RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations

In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access management, it is challenging to create an e...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Cluster computing 2021-12, Vol.24 (4), p.3551-3571
Hauptverfasser: Rashid, Aqsa, Masood, Asif, Khan, Atta ur Rehman
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3571
container_issue 4
container_start_page 3551
container_title Cluster computing
container_volume 24
creator Rashid, Aqsa
Masood, Asif
Khan, Atta ur Rehman
description In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access management, it is challenging to create an efficient centralized system for distributed applications. Centralized authentication and access control systems are prone to single-point failure, security threats, privacy, and scalability issues. This paper presents a decentralized role-centric authentication and resource access management technique called RC-AAM . It relies on the security features provided by cryptography and blockchain, and provides role ownership proof, role verification, and role validation without depending on a central authority. RC-AAM prototype is deployed and tested on the Ethereum test network. The results show that the proposed technique is efficient in terms of access management, permissions verification, incurs low cost, and is able to satisfy distributed environment requirements. Moreover, it shows superior performance compared to the state-of-the-art techniques of role-centric authentication and access management.
doi_str_mv 10.1007/s10586-021-03352-x
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918265988</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918265988</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-2d25f178d7113e6cc222559a9c7b88ffcb6d21090c58010a0ace4931da25dd2c3</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhYMoWKt_wNWA62gezSRxV4ovqAii65BJMm3qNKnJDNT-emMruHN1X-c7Fw4AlxhdY4T4TcaIiRoigiGilBG4PQIjzDiFnE3ocelpOXPB-Ck4y3mFEJKcyBHYvs7gdPp8WzVdNB9mqX2ALuimc7ayzrjQJ935XZlS7BzcL7yp9NAvS-uN7n0MlQ620sa4nKu1Dnrh1uVYtTFV1ucCNENfHGJa6OB3eySfg5NWd9ld_NYxeL-_e5s9wvnLw9NsOoeGYtlDYglrMReWY0xdbQwhhDGppeGNEG1rmtoSjCQyTCCMNNLGTSTFVhNmLTF0DK4OvpsUPweXe7WKQwrlpSISC1IzKURRkYPKpJhzcq3aJL_W6UthpH4SVoeEVUlY7RNW2wLRA5SLOCxc-rP-h_oGPm2BMQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918265988</pqid></control><display><type>article</type><title>RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations</title><source>SpringerLink Journals</source><source>ProQuest Central</source><creator>Rashid, Aqsa ; Masood, Asif ; Khan, Atta ur Rehman</creator><creatorcontrib>Rashid, Aqsa ; Masood, Asif ; Khan, Atta ur Rehman</creatorcontrib><description>In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access management, it is challenging to create an efficient centralized system for distributed applications. Centralized authentication and access control systems are prone to single-point failure, security threats, privacy, and scalability issues. This paper presents a decentralized role-centric authentication and resource access management technique called RC-AAM . It relies on the security features provided by cryptography and blockchain, and provides role ownership proof, role verification, and role validation without depending on a central authority. RC-AAM prototype is deployed and tested on the Ethereum test network. The results show that the proposed technique is efficient in terms of access management, permissions verification, incurs low cost, and is able to satisfy distributed environment requirements. Moreover, it shows superior performance compared to the state-of-the-art techniques of role-centric authentication and access management.</description><identifier>ISSN: 1386-7857</identifier><identifier>EISSN: 1573-7543</identifier><identifier>DOI: 10.1007/s10586-021-03352-x</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Authentication ; Blockchain ; Computer Communication Networks ; Computer Science ; Cryptography ; Engineering ; Medical records ; Medical research ; Operating Systems ; Organizations ; Processor Architectures ; Public Key Infrastructure ; Researchers ; Security ; Verification</subject><ispartof>Cluster computing, 2021-12, Vol.24 (4), p.3551-3571</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-2d25f178d7113e6cc222559a9c7b88ffcb6d21090c58010a0ace4931da25dd2c3</citedby><cites>FETCH-LOGICAL-c319t-2d25f178d7113e6cc222559a9c7b88ffcb6d21090c58010a0ace4931da25dd2c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10586-021-03352-x$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918265988?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21367,27901,27902,33721,41464,42533,43781,51294</link.rule.ids></links><search><creatorcontrib>Rashid, Aqsa</creatorcontrib><creatorcontrib>Masood, Asif</creatorcontrib><creatorcontrib>Khan, Atta ur Rehman</creatorcontrib><title>RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations</title><title>Cluster computing</title><addtitle>Cluster Comput</addtitle><description>In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access management, it is challenging to create an efficient centralized system for distributed applications. Centralized authentication and access control systems are prone to single-point failure, security threats, privacy, and scalability issues. This paper presents a decentralized role-centric authentication and resource access management technique called RC-AAM . It relies on the security features provided by cryptography and blockchain, and provides role ownership proof, role verification, and role validation without depending on a central authority. RC-AAM prototype is deployed and tested on the Ethereum test network. The results show that the proposed technique is efficient in terms of access management, permissions verification, incurs low cost, and is able to satisfy distributed environment requirements. Moreover, it shows superior performance compared to the state-of-the-art techniques of role-centric authentication and access management.</description><subject>Access control</subject><subject>Authentication</subject><subject>Blockchain</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Engineering</subject><subject>Medical records</subject><subject>Medical research</subject><subject>Operating Systems</subject><subject>Organizations</subject><subject>Processor Architectures</subject><subject>Public Key Infrastructure</subject><subject>Researchers</subject><subject>Security</subject><subject>Verification</subject><issn>1386-7857</issn><issn>1573-7543</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp9kEtLAzEUhYMoWKt_wNWA62gezSRxV4ovqAii65BJMm3qNKnJDNT-emMruHN1X-c7Fw4AlxhdY4T4TcaIiRoigiGilBG4PQIjzDiFnE3ocelpOXPB-Ck4y3mFEJKcyBHYvs7gdPp8WzVdNB9mqX2ALuimc7ayzrjQJ935XZlS7BzcL7yp9NAvS-uN7n0MlQ620sa4nKu1Dnrh1uVYtTFV1ucCNENfHGJa6OB3eySfg5NWd9ld_NYxeL-_e5s9wvnLw9NsOoeGYtlDYglrMReWY0xdbQwhhDGppeGNEG1rmtoSjCQyTCCMNNLGTSTFVhNmLTF0DK4OvpsUPweXe7WKQwrlpSISC1IzKURRkYPKpJhzcq3aJL_W6UthpH4SVoeEVUlY7RNW2wLRA5SLOCxc-rP-h_oGPm2BMQ</recordid><startdate>20211201</startdate><enddate>20211201</enddate><creator>Rashid, Aqsa</creator><creator>Masood, Asif</creator><creator>Khan, Atta ur Rehman</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20211201</creationdate><title>RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations</title><author>Rashid, Aqsa ; Masood, Asif ; Khan, Atta ur Rehman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-2d25f178d7113e6cc222559a9c7b88ffcb6d21090c58010a0ace4931da25dd2c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Blockchain</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Engineering</topic><topic>Medical records</topic><topic>Medical research</topic><topic>Operating Systems</topic><topic>Organizations</topic><topic>Processor Architectures</topic><topic>Public Key Infrastructure</topic><topic>Researchers</topic><topic>Security</topic><topic>Verification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rashid, Aqsa</creatorcontrib><creatorcontrib>Masood, Asif</creatorcontrib><creatorcontrib>Khan, Atta ur Rehman</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Cluster computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rashid, Aqsa</au><au>Masood, Asif</au><au>Khan, Atta ur Rehman</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations</atitle><jtitle>Cluster computing</jtitle><stitle>Cluster Comput</stitle><date>2021-12-01</date><risdate>2021</risdate><volume>24</volume><issue>4</issue><spage>3551</spage><epage>3571</epage><pages>3551-3571</pages><issn>1386-7857</issn><eissn>1573-7543</eissn><abstract>In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access management, it is challenging to create an efficient centralized system for distributed applications. Centralized authentication and access control systems are prone to single-point failure, security threats, privacy, and scalability issues. This paper presents a decentralized role-centric authentication and resource access management technique called RC-AAM . It relies on the security features provided by cryptography and blockchain, and provides role ownership proof, role verification, and role validation without depending on a central authority. RC-AAM prototype is deployed and tested on the Ethereum test network. The results show that the proposed technique is efficient in terms of access management, permissions verification, incurs low cost, and is able to satisfy distributed environment requirements. Moreover, it shows superior performance compared to the state-of-the-art techniques of role-centric authentication and access management.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10586-021-03352-x</doi><tpages>21</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1386-7857
ispartof Cluster computing, 2021-12, Vol.24 (4), p.3551-3571
issn 1386-7857
1573-7543
language eng
recordid cdi_proquest_journals_2918265988
source SpringerLink Journals; ProQuest Central
subjects Access control
Authentication
Blockchain
Computer Communication Networks
Computer Science
Cryptography
Engineering
Medical records
Medical research
Operating Systems
Organizations
Processor Architectures
Public Key Infrastructure
Researchers
Security
Verification
title RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T13%3A26%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=RC-AAM:%20blockchain-enabled%20decentralized%20role-centric%20authentication%20and%20access%20management%20for%20distributed%20organizations&rft.jtitle=Cluster%20computing&rft.au=Rashid,%20Aqsa&rft.date=2021-12-01&rft.volume=24&rft.issue=4&rft.spage=3551&rft.epage=3571&rft.pages=3551-3571&rft.issn=1386-7857&rft.eissn=1573-7543&rft_id=info:doi/10.1007/s10586-021-03352-x&rft_dat=%3Cproquest_cross%3E2918265988%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918265988&rft_id=info:pmid/&rfr_iscdi=true