2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2019
DOI: 10.1109/ntms.2019.8763824
|View full text |Cite
|
Sign up to set email alerts
|

An Attribute-Based Access Control using Chaincode in RFID Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…Since one of our lines of research is access control, based on attributes (ABAC) in decentralized systems ([40,41]) and this model of access control based on roles (RBAC) has been applied in a centralized environment (Role Database), the first future line of research is to apply this model in a decentralized environment based on blockchain. Additionally, we want to provide results to systems based on both Hyperledger Fabric Blockchain and Ethereum blockchain.…”
Section: Discussionmentioning
confidence: 99%
“…Since one of our lines of research is access control, based on attributes (ABAC) in decentralized systems ([40,41]) and this model of access control based on roles (RBAC) has been applied in a centralized environment (Role Database), the first future line of research is to apply this model in a decentralized environment based on blockchain. Additionally, we want to provide results to systems based on both Hyperledger Fabric Blockchain and Ethereum blockchain.…”
Section: Discussionmentioning
confidence: 99%
“…The relationship between subjects and objects with the attributes is already defined. This is the typical approach of many studies (Di Francesco Maesa et al , 2018; Figueroa et al , 2019; Rouhani and Deters, 2019; Liu et al , 2020) to solve the problem of traditional access control such as a single-point failure, difficulty to expand, low reliability and low throughput. Data privacy with GDPR compliant : Usually, data when adding to the ledger cannot be deleted. So, when adding personal data, we will have an issue with GDPR.…”
Section: Discussionmentioning
confidence: 99%
“…To reap the full potential benefits of IoT devices, their generated data needs to be shared with different service providers. For example, the data generated from fitness devices may need to be shared with the hospital and the physician, whereas the temperature sensor data may need to be shared with emergency departments and service providers such as Google and Amazon that can collect users' data in smart homes such as Echo or Google Home, to ensure a better quality of service [1,2].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, ABAC is better suited to IoT than other access control mechanisms [1]. However, recent research that focuses on access control schemes based on ABAC is based on centralized models to improve security and privacy [2].…”
Section: Introductionmentioning
confidence: 99%