Academic institutions have become prominent targets for evolving cyber threats, including ransom ware, credential theft, data manipulation attacks, and intellectual-property exploitation. Traditional centralized security infrastructures used in universities are increasingly inadequate due to distributed learning environments, large user populations, and heterogeneous digital ecosystems. This paper proposes a block chain-enabled cyber security framework designed to enhance trust, transparency, and security in academic networks. A permissioned block chain model is implemented to secure academic credentials, research data, and access-control logs. Experimental evaluation using hyper ledger Fabric demonstrates improvements in integrity assurance, tamper resistance, and detection of unauthorized record modification. Comparative performance testing with conventional database systems shows enhanced traceability and reduced vulnerability to manipulation. The results indicate that block chain technologies can effectively strengthen cyber Defense mechanisms in academic environments and provide a trustworthy foundation for secure digital academic ecosystems.
100
75
43
100
75
43
100
75
43
Copyright © 2026, This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC-BY-NY-SA). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Corresponding Author: YEGIREDDI RAMESH, rameshyegireddi@gmail.com
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
Conflict of interest: The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher’s note: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
Or share your Opinion
In the state of affairs of industrialization, requirements of the international strength crisis, including environmental pollution and smart...
Driver fatigue and drowsiness are major causes of road accidents worldwide, emphasizing the need for an efficient and...
Phishing is one of the most prevalent cyber threats, where attackers deceive users through fraudulent websites or URLs...
As an extension of cloud services to the edge, Fog computing is a current paradigm for latency-sensitive and...
The world's food supply relies on individual with small holding farmers, but these farmers frequently lack access to...
Comments(0)