ICC 2019 - 2019 IEEE International Conference on Communications (ICC) 2019
DOI: 10.1109/icc.2019.8761995
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Access Control with Blockchain

Abstract: The specification and enforcement of network-wide policies in a single administrative domain is common in today's networks and considered as already resolved. However, this is not the case for multi-administrative domains, e.g. among different enterprises. In such situation, new problems arise that challenge classical solutions such as PKIs, which suffer from scalability and granularity concerns. In this paper, we present an extension to Group-Based Policy -a widely used network policy language-for the aforeme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…Thirdly, research should be conducted to propose mechanisms that will allow the user to assign or revoke contextual authorizations on the fly. Then, the availability of these tokens to the receiving entities could be carried out safely and in a distributed manner using distributed registers such as the blockchain (Dorri et al, 2017;Alkurdi et al, 2018;Zheng et al, 2018;junaid jami Gul et al, 2019;Paillisse et al, 2019). Indeed, the blockchain will allow the user to remain anonymous while ensuring the confidence that only the entities for which the tokens are intended will be able to use them.…”
Section: Research Directionsmentioning
confidence: 99%
“…Thirdly, research should be conducted to propose mechanisms that will allow the user to assign or revoke contextual authorizations on the fly. Then, the availability of these tokens to the receiving entities could be carried out safely and in a distributed manner using distributed registers such as the blockchain (Dorri et al, 2017;Alkurdi et al, 2018;Zheng et al, 2018;junaid jami Gul et al, 2019;Paillisse et al, 2019). Indeed, the blockchain will allow the user to remain anonymous while ensuring the confidence that only the entities for which the tokens are intended will be able to use them.…”
Section: Research Directionsmentioning
confidence: 99%
“…Paillisse et al implement and evaluate a three-layer architecture in Reference [110], which supports distributed access control based on permissioned blockchain in cross-domain communications. Private blockchains and BFT protocols are applied to this structure, so moderate storage space can be used to store thousands of access strategies.…”
Section: Access Controlmentioning
confidence: 99%
“…Current solutions for managing access control in multi administrative domains are not efficient. Based on Paillisse et al [40] static approaches are not scalable and granular and PKI-based systems are difficult to manage. They suggest distributing and recording access policies in a permissioned blockchain.…”
Section: Traditional Access Control System Problems and Blockchain Kementioning
confidence: 99%
“…[35] General access control Attribute-based Bitcoin Maesa et al [17] General access control attribute-based Ethereum Jemel and Serhrouchni [28] Data sharing Attribute-based Encryption MultiChain Wang et al [51] Data sharing Attribute-based Encryption Ethereum Zhu et al [58] Resource sharing attribute-based Bitcoin Hu et al [26] Knowledge sharing Fine-grained -Zhu et al . [59] Digital asset management Attribute-based Bitcoin Ferdous et al [23] Cloud federation -Hyperledger Fabric Alansari et al [2] Cloud federation Attribute-base -Zhang and Posland [57] Electronic Medical Record (EMR) Granular attribute-based -Rouhani et al [42] Medical data sharing (MediCHain) Role-based Hyperledger Fabric Asaph et al [5] Medical data sharing (MedRec) Fine-grined Ethereum Xia et al [52] Medical data sharing (MedShare) -Bitcoin Dagher et al [14] Medical data sharing (Ancile) Role-based Ethereum Novo [37] IoT -Private Ethereum Deters [16] IoT -MultiChain Dukkipati et al [21] IoT Attribute-based -Pinno et al [41] IoT (ControlChain) attribute-based -Ouaddah et al [38] IoT (FairAccess) Generic Bitcoin Rouhani et al [44] Physical access control Role-based Hyperledger Fabric Es-Samaali [22] Big data management Attribute-based Bitcoin Stanciu [50] Edge computing -Hyperledger Fabric Paillisse et al [40] Multi-administrative domain -Hyperledger Fabric Maesa et al [36] General access control Attribute-based Ethereum Ding et al [19] IoT Attribute-based Hyperledger Fabric Ma et al [34] IoT General access control Multiblockchain Samaniego et al [48] Plant Phenotyping data General access control Ethereum Wang et al [51] introduce a framework for data sharing and access control. The framework includes IPFS decentralized storage system, Ethereum blockchain, and Attribute-Based Encryption (ABE).…”
Section: Data Sharing Access Controlmentioning
confidence: 99%