RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations
In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access management, it is challenging to create an e...
Gespeichert in:
Veröffentlicht in: | Cluster computing 2021-12, Vol.24 (4), p.3551-3571 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3571 |
---|---|
container_issue | 4 |
container_start_page | 3551 |
container_title | Cluster computing |
container_volume | 24 |
creator | Rashid, Aqsa Masood, Asif Khan, Atta ur Rehman |
description | In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access management, it is challenging to create an efficient centralized system for distributed applications. Centralized authentication and access control systems are prone to single-point failure, security threats, privacy, and scalability issues. This paper presents a decentralized role-centric authentication and resource access management technique called
RC-AAM
. It relies on the security features provided by cryptography and blockchain, and provides role ownership proof, role verification, and role validation without depending on a central authority.
RC-AAM
prototype is deployed and tested on the Ethereum test network. The results show that the proposed technique is efficient in terms of access management, permissions verification, incurs low cost, and is able to satisfy distributed environment requirements. Moreover, it shows superior performance compared to the state-of-the-art techniques of role-centric authentication and access management. |
doi_str_mv | 10.1007/s10586-021-03352-x |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918265988</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918265988</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-2d25f178d7113e6cc222559a9c7b88ffcb6d21090c58010a0ace4931da25dd2c3</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhYMoWKt_wNWA62gezSRxV4ovqAii65BJMm3qNKnJDNT-emMruHN1X-c7Fw4AlxhdY4T4TcaIiRoigiGilBG4PQIjzDiFnE3ocelpOXPB-Ck4y3mFEJKcyBHYvs7gdPp8WzVdNB9mqX2ALuimc7ayzrjQJ935XZlS7BzcL7yp9NAvS-uN7n0MlQ620sa4nKu1Dnrh1uVYtTFV1ucCNENfHGJa6OB3eySfg5NWd9ld_NYxeL-_e5s9wvnLw9NsOoeGYtlDYglrMReWY0xdbQwhhDGppeGNEG1rmtoSjCQyTCCMNNLGTSTFVhNmLTF0DK4OvpsUPweXe7WKQwrlpSISC1IzKURRkYPKpJhzcq3aJL_W6UthpH4SVoeEVUlY7RNW2wLRA5SLOCxc-rP-h_oGPm2BMQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918265988</pqid></control><display><type>article</type><title>RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations</title><source>SpringerLink Journals</source><source>ProQuest Central</source><creator>Rashid, Aqsa ; Masood, Asif ; Khan, Atta ur Rehman</creator><creatorcontrib>Rashid, Aqsa ; Masood, Asif ; Khan, Atta ur Rehman</creatorcontrib><description>In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access management, it is challenging to create an efficient centralized system for distributed applications. Centralized authentication and access control systems are prone to single-point failure, security threats, privacy, and scalability issues. This paper presents a decentralized role-centric authentication and resource access management technique called
RC-AAM
. It relies on the security features provided by cryptography and blockchain, and provides role ownership proof, role verification, and role validation without depending on a central authority.
RC-AAM
prototype is deployed and tested on the Ethereum test network. The results show that the proposed technique is efficient in terms of access management, permissions verification, incurs low cost, and is able to satisfy distributed environment requirements. Moreover, it shows superior performance compared to the state-of-the-art techniques of role-centric authentication and access management.</description><identifier>ISSN: 1386-7857</identifier><identifier>EISSN: 1573-7543</identifier><identifier>DOI: 10.1007/s10586-021-03352-x</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Authentication ; Blockchain ; Computer Communication Networks ; Computer Science ; Cryptography ; Engineering ; Medical records ; Medical research ; Operating Systems ; Organizations ; Processor Architectures ; Public Key Infrastructure ; Researchers ; Security ; Verification</subject><ispartof>Cluster computing, 2021-12, Vol.24 (4), p.3551-3571</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-2d25f178d7113e6cc222559a9c7b88ffcb6d21090c58010a0ace4931da25dd2c3</citedby><cites>FETCH-LOGICAL-c319t-2d25f178d7113e6cc222559a9c7b88ffcb6d21090c58010a0ace4931da25dd2c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10586-021-03352-x$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918265988?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21367,27901,27902,33721,41464,42533,43781,51294</link.rule.ids></links><search><creatorcontrib>Rashid, Aqsa</creatorcontrib><creatorcontrib>Masood, Asif</creatorcontrib><creatorcontrib>Khan, Atta ur Rehman</creatorcontrib><title>RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations</title><title>Cluster computing</title><addtitle>Cluster Comput</addtitle><description>In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access management, it is challenging to create an efficient centralized system for distributed applications. Centralized authentication and access control systems are prone to single-point failure, security threats, privacy, and scalability issues. This paper presents a decentralized role-centric authentication and resource access management technique called
RC-AAM
. It relies on the security features provided by cryptography and blockchain, and provides role ownership proof, role verification, and role validation without depending on a central authority.
RC-AAM
prototype is deployed and tested on the Ethereum test network. The results show that the proposed technique is efficient in terms of access management, permissions verification, incurs low cost, and is able to satisfy distributed environment requirements. Moreover, it shows superior performance compared to the state-of-the-art techniques of role-centric authentication and access management.</description><subject>Access control</subject><subject>Authentication</subject><subject>Blockchain</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Engineering</subject><subject>Medical records</subject><subject>Medical research</subject><subject>Operating Systems</subject><subject>Organizations</subject><subject>Processor Architectures</subject><subject>Public Key Infrastructure</subject><subject>Researchers</subject><subject>Security</subject><subject>Verification</subject><issn>1386-7857</issn><issn>1573-7543</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp9kEtLAzEUhYMoWKt_wNWA62gezSRxV4ovqAii65BJMm3qNKnJDNT-emMruHN1X-c7Fw4AlxhdY4T4TcaIiRoigiGilBG4PQIjzDiFnE3ocelpOXPB-Ck4y3mFEJKcyBHYvs7gdPp8WzVdNB9mqX2ALuimc7ayzrjQJ935XZlS7BzcL7yp9NAvS-uN7n0MlQ620sa4nKu1Dnrh1uVYtTFV1ucCNENfHGJa6OB3eySfg5NWd9ld_NYxeL-_e5s9wvnLw9NsOoeGYtlDYglrMReWY0xdbQwhhDGppeGNEG1rmtoSjCQyTCCMNNLGTSTFVhNmLTF0DK4OvpsUPweXe7WKQwrlpSISC1IzKURRkYPKpJhzcq3aJL_W6UthpH4SVoeEVUlY7RNW2wLRA5SLOCxc-rP-h_oGPm2BMQ</recordid><startdate>20211201</startdate><enddate>20211201</enddate><creator>Rashid, Aqsa</creator><creator>Masood, Asif</creator><creator>Khan, Atta ur Rehman</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20211201</creationdate><title>RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations</title><author>Rashid, Aqsa ; Masood, Asif ; Khan, Atta ur Rehman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-2d25f178d7113e6cc222559a9c7b88ffcb6d21090c58010a0ace4931da25dd2c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Blockchain</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Engineering</topic><topic>Medical records</topic><topic>Medical research</topic><topic>Operating Systems</topic><topic>Organizations</topic><topic>Processor Architectures</topic><topic>Public Key Infrastructure</topic><topic>Researchers</topic><topic>Security</topic><topic>Verification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rashid, Aqsa</creatorcontrib><creatorcontrib>Masood, Asif</creatorcontrib><creatorcontrib>Khan, Atta ur Rehman</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Cluster computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rashid, Aqsa</au><au>Masood, Asif</au><au>Khan, Atta ur Rehman</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations</atitle><jtitle>Cluster computing</jtitle><stitle>Cluster Comput</stitle><date>2021-12-01</date><risdate>2021</risdate><volume>24</volume><issue>4</issue><spage>3551</spage><epage>3571</epage><pages>3551-3571</pages><issn>1386-7857</issn><eissn>1573-7543</eissn><abstract>In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access management, it is challenging to create an efficient centralized system for distributed applications. Centralized authentication and access control systems are prone to single-point failure, security threats, privacy, and scalability issues. This paper presents a decentralized role-centric authentication and resource access management technique called
RC-AAM
. It relies on the security features provided by cryptography and blockchain, and provides role ownership proof, role verification, and role validation without depending on a central authority.
RC-AAM
prototype is deployed and tested on the Ethereum test network. The results show that the proposed technique is efficient in terms of access management, permissions verification, incurs low cost, and is able to satisfy distributed environment requirements. Moreover, it shows superior performance compared to the state-of-the-art techniques of role-centric authentication and access management.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10586-021-03352-x</doi><tpages>21</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1386-7857 |
ispartof | Cluster computing, 2021-12, Vol.24 (4), p.3551-3571 |
issn | 1386-7857 1573-7543 |
language | eng |
recordid | cdi_proquest_journals_2918265988 |
source | SpringerLink Journals; ProQuest Central |
subjects | Access control Authentication Blockchain Computer Communication Networks Computer Science Cryptography Engineering Medical records Medical research Operating Systems Organizations Processor Architectures Public Key Infrastructure Researchers Security Verification |
title | RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T13%3A26%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=RC-AAM:%20blockchain-enabled%20decentralized%20role-centric%20authentication%20and%20access%20management%20for%20distributed%20organizations&rft.jtitle=Cluster%20computing&rft.au=Rashid,%20Aqsa&rft.date=2021-12-01&rft.volume=24&rft.issue=4&rft.spage=3551&rft.epage=3571&rft.pages=3551-3571&rft.issn=1386-7857&rft.eissn=1573-7543&rft_id=info:doi/10.1007/s10586-021-03352-x&rft_dat=%3Cproquest_cross%3E2918265988%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918265988&rft_id=info:pmid/&rfr_iscdi=true |