User authentication using Blockchain based smart contract in role-based access control

被引:2
|
作者
Priyanka Kamboj
Shivang Khare
Sujata Pal
机构
[1] Indian Institute of Technology,Department of Computer Science & Engineering
关键词
Access control; Authentication; Blockchain; Security; Smart contracts;
D O I
暂无
中图分类号
学科分类号
摘要
Since the last few decades, information security has become a significant challenge for organizations’ system administrators. However, the Role-Based Access Control (RBAC) model has emerged as a viable solution for organizations to meet the security requirement due to its less administrative overhead. Blockchain technology is distributive and can be used effectively in user authentication and authorization challenges. This paper proposes an RBAC model using a blockchain-based smart contract for managing user-role permissions in the organization. We design a threat and security model to resist attacks such as man-in-the-middle attacks in an organization scenario. The proposed approach uses the Ethereum blockchain platform and its smart contract functionalities to model user-resource communications. The proposed method is tested on Ropsten Ethereum Test Network and evaluated to analyze user authentication, verification, cost, and security.
引用
收藏
页码:2961 / 2976
页数:15
相关论文
共 50 条
  • [1] User authentication using Blockchain based smart contract in role-based access control
    Kamboj, Priyanka
    Khare, Shivang
    Pal, Sujata
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 2961 - 2976
  • [2] RBAC-SC: Role-Based Access Control Using Smart Contract
    Cruz, Jason Paul
    Kaji, Yuichi
    Yanai, Naoto
    IEEE ACCESS, 2018, 6 : 12240 - 12251
  • [3] Combining authentication with role-based access control based on IBS
    Wang, Jin
    Yu, Jia
    Li, Daxing
    Jia, Zhongtian
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1475 - 1480
  • [4] Role-based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment
    Kim, Jinsu
    Park, Namje
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)
  • [5] Blockchain-Based Smart Contract Access Control System
    Dai, Weiqi
    Wang, Chenlong
    Cui, Changze
    Jin, Hai
    Lv, Xinqiao
    PROCEEDINGS OF 2019 25TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), 2019, : 19 - 23
  • [6] Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID
    Chen, Bing-Chang
    Yang, Cheng-Ta
    Yeh, Her-Tyan
    Lin, Ching-Chao
    APPLIED SCIENCES-BASEL, 2016, 6 (08):
  • [7] Permission and role automatic assigning of user in role-based access control
    韩道军
    卓汉逵
    夏兰亭
    李磊
    JournalofCentralSouthUniversity, 2012, 19 (04) : 1049 - 1056
  • [8] Permission and role automatic assigning of user in role-based access control
    Dao-jun Han
    Han-kui Zhuo
    Lan-ting Xia
    Lei Li
    Journal of Central South University, 2012, 19 : 1049 - 1056
  • [9] Permission and role automatic assigning of user in role-based access control
    Han Dao-jun
    Zhuo Han-kui
    Xia Lan-ting
    Li Lei
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2012, 19 (04) : 1049 - 1056
  • [10] Planning User Assignment in Administrative Role-Based Access Control
    Huang, Wei
    Yang, Yang
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 615 - +