User authentication using Blockchain based smart contract in role-based access control

被引:2
|
作者
Priyanka Kamboj
Shivang Khare
Sujata Pal
机构
[1] Indian Institute of Technology,Department of Computer Science & Engineering
关键词
Access control; Authentication; Blockchain; Security; Smart contracts;
D O I
暂无
中图分类号
学科分类号
摘要
Since the last few decades, information security has become a significant challenge for organizations’ system administrators. However, the Role-Based Access Control (RBAC) model has emerged as a viable solution for organizations to meet the security requirement due to its less administrative overhead. Blockchain technology is distributive and can be used effectively in user authentication and authorization challenges. This paper proposes an RBAC model using a blockchain-based smart contract for managing user-role permissions in the organization. We design a threat and security model to resist attacks such as man-in-the-middle attacks in an organization scenario. The proposed approach uses the Ethereum blockchain platform and its smart contract functionalities to model user-resource communications. The proposed method is tested on Ropsten Ethereum Test Network and evaluated to analyze user authentication, verification, cost, and security.
引用
收藏
页码:2961 / 2976
页数:15
相关论文
共 50 条
  • [21] Role-based access control on the web using LDAP
    Park, JS
    Ahn, GJ
    Sandhu, R
    DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 19 - 30
  • [22] Role-based access control using neural network
    Chae, SH
    Kim, W
    Kim, DK
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 36 - 40
  • [23] An application using role-based access control model
    Wang, G
    Cong, B
    Chen, N
    Lan, M
    Yan, HT
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 369 - 375
  • [24] Using NFS to implement role-based access control
    Gustafsson, M
    Deligny, B
    Shahmehri, N
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 299 - 304
  • [25] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [26] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [27] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [28] Password-based access control scheme with remote user authentication using smart cards
    Yang, Chen
    Ma, Wenping
    Huang, Benxiong
    Wang, Xinmei
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 448 - +
  • [29] Fabrication of Flexible Role-Based Access Control Based on Blockchain for Internet of Things Use Cases
    Zaidi, Tanzeel
    Usman, Muhammad
    Aftab, Muhammad Umar
    Aljuaid, Hanan
    Ghadi, Yazeed Yasin
    IEEE ACCESS, 2023, 11 (106315-106333) : 106315 - 106333
  • [30] Practical Role-Based Access Control
    Galante, Victoria
    INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73