Role and attribute-based access control scheme for decentralized medicine supply chain

被引:0
|
作者
Hathaliya, Jigna J. [1 ]
Tanwar, Sudeep [1 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad 382481, Gujarat, India
关键词
InterPlanetary file system; Hyperledger Fabric; Medicine supply chain; Hyperledger Calliper; Role based access control; Attribute based access control; Blockchain; TRACEABILITY;
D O I
10.1016/j.jisa.2024.103851
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The medicine supply chain (MSC) is an intricate structure that extends across multiple organizations and geographic locations and is an important basis for essential daily services. It involves manufacturing, distributing, and delivering medicine to patients. The intermediaries in the MSC include manufacturers, warehouses, distributors, transporters, retailers, consumers, and patients, in which each intermediary plays a vital role and responsibility in an MSC. MSC poses different challenges, such as medicine counterfeiting, data temperament, and cold chain shipping, leading to various security and privacy issues. To overcome the aforementioned issues, public blockchain (BC) provides transparency, traceability, and data security to some extent but often fails to protect MSC's data privacy. To address the aforementioned, we adopted the Hyperledger Fabric consortium BC, which preserves the data security and privacy of the proposed scheme. Hyperledger Fabric uses a role-based access control (RBAC) policy for all writers and readers, where each reader and writer accesses all the smart contract information based on their static roles (reader and writer). This RBAC scheme limits the dynamicity and granularity of the access control. With this concern, we adopt the combination of RBAC and attribute-based access control (ABAC) schemes to provide fine-grained access to the smart contract functions. Additionally, we use a distributed interplanetary file system (IPFS) to enhance the scalability of the proposed scheme. Before saving data, IPFS does not use any encryption algorithm. We embraced the advanced encryption standard (AES) algorithm to encrypt MSC data. Next, we integrated RBAC and fine-grained ABAC through smart contracts to prevent unauthorized access in an MSC environment. Further, the proposed scheme is evaluated using various performance parameters, such as scalability for different number of clients, average latency (0.12 s), minimum execution time is around (115 s) for 100 transactions execution, and throughput of (72.5) transactions per second (TPS) of invoke-based smart contract functions while 618.7 (TPS) for query-based smart contract functions.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [2] Smart Supply Chain Management with Attribute-Based Encryption Access Control
    Shittu, Habeeb
    Nabil, Mahmoud
    [J]. 2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 198 - 204
  • [3] A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management
    Ruan, Conghao
    Hu, Chunqiang
    Zhao, Ruifeng
    Liu, Zewei
    Huang, Hongyu
    Yu, Jiguo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 17656 - 17665
  • [4] Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain
    Liu, Chenlei
    Xiang, Feng
    Sun, Zhixin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Verleker, Ashwin Prabhu
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 391 - 399
  • [6] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (02) : 194 - 206
  • [7] Attribute-Based Access Control Scheme in Federated IoT Platforms
    Sciancalepore, Savio
    Pilc, Michal
    Schroeder, Svenja
    Bianchi, Giuseppe
    Boggia, Gennaro
    Pawlowski, Marek
    Piro, Giuseppe
    Plociennik, Marcin
    Weisgrab, Hannes
    [J]. INTEROPERABILITY AND OPEN-SOURCE SOLUTIONS FOR THE INTERNET OF THINGS (INTEROSS-IOT 2016), 2017, 10218 : 123 - 138
  • [8] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370
  • [9] An Attribute-based Access Control Scheme in Cloud Storage Environment
    Xing, M. H.
    Li, W. M.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 129 - 134
  • [10] Attribute-based bilateral access control scheme for cloud storage
    Li, Qi
    Fan, Haoyuan
    Chen, Wei
    Xiong, Jinbo
    Han, Lidong
    Li, Rui
    [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 128 - 136