Browse > Article
http://dx.doi.org/10.6109/jkiice.2022.26.7.1060

A Blockchain-based User-centric Role Based Access Control Mechanism  

Lee, YongJoo (Division of Software, Chungbuk National University)
Woo, SungHee (Department of Computer Engineering, Korea National University of Transportation)
Abstract
With the development of information technology, the size of the system has become larger and diversified, and the existing role-based access control has faced limitations. Blockchain technology is being used in various fields by presenting new solutions to existing security vulnerabilities. This paper suggests efficient role-based access control in a blockchain where the required gas and processing time vary depending on the access frequency and capacity of the storage. The proposed method redefines the role of reusable units, introduces a hierarchical structure that can efficiently reflect dynamic states to enhance efficiency and scalability, and includes user-centered authentication functions to enable cryptocurrency linkage. The proposed model was theoretically verified using Markov chain, implemented in Ethereum private network, and compared experiments on representative functions were conducted to verify the time and gas efficiency required for user addition and transaction registration. Based on this in the future, structural expansion and experiments are required in consideration of exception situations.
Keywords
Blockchain; Access Control; RBAC; Ethereum; User Authentication About four key words or phrases in alphabetical order; separated by commas such as Maritime; Information; Communication; Science; etc;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Y. Zhang, S. Kasahara, Y. Shen, X. Jiang, and J. Wan, "Smart Contract-Based Access Control for the Internet of Things," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1594-1605, Jun. 2018.   DOI
2 F. Tschorsch and B. Scheuermann, "Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies," IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2084-2123, Mar. 2016.   DOI
3 Y. J. Lee, K. M. Lee, and S. H. Lee, "Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment," Peer-to-Peer Networking and Applications, vol. 13, no. 2, pp. 671-683, May. 2019.
4 N. Atzei, M. Bartoletti, and T. Cimoli, "A Survey of Attacks on Ethereum Smart Contracts," in Proceedings of the 6th International Conference on Principles of Security and Trust, Uppsala, Sweden, vol. 10204, pp. 164-186, Apr. 2017.
5 C. Dannen, Introducing Ethereum and Solidity, CA: Apress Berkeley, USA, 2017.
6 Y. Lee and K. M. Lee, "Blockchain-based RBAC for user authentication with anonymity," in Proceedings of the Conference on Research in Adaptive and Convergent Systems, Chongqing, China, pp. 289-294, 2019.
7 A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravarm, "Blockchain for IoT security and privacy: The case study of a smart home," in IEEE international conference on pervasive computing and communications workshops (PerCom workshops), Kona: HI, USA, pp. 618-623, 2017.
8 O. Novo, "Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT," IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1184-1195, Apr. 2018.   DOI
9 D. D. F. Maesa, P. Mori, and L. Ricci "Blockchain Based Access Control," in IFIP International Conference on Distributed Applications and Interoperable Systems, Neuchatel, Switzerland, pp. 206-220, 2017.
10 J. P. Cruz, Y. Kaji, and N. Yanai, "RBAC-SC: Role-based Access Control Using Smart Contract," IEEE Access, vol. 6, pp. 12240-12251, Mar. 2018.   DOI
11 A. Ouaddah, A. A. Elkalam, and A. Ouahman, "FairAccess: a new Blockchain-based access control framework for the Internet of Things," Security and communication networks, vol. 9, no. 18, pp. 5943-5964, Feb. 2017.   DOI
12 G. Zyskind, O. Nathan, and A. S. Pentland, "Decentralizing Privacy: Using Blockchain to Protect Personal Data," in IEEE Security and Privacy Workshops, San Jose: CA, USA, pp. 180-184, 2015.
13 Y. Xiao, N. Zhang, J. Li, W. Lou, and Y. T. Hou, "PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution," in European Symposium on Research in Computer Security, Guildfor, UK, pp. 610-629, 2020.
14 O. J. A. Pinno, A. R. A. Gregio, and L. C. E. D. Boan, "Controlchain: Blockchain as a central enabler for access control authorizations in the iot," in GLOBECOM IEEE Global Communications Conference, Singapore, pp. 1-6. 2017.
15 C. Dukkipati, Y. Zhang, and L. C. Cheng, "Decentralized, Blockchain based Access Control Framework for the Heterogeneous Internet of Things," in Proceedings of the Third ACM Workshop on Attribute-Based Access Control, Tempe: AZ, USA, pp. 61-69, Mar. 2018.
16 G. Fragkos, J. Johnson, and E. E. Tsiropoulou, "Dynamic Role-Based Access Control Policy for Smart Grid Applications: An Offline Deep Reinforcement Learning Approach," IEEE Transactions on Human-Machine Systems, pp. 1-13, Apr. 2022.
17 D. Ferraiolo, R. Sandhu, S. Gavrilla, D. R. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control," ACM Transactions on Information and System Security (TISSEC), vol. 4, no. 3, pp. 224-274, Aug. 2001.   DOI
18 R. Sandhu, D. Ferraiolo, and R. Kuhn, "The NIST Model for Role-based Access Control: Towards a Unified Standard," in Fifth ACM Workshop on Role-based Access Control, Berlin, Germany, pp. 47-63, Jul. 2000.
19 G. J. Sahani, C. S. Thaker, and S. M. Shah, "Scalable RBAC model for large-scale applications with automatic user-role assignment," International Journal of Communication Networks and Distributed Systems, vol. 28, no. 1, pp. 76-102, 2022.   DOI
20 C. Lin, D. He, X. Huang, K. -K. R. Choo, and A. V. Vasilakos, "BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0," Journal of Network and Computer Applications, vol. 116, no. 15, pp. 42-52, Aug. 2018.   DOI
21 O. -C. Ri, Y. -J. Kim, and Y. -J. Jong, "Blockchain-based RBAC Model with Separation of Duties constraint in Cloud Environment," arXiv preprint, arXiv:2203.00351., Mar. 2022.