Distributed attribute-based access control system using permissioned blockchain
نویسندگان
چکیده
Auditing provides essential security control in computer systems by keeping track of all access attempts, including both legitimate and illegal attempts. This phase can be useful the context audits, where eventual misbehaving parties held accountable. Blockchain technology provide trusted auditability required for systems. In this paper, we propose a distributed Attribute-Based Access Control (ABAC) system based on blockchain to auditing Besides auditability, our presents level transparency that requesters resource owners benefit from it. We present architecture with an implementation Hyperledger Fabric, achieving high efficiency low computational overhead. The proposed solution is validated through use case independent digital libraries. Detailed performance analysis presented, taking into account different consensus mechanisms databases. experimental evaluation shows presented effectively handle transaction throughput 270 transactions per second, average latency 0.54 seconds transaction.
منابع مشابه
Blockchain Based Access Control
Access Control systems are used in computer security to regulate the access to critical or valuable resources. The rights of subjects to access such resources are typically expressed through access control policies, which are evaluated at access request time against the current access context. This paper proposes a new approach based on blockchain technology to publish the policies expressing t...
متن کاملTransparent Voting Platform Based on Permissioned Blockchain
Since 2004, different research was handling the challenges in the centralized voting systems, e-voting protocols and recently the decentralized voting. So electronic voting puts forward some difficulties regarding the voter anonymity, the secure casting of the votes and to prevent the voting process from frauding. The Decentralized property of the technology called"blockchain"could have the sol...
متن کاملFast Distributed Evaluation of Stateful Attribute-Based Access Control Policies
Separation of access control logic from other components of applications facilitates uniform enforcement of policies across applications in enterprise systems. This approach is popular in attribute-based access control (ABAC) systems and is embodied in the XACML standard. For this approach to be practical in an enterprise system, the access control decision engine must be scalable, able to quic...
متن کاملAttribute-Based Oblivious Access Control
In an attribute-based system (ABS), users are identified by various attributes, instead of their identities. Since its seminal introduction, the attribute-based mechanism has attracted a lot of attention. However, current ABS schemes have a number of drawbacks: (i) the communication cost is linear in the number of the required attributes; (ii) the computation cost is linear in the number of the...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: World Wide Web
سال: 2021
ISSN: ['1573-1413', '1386-145X']
DOI: https://doi.org/10.1007/s11280-021-00874-7