Content of Blockchain in our journal
    Published in last 1 year |  In last 2 years |  In last 3 years |  All
Please wait a minute...
For Selected: Toggle Thumbnails
Smart contract-based access control architectural modeling
XU Long,LI Yang
Shandong Science    2022, 35 (1): 128-134.   DOI: 10.3976/j.issn.1002-4026.2022.01.017
Abstract411)   HTML15)    PDF(pc) (3181KB)(361)       Save

The rise of digital economy is attributed to the rapid development of a new generation of information technology, represented by the Internet of Things technology. However, the huge number of sensors, limited resources, and lack of robust security mechanism results in great challenges for the traditional centralized access control system. To deal with these challenges, a novel-capability-based access control model, which uses the advantages of the capability-based access control decision-making mechanism and introduces a role set and an attribute set based on smart contract. This model is built to provide a decentralized, flexible, highly scalable, and high-granularity access control system. Furthermore, a token mechanism is adopted in the access control model to enhance the system's capability. Finally, simulation experiment results verified the feasibility and effectiveness of the system.

Table and Figures | Reference | Related Articles | Metrics
Design of cloud identity management trust model based on blockchain technology
ZHU Xi, WU Hao
Shandong Science    2020, 33 (3): 100-108.   DOI: 10.3976/j.issn.1002-4026.2020.03.015
Abstract452)      PDF(pc) (3751KB)(363)       Save
A trust model of cloud identity management based on blockchain technology is proposed. The trust model allows cloud service providers to manage their trust relationship in a dynamic and distributed way without the need for centralized management organizations such as IDP. Through an effective authentication mechanism, the model allows data distributed across multiple domains to use identity information to streamline the opeartions and optimize user experience. It provides a referential solution for the security and privacy of cloud identity management. By comparing with the traditional cloud identity management model, the stability of the design is proved.

Reference | Related Articles | Metrics