4.7 Article

BCON: Blockchain based access CONtrol across multiple conflict of interest domains

期刊

出版社

ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jnca.2019.102440

关键词

Access control; Formal verification; Blockchain; Resource management and allocation; Model checking

资金

  1. Higher Education Commission (HEC) Pakistan under National Center for Cyber Security initiative

向作者/读者索取更多资源

In today's on-demand computing and virtual coalition environment, cross-domain services are acquired and provided. These business domains may belong to either the same or different conflict of interest system. Transitive access can cause leakage of information between competitors through some other conflict of interest system's member. Therefore, a secure access control mechanism is required to detect and deny transitive access efficiently with minimal trust in externalist. Existing access control mechanisms focused on either single or multiple conflict of interest domains but with no transitive access. In addition, these existing mechanisms are centralized with inherited unfair access control and are a single point of failure. Blockchain (BC) is a shared digital ledger encompassing a list of connected blocks stored on a decentralized distributed network that is secured through cryptography. We propose a BC based access control for conflict of interest domains. We have integrated a BC in our architecture to make access control fair, verifiable and decentralized. Users access histories and transitive accesses are stored on BC ledger. We propose a novel mechanism called Transitive Access Checking and Enforcement (TACE) i.e., Algorithm.1. It makes an authorization decision based on BC endorsement that transitive access will not occur. Algorithm.2 verifies and updates users access histories stored at BC before each request approval. Similarly, Algorithm.3 detects possible future transitive accesses and updates Transitive Access Set (TAS) stored at BC after each request approval. The Simple Promela Interpreter (SPIN) model checker is used to verify the proposed mechanisms for transitive access detection and prevention. We have identified four conflicting sequences of execution that can cause transitive access. Results show that the proposed mechanism is safe against transitive access by checking all the four possible conflicting sequences of execution.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据