Attribute-Based Access Control Policy Review in Permissioned Blockchain

被引:3
作者
Lawal, Sherifdeen [1 ]
Krishnan, Ram [1 ]
机构
[1] Univ Texas San Antonio, San Antonio, TX 78249 USA
来源
SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA | 2022年 / 1549卷
关键词
Attribute based access control; Policy review; Authorization; Revocation; Policy machine; Authorization graph;
D O I
10.1007/978-3-030-97532-6_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Permissioned blockchain is of a great deal to enterprise uses cases. There is a need to support access control policy review for legal and security reasons in some use cases. Specifying and maintaining a complex access policy for a permissioned blockchain may be well managed using attributes. The ABAC policy approaches offer a solution to a peculiar set of challenges for distributed system access control, like the blockchain. There are studies on leveraging Smart Contracts in implementing blockchain-based ABAC policy. However, most of these contributions implement an Attribute-Based Access Control policy expressed in a logical format. We proposed the ABAC enumerated policy format as an access control mechanism for the permissioned blockchain, Hyper-ledger Fabric network. We also proposed an algorithm for a set of policy review problems and implemented the algorithm for a blockchain-based policy specification.
引用
收藏
页码:97 / 109
页数:13
相关论文
共 12 条
[1]   ControlChain: A new stage on the IoT access control authorization [J].
Ahlert Pinno, Otto Julio ;
Abed Gregio, Andre Ricardo ;
De Bona, Luis C. E. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (12)
[2]   Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy [J].
Biswas, Prosunjit ;
Sandhu, Ravi ;
Krishnan, Ram .
ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL, 2016, :1-12
[3]   A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT [J].
Ding, Sheng ;
Cao, Jin ;
Li, Chen ;
Fan, Kai ;
Li, Hui .
IEEE ACCESS, 2019, 7 :38431-38441
[4]   Decentralized, BlockChain Based Access Control Framework for the Heterogeneous Internet of Things [J].
Dukkipati, Chethana ;
Zhang, Yunpeng ;
Cheng, Liang Chieh .
PROCEEDINGS OF THE THIRD ACM WORKSHOP ON ATTRIBUTE-BASED ACCESS CONTROL (ABAC'18), 2018, :61-69
[5]   Specification and Analysis of ABAC Policies via the Category-Based Metamodel [J].
Fernandez, Maribel ;
Mackie, Ian ;
Thuraisingham, Bhavani .
PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, :173-184
[6]   The Policy Machine: A novel architecture and framework for access control policy specification and enforcement [J].
Ferraiolo, David ;
Atluri, Vijayalakshmi ;
Gavrila, Serban .
JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (04) :412-424
[7]  
Ferraiolo David., 2014, National Institute of Standards and Technology Internal Report 7987
[8]  
Guo H, 2019, 2019 INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2019), P6, DOI [10.1109/GLOBECOM38437.2019.9013572, 10.1145/3320154.3320164]
[9]   A blockchain based approach for the definition of auditable Access Control systems [J].
Maesa, Damiano Di Francesco ;
Mori, Paolo ;
Ricci, Laura .
COMPUTERS & SECURITY, 2019, 84 :93-119
[10]   Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems [J].
Mell, Peter ;
Shook, James M. ;
Gavrila, Serban .
MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, :13-21