Browse > Article
http://dx.doi.org/10.9708/jksci.2022.27.11.001

Contract-based Access Control Method for NFT Use Rights  

Jeong, Yoonsung (Dept. of Computer Science, Sogang University)
Ko, Deokyoon (Noncelab Inc.)
Seo, Jungwon (Dept. of Computer Science, Sogang University)
Park, Sooyong (Dept. of Computer Science, Sogang University)
Kim, Seong-Jin (Dept. of Future & Smart Construction Research, Korea Institute of Civil Engineering and Building Technology(KICT))
Kim, Bum-Soo (Dept. of Future & Smart Construction Research, Korea Institute of Civil Engineering and Building Technology(KICT))
Kim, Do-Young (Dept. of Future & Smart Construction Research, Korea Institute of Civil Engineering and Building Technology(KICT))
Abstract
In this paper, we propose an NFT(Non-Fungible Token)-based access control method for safely sharing data between users in blockchain environment. Since all data stored in the blockchain can be accessed by anyone due to the nature of the technology, it is necessary to control access except for authorized users when sharing sensitive data. For that, we generate each data as NFT and controls access to the data through the smart contract. In addition, in order to overcome the limitations of single ownership of the existing NFT, we separated the NFT into ownership and use rights, so that data can be safely shared between users. Ownership is represented as an original NFT, use rights is represented as a copied NFT, and all data generated as NFT is encrypted and uploaded, so data can be shared only through the smart contract with access control. To verify this approach, we set up a hypothetical scenario called Building Information Modeling (BIM) data trade, and deployed a smart contract that satisfies 32 function call scenarios that require access control. Also, we evaluated the stability in consideration of the possibility of decryption through brute-force attack. Through our approach, we confirmed that the data can be safely shared between users in blockchain environment.
Keywords
Blockchain; Data Access Control; Smart Contract; NFT; IPFS; Data Share;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 N. M. M. Alhag and Y. A. Mohamed, "An Enhancement of Data Encryption Standards Algorithm (DES)", 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE). IEEE, pp.1-6, August 2018. https://doi.org/10.1109/ICCCEEE.2018.8515843.   DOI
2 Q. Zheng, Y. Li, and P. Chen, "An Innovative IPFS-Based Storage Model for Blockchain", 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE, pp.704-708, December 2018. https://doi.org/10.1109/WI.2018. 000-8.   DOI
3 M. A. Al-Shabi, "A Survey on Symmetric and Asymmetric Cryptography Algorithms in Information Security", International Journal of Scientific and Research Publications (IJSRP), 9(3), 576-589, March 2019. https://doi.org/10. 29322/IJSRP.9.03.2019.p8779.   DOI
4 F. Thouvenin and A. Tamo-Larrieux, "Data Ownership and Data Access Rights: Meaningful Tools for Promoting the European Digital Single Market?", Big Data and Global Trade Law, M. Burri, Ed. Cambridge: Cambridge University Press, pp.316-339, July 2021. http://dx.doi.org/ 10.1017/9781108919234.020.   DOI
5 F. Mallouli, A. Hellal, N. S. Saeed, F. A. Alzahrani, "A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms", 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE, pp.173-176, June 2019. https://doi.org/10.1109/CSCloud/EdgeCom.2019.00022.   DOI
6 Y. Yusfrizal, A. Meizar, H. Kurniawan, and F. Agustin, "Key Management using Combination of Diffie-Hellman Key Exchange with AES Encryption", 2018 6th International Conference on Cyber and IT Service Management (CITSM). IEEE, pp.1-6, August 2018. https://doi.org/10.1109/CITSM.2018.8674278.   DOI
7 M. U. Aftab, Z. Qin, Zakria, S. Ali, Pirah, and J. Khan, "The Evaluation and Comparative Analysis of Role based Access Control and Attribute based Access Control Model", 2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP). IEEE, December 2018. https://doi.org/ 10.1109/ICCWAMTIP.2018.8632578.   DOI
8 EIP 20: Token Standard [Internet], https://eips.ethereum.org/EIPS/eip-20 (Checked on 20th September 2022)
9 J. Seo, D. Ko, S. Park, S. Kim, B. Kim, and D. Kim, "Design and Implementation of a Blockchain System for Storing BIM Files in a Distributed Network Environment", Journal of the Korea Society of Computer and Information, vol.26, no.12, pp.159-168, December 2021. https://doi.org/ 10.9708/jksci.2021.26.12.159.   DOI
10 B. Vitalik, "A Next-Generation Smart Contract and Decentralized Application Platform", White Paper, 3(37), 2-1, December 2014. https://nft2x.com/wp-content/uploads/20 21/03/EthereumWP.pdf.
11 A. Menezes and D. Stebila, "The Advanced Encryption Standard: 20 Years Later", IEEE Security & Privacy, 19(6), 98-102, October 2021. https://doi.org/10.1109/MSEC.2021. 3107078.   DOI
12 A. S. E. Pradeep, T. W. Yiu, and R. Amor, "Leveraging Blockchain Technology in a BIM Workflow: A Literature Review", International Conference on Smart Infrastructure and Construction 2019 (ICSIC) Driving Data-informed Decision-making, ICE Publishing, pp.371-380, July 2019. https://doi.org/10.1680/icsic.64669.371.   DOI
13 N. O. Nawari and S. Ravindran, "Blockchain Technology and BIM Process: Review and Potential Applications", J. Inf. Technol. Constr, 24(12), pp.209-238, May 2019. https://www.academia.edu/40578593/Blockchain_technology_and_BIM_process_Review_and_potential_applications.
14 J. P. Cruz, Y. Kaji, and N. Yanai, "RBAC-SC: Role-based Access Control using Smart Contract", IEEE Access, 6, 12240-12251, March 2018. https://doi.org/10.1109/ACCESS. 2018.2812844.   DOI
15 ARIA (Academy Research Institute Agency) [Internet], https://seed.kisa.or.kr/kisa/algorithm/EgovAriaInfo.do (Checked on 29th September 2022).
16 N. O. Nawari and S. Ravindran, "Blockchain and Building Information Modeling (BIM): Review and Applications in Post-Disaster Recovery", Buildings, 9(6), 149, June 2019. https://doi.org/10.3390/buildings9060149.   DOI
17 H. Guo, E. Meamari, and C. C. Shen, "Multi-Authority Attribute-based Access Control with Smart Contract", Proceedings of the 2019 International Conference on Blockchain Technology, pp.6-11, March 2019. https://doi. org/10.1145/3320154.3320164.   DOI
18 S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System", Decentralized Business Review, 21260, October 2008. https://www.debr.io/article/21260.pdf.
19 E. Lee, "The Bored Ape Business Model: Decentralized Collaboration via Blockchain and NFTs", Available at SSRN 3963881, November 2021. http://dx.doi.org/10.2139/ ssrn.3963881.   DOI
20 T. A. Xu and J. Xu, "A Short Survey on Business Models of Decentralized Finance (DeFi) Protocols", arXiv Preprint arXiv:2202.07742, February 2022. https://doi.org/10.48550/arXiv.2202.07742.   DOI
21 D. Mohammad and M. Joo, "Protecting BIM Design Intellectual Property with Blockchain: Review and Framework", Proc. of the Conference CIB W78, vol.2021, pp.11-15, October 2021. https://www.researchgate.net/ publication/355195615_Protecting_BIM_Design_Intellectual_Property_with_Blockchain_Review_and_Framework.
22 S. W. Choi, S. M. Lee, J. E. Koh, H. J. Kim, and J. S. Kim, "A Study on the Elements of Business Model Innovation of Non-Fungible Token Blockchain Game: Based on 'PlayDapp' Case, An in-game Digital Asset Distribution Platform", Journal of Korea Game Society, 21(2), 123-137, April 2021. https://doi.org/10.7583/JKGS.2021.21.2.123.   DOI
23 S. Ding, J. Cao, C. Li, K. Fan, and H. Li, "A Novel Attribute-based Access Control Scheme using Blockchain for IoT", IEEE Access 7, 38431-38441, March 2019. https://doi.org/10.1109/ACCESS.2019.2905846.   DOI
24 Y. Zhang, M. Yutaka, M. Sasabe, and S. Kasahara, "Attribute-based Access Control for Smart Cities: A Smart-Contract-Driven Framework", IEEE Internet of Things Journal, 8(8), 6372-6384, October 2020. https://doi.org/10.1109/JIOT.2020.3033434.   DOI
25 M. Nadini, L. Alessandretti, F. D. Giacinto, M. Martino, L. M. Aiello, and A. Baronchelli, "Mapping the NFT Revolution: Market Trends, Trade Networks, and Visual Features", Scientific Reports, 11(1), 1-11, October 2021. https://doi.org/10.1038/s415 98-021-00053-8.   DOI
26 EIP-721: Non-Fungible Token Standard [Internet], https://eips. ethereum.org/EIPS/eip-721 (Checked on 20th September 2022).
27 B. Liu, S. Sun, and P. Szalachowski, "SMACS: Smart Contract Access Control Service", 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.221-232, July 2020. https://doi.org/10.1109/DSN4806 3.2020.00039.   DOI
28 D. Avrilionis and T. Hardjono, "From Trade-only to Zero-Value NFTs: The Asset Proxy NFT Paradigm in Web3", arXiv Preprint arXiv:2205.04899, May 2022. https://doi.org/10.48550/arXiv.2205.04899.   DOI
29 M. B. Yassein, S. Aljawarneh, and E. Qawasmeh, "Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms", 2017 International Conference on Engineering and Technology (ICET). IEEE, pp.1-7, August 2017. https://doi.org/10.1109/ICEngTechnol.2017. 8308215.   DOI
30 EIP-1155: Multi Token Standard [Internet], https://eips.ethereum.org/EIPS/eip-1155 (Checked on 26th September 2022).
31 R. Xu, Y. Chen, E. Blasch, and G. Chen, "BlendCAC: A Smart Contract-enabled Decentralized Capability-based Access Control Mechanism for the IoT", Computers, 7(3), 39, July 2018. https://doi.org/10.3390/computers7030039.   DOI