Applied Research Journal7(1), 193-202.
  10. Oduselu-Hassan, O. E., Onyeoghane, J. N., & Njoseh, I. N. (2025). Analytic Error Estimates in Semi-Discretization of the Stochastic Cahn-Hilliard Equation. Asian Journal of Pure and Applied Mathematics7(1), 36-46.
  11. Oladayo, O. H. (2025). Advancing Hybrid Numerical Methods for Nonlinear Stochastic Differential Equations: Applications in Complex Systems. Asian Journal of Research in Computer Science18(1), 124-132.
  12. Punia, A., Gulia, P., Gill, N. S., Ibeke, E., Iwendi, C., & Shukla, P. K. (2024). A systematic review on blockchain-based access control systems in cloud environment. Journal of Cloud Computing13(1), 146.
  13. Ranjan, A. K., & Kumar, P. (2025). A survey on blockchain-based privacy preserving techniques for edge internet of things. International Journal of Computers and Applications, 1-12.
  14. Ray, P. P. (2023). Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions. Internet of Things and Cyber-Physical Systems3, 213-248.
  15. Sah, C. P., Kaur, M., & Singh, G. (2024). Efficiency of Zero-Knowledge Proofs: A Through Review and Analysis. In 2024 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA) (pp. 1-7). IEEE.
  16. Shafik, W. (2024). Blockchain-based internet of things (B-IoT): Challenges, solutions, opportunities, open research questions, and future trends. Blockchain-based internet of things, 35-58.
  17. Sharma, P. C., Mahmood, M. R., Raja, H., Yadav, N. S., Gupta, B. B., & Arya, V. (2023). Secure authentication and privacy-preserving blockchain for industrial internet of things. Computers and Electrical Engineering108, 108703.
  18. Singh, A., Chandra, H., Rana, S., & Chhikara, D. (2024). Blockchain based authentication and access control protocol for IoT. Multimedia Tools and Applications83(17), 51731-51753.
  19. Soni, P., Islam, S. H., Pal, A. K., Mishra, N., & Samanta, D. (2024). Blockchain-based user authentication and data-sharing framework for healthcare industries. IEEE Transactions on Network Science and Engineering.
  20. Tang, Y., Zhang, Y., Niu, T., Li, Z., Zhang, Z., Chen, H., & Zhang, L. (2024). A Survey on Blockchain-Based Federated Learning: Categorization, Application and Analysis. CMES-Computer Modeling in Engineering & Sciences139(3).
  21. Wang, J., Jiao, Z., Chen, J., Hou, X., Yang, T., & Lan, D. (2023). Blockchain-Aided secure access control for UAV computing networks. IEEE Transactions on Network Science and Engineering.
  22. Wu, T., Wang, W., Zhang, C., Zhang, W., Zhu, L., Gai, K., & Wang, H. (2022). Blockchain-based anonymous data sharing with accountability for Internet of Things. IEEE Internet of Things Journal10(6), 5461-5475.

Developments of Web 3.0 technologies present vital problems regarding data confidentiality, authentication of users and their privacy in decentralised systems. The traditional multifactor authentication (MFA) systems have been effective when deployed in Web2 environments but have failed in protecting sensitive information in the decentralised environment because they use centralised servers and are also dependent on static security factors. The paper explores the concept of multifactor authentication that is based on blockchain technology as the effective method of improving the use of data confidentiality in Web3. A blockchain-augmented MFA infrastructure was created on the basis of an Ethereum smart contract, decentralised storage, and biometric data that were cryptographically encrypted. Simulation demonstrated significant increases in security relative to conventional MFA systems, a significant drop in the probability of breaching (0.0270 to 0.0040), an improvement in the entropies, a decrease in the likelihood of session hijacking, and limited mutual information leakage. Also, the blockchain-based system becomes more resistant to Man-in-the-Middle (MITM) and phishing attacks, mitigating them by about 60 per cent and 50 per cent success rates, respectively. Whereas the blockchain MFA made some minor sacrifices in latency and computation cost in the course of authentication, such a trade of costs is productive in the Web3 environment where security and data integrity remain of utmost importance. The study could be useful to developers, security practitioners and policymakers who intend to develop more secure, scalable, and user-centric authentication mechanisms in decentralised apps. As a potential improvement, it is suggested that future research should implement the aspect of consensus optimisation and Layer-2 to increase the efficiency and scalability further.

Keywords : Blockchain, Data Confidentiality, Decentralized Applications, Multifactor Authentication, Privacy, Security, Web3.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe