User authentication using Blockchain based smart contract in role-based access control

被引:2
|
作者
Priyanka Kamboj
Shivang Khare
Sujata Pal
机构
[1] Indian Institute of Technology,Department of Computer Science & Engineering
关键词
Access control; Authentication; Blockchain; Security; Smart contracts;
D O I
暂无
中图分类号
学科分类号
摘要
Since the last few decades, information security has become a significant challenge for organizations’ system administrators. However, the Role-Based Access Control (RBAC) model has emerged as a viable solution for organizations to meet the security requirement due to its less administrative overhead. Blockchain technology is distributive and can be used effectively in user authentication and authorization challenges. This paper proposes an RBAC model using a blockchain-based smart contract for managing user-role permissions in the organization. We design a threat and security model to resist attacks such as man-in-the-middle attacks in an organization scenario. The proposed approach uses the Ethereum blockchain platform and its smart contract functionalities to model user-resource communications. The proposed method is tested on Ropsten Ethereum Test Network and evaluated to analyze user authentication, verification, cost, and security.
引用
收藏
页码:2961 / 2976
页数:15
相关论文
共 50 条
  • [31] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136
  • [32] Medical Record Information Storage Scheme based on Blockchain and Attribute Role-Based Access Control
    Bian, Aoao
    Han, Dezhi
    Cui, Mingming
    Li, Dun
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2024, 21 (03) : 807 - 830
  • [33] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
  • [34] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [35] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [36] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
  • [37] An Efficient Authentication System to Access Electric Vehicle Data in The Cloud Based on Identity Role-based Access Control
    Sudarsono, Amang
    Sudibyo, Rahardhita Widyatra
    Winarno, Idris
    Yuliana, Mike
    2024 INTERNATIONAL ELECTRONICS SYMPOSIUM, IES 2024, 2024, : 207 - 214
  • [38] Migrating to role-based access control
    Brooks, K
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
  • [39] Study of Role-based Access Control
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [40] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +