2020
DOI: 10.3390/info11020111
|View full text |Cite
|
Sign up to set email alerts
|

An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain

Abstract: Access control has become problematic in several organizations because of the difficulty in establishing security and preventing malicious users from mimicking roles. Moreover, there is no flexibility among users in the participation in their roles, and even controlling them. Several role-based access control (RBAC) mechanisms have been proposed to alleviate these problems, but the security has not been fully realized. In this work, however, we present an RBAC model based on blockchain technology to enhance us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 41 publications
(18 citation statements)
references
References 36 publications
1
17
0
Order By: Relevance
“…KM systems based on blockchain technology manage all the uploaded knowledge commodities within their coverage and generate knowledge blocks automatically (Lin et al , 2019). Security, authentication, integrity and privacy requirements are significantly important to maintain the knowledge in KM systems and use it as competitive advantage (Nyame et al ,2020).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…KM systems based on blockchain technology manage all the uploaded knowledge commodities within their coverage and generate knowledge blocks automatically (Lin et al , 2019). Security, authentication, integrity and privacy requirements are significantly important to maintain the knowledge in KM systems and use it as competitive advantage (Nyame et al ,2020).…”
Section: Literature Reviewmentioning
confidence: 99%
“…This framework exploits blockchain concepts to achieve a distributed and flexible network to conquer the problems of traditional centralized knowledge management models through developing the primary process of knowledge management, based on blockchain concepts. Nyame et al (2020) proposed a user authentication and authorization protocol for KM based on elliptic curve cryptography. The algorithm presents a secure method for accessing knowledge by verifying users before knowledge sharing, transferring or storing in the knowledge base.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Since entire transactions are digitally signed and amended in the distributed ledger even a slight modification in any phase and fraudulent individuals could be recognized. Nyame et al [13] proposed adopts ECDSA to establish a viable and effective client verification and approval protocol for managing knowledge transmissions in role-based access control (RBAC). Digital signature algorithm contributes to build a trustwor-thy mechanism to verify users prior to share, exchange and storing information in the knowledge repository.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Others, like [21,53,54] saw significant challenges in using RBAC to protect intellectual assets. In addition, [55,56] enhanced RBAC with blockchain technology to protect and secure knowledge resources effectively. Thus, the innovative ways to define roles for member users for effective SoD are of high priority.…”
Section: Dimensions Of Rolesmentioning
confidence: 99%