User authentication using Blockchain based smart contract in role-based access control
Since the last few decades, information security has become a significant challenge for organizations’ system administrators. However, the Role-Based Access Control (RBAC) model has emerged as a viable solution for organizations to meet the security requirement due to its less administrative overhea...
Gespeichert in:
Veröffentlicht in: | Peer-to-peer networking and applications 2021-09, Vol.14 (5), p.2961-2976 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2976 |
---|---|
container_issue | 5 |
container_start_page | 2961 |
container_title | Peer-to-peer networking and applications |
container_volume | 14 |
creator | Kamboj, Priyanka Khare, Shivang Pal, Sujata |
description | Since the last few decades, information security has become a significant challenge for organizations’ system administrators. However, the Role-Based Access Control (RBAC) model has emerged as a viable solution for organizations to meet the security requirement due to its less administrative overhead. Blockchain technology is distributive and can be used effectively in user authentication and authorization challenges. This paper proposes an RBAC model using a blockchain-based smart contract for managing user-role permissions in the organization. We design a threat and security model to resist attacks such as man-in-the-middle attacks in an organization scenario. The proposed approach uses the Ethereum blockchain platform and its smart contract functionalities to model user-resource communications. The proposed method is tested on Ropsten Ethereum Test Network and evaluated to analyze user authentication, verification, cost, and security. |
doi_str_mv | 10.1007/s12083-021-01150-1 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2562649216</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2562649216</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-c646ce52e14c71d077c2fa11fc522d593f06e211869261887fe0280f2132d2dc3</originalsourceid><addsrcrecordid>eNp9kE9PwzAMxSMEEmPwBThV4hywnTZtjzDxT0LiwrhGwU23jtKMJDvw7SkUwY2TLb_3bPknxCnCOQKUFxEJKiWBUAJiARL3xAxrpaXOC9j_7XM6FEcxbgA0qoJm4nkZXcjsLq3dkDq2qfNDtovdsMques-vvLbdkL3Y6JosvtmQMvZDCpZTNs6D752cRMvsYpxU3x-Lg9b20Z381LlY3lw_Le7kw-Pt_eLyQbLCOknWuWZXkMOcS2ygLJlai9hyQdQUtWpBO0KsdE0aq6psHVAFLaGihhpWc3E27d0G_75zMZmN34VhPGmo0KTzmlCPLppcHHyMwbVmG7rxmQ-DYL74mYmfGfmZb34Gx5CaQnE0DysX_lb_k_oE_nBycg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2562649216</pqid></control><display><type>article</type><title>User authentication using Blockchain based smart contract in role-based access control</title><source>SpringerNature Journals</source><creator>Kamboj, Priyanka ; Khare, Shivang ; Pal, Sujata</creator><creatorcontrib>Kamboj, Priyanka ; Khare, Shivang ; Pal, Sujata</creatorcontrib><description>Since the last few decades, information security has become a significant challenge for organizations’ system administrators. However, the Role-Based Access Control (RBAC) model has emerged as a viable solution for organizations to meet the security requirement due to its less administrative overhead. Blockchain technology is distributive and can be used effectively in user authentication and authorization challenges. This paper proposes an RBAC model using a blockchain-based smart contract for managing user-role permissions in the organization. We design a threat and security model to resist attacks such as man-in-the-middle attacks in an organization scenario. The proposed approach uses the Ethereum blockchain platform and its smart contract functionalities to model user-resource communications. The proposed method is tested on Ropsten Ethereum Test Network and evaluated to analyze user authentication, verification, cost, and security.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-021-01150-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Authentication ; Blockchain ; Communications Engineering ; Computer Communication Networks ; Cost analysis ; Cryptography ; Engineering ; Information Systems and Communication Service ; Networks ; Organizations ; Security ; Signal,Image and Speech Processing ; Special Issue on Blockchain for Peer-to-Peer Computing</subject><ispartof>Peer-to-peer networking and applications, 2021-09, Vol.14 (5), p.2961-2976</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-c646ce52e14c71d077c2fa11fc522d593f06e211869261887fe0280f2132d2dc3</citedby><cites>FETCH-LOGICAL-c319t-c646ce52e14c71d077c2fa11fc522d593f06e211869261887fe0280f2132d2dc3</cites><orcidid>0000-0001-6652-9669</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-021-01150-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-021-01150-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Kamboj, Priyanka</creatorcontrib><creatorcontrib>Khare, Shivang</creatorcontrib><creatorcontrib>Pal, Sujata</creatorcontrib><title>User authentication using Blockchain based smart contract in role-based access control</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>Since the last few decades, information security has become a significant challenge for organizations’ system administrators. However, the Role-Based Access Control (RBAC) model has emerged as a viable solution for organizations to meet the security requirement due to its less administrative overhead. Blockchain technology is distributive and can be used effectively in user authentication and authorization challenges. This paper proposes an RBAC model using a blockchain-based smart contract for managing user-role permissions in the organization. We design a threat and security model to resist attacks such as man-in-the-middle attacks in an organization scenario. The proposed approach uses the Ethereum blockchain platform and its smart contract functionalities to model user-resource communications. The proposed method is tested on Ropsten Ethereum Test Network and evaluated to analyze user authentication, verification, cost, and security.</description><subject>Access control</subject><subject>Authentication</subject><subject>Blockchain</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cost analysis</subject><subject>Cryptography</subject><subject>Engineering</subject><subject>Information Systems and Communication Service</subject><subject>Networks</subject><subject>Organizations</subject><subject>Security</subject><subject>Signal,Image and Speech Processing</subject><subject>Special Issue on Blockchain for Peer-to-Peer Computing</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE9PwzAMxSMEEmPwBThV4hywnTZtjzDxT0LiwrhGwU23jtKMJDvw7SkUwY2TLb_3bPknxCnCOQKUFxEJKiWBUAJiARL3xAxrpaXOC9j_7XM6FEcxbgA0qoJm4nkZXcjsLq3dkDq2qfNDtovdsMques-vvLbdkL3Y6JosvtmQMvZDCpZTNs6D752cRMvsYpxU3x-Lg9b20Z381LlY3lw_Le7kw-Pt_eLyQbLCOknWuWZXkMOcS2ygLJlai9hyQdQUtWpBO0KsdE0aq6psHVAFLaGihhpWc3E27d0G_75zMZmN34VhPGmo0KTzmlCPLppcHHyMwbVmG7rxmQ-DYL74mYmfGfmZb34Gx5CaQnE0DysX_lb_k_oE_nBycg</recordid><startdate>20210901</startdate><enddate>20210901</enddate><creator>Kamboj, Priyanka</creator><creator>Khare, Shivang</creator><creator>Pal, Sujata</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-6652-9669</orcidid></search><sort><creationdate>20210901</creationdate><title>User authentication using Blockchain based smart contract in role-based access control</title><author>Kamboj, Priyanka ; Khare, Shivang ; Pal, Sujata</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-c646ce52e14c71d077c2fa11fc522d593f06e211869261887fe0280f2132d2dc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Blockchain</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cost analysis</topic><topic>Cryptography</topic><topic>Engineering</topic><topic>Information Systems and Communication Service</topic><topic>Networks</topic><topic>Organizations</topic><topic>Security</topic><topic>Signal,Image and Speech Processing</topic><topic>Special Issue on Blockchain for Peer-to-Peer Computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kamboj, Priyanka</creatorcontrib><creatorcontrib>Khare, Shivang</creatorcontrib><creatorcontrib>Pal, Sujata</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kamboj, Priyanka</au><au>Khare, Shivang</au><au>Pal, Sujata</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>User authentication using Blockchain based smart contract in role-based access control</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2021-09-01</date><risdate>2021</risdate><volume>14</volume><issue>5</issue><spage>2961</spage><epage>2976</epage><pages>2961-2976</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Since the last few decades, information security has become a significant challenge for organizations’ system administrators. However, the Role-Based Access Control (RBAC) model has emerged as a viable solution for organizations to meet the security requirement due to its less administrative overhead. Blockchain technology is distributive and can be used effectively in user authentication and authorization challenges. This paper proposes an RBAC model using a blockchain-based smart contract for managing user-role permissions in the organization. We design a threat and security model to resist attacks such as man-in-the-middle attacks in an organization scenario. The proposed approach uses the Ethereum blockchain platform and its smart contract functionalities to model user-resource communications. The proposed method is tested on Ropsten Ethereum Test Network and evaluated to analyze user authentication, verification, cost, and security.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-021-01150-1</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0001-6652-9669</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1936-6442 |
ispartof | Peer-to-peer networking and applications, 2021-09, Vol.14 (5), p.2961-2976 |
issn | 1936-6442 1936-6450 |
language | eng |
recordid | cdi_proquest_journals_2562649216 |
source | SpringerNature Journals |
subjects | Access control Authentication Blockchain Communications Engineering Computer Communication Networks Cost analysis Cryptography Engineering Information Systems and Communication Service Networks Organizations Security Signal,Image and Speech Processing Special Issue on Blockchain for Peer-to-Peer Computing |
title | User authentication using Blockchain based smart contract in role-based access control |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T12%3A05%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=User%20authentication%20using%20Blockchain%20based%20smart%20contract%20in%20role-based%20access%20control&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Kamboj,%20Priyanka&rft.date=2021-09-01&rft.volume=14&rft.issue=5&rft.spage=2961&rft.epage=2976&rft.pages=2961-2976&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-021-01150-1&rft_dat=%3Cproquest_cross%3E2562649216%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2562649216&rft_id=info:pmid/&rfr_iscdi=true |