DOI QR코드

DOI QR Code

Analysis of Blockchain-based Access Control Technology

블록체인 기반 접근제어 기술 동향

  • 김승현 (신인증.물리보안연구실) ;
  • 김수형 (신인증.물리보안연구실)
  • Published : 2019.08.01

Abstract

As companies use increasing amounts of data more and more, people are more concerned about protecting their privacy. Many researches studies have been conducted with a to securely view of manage managing and share sharing private information securely using the Bblockchain technology. These studies have suggested a Bblockchain-based approaches to provide efficiency, scalability, data ownership, and systematic data lifecycles that were are the limitations of lacking in traditional access controls. More Sspecifically, these studies have introduced a new access control models, distributed hash tables, trusted execution environments, and hierarchical ID-based cryptographic mechanisms to provide reliable access control even in complex environments such as IoT Internet of Things. In this paperstudy, we present the criteria to for classifying the functional characteristics of the Bblockchain-based access control methods and derive the differentiateion between of each the several methods.

Keywords

Acknowledgement

Grant : O2O 서비스를 위한 무자각 증강인증 및 프라이버시가 보장되는 블록체인 ID 관리 기술 개발

Supported by : 정보통신기획평가원

References

  1. DELL EMC, "New Dell EMC Research: Most Businesses Worldwide Now Recognize Value of Data Yet Struggle with Adequate Data Protection," 2019, https://www.emc.com/about/news/press/2019/20190321-01.htm
  2. D. Rushe, "Facebook Sorry-Almost-for Secret Psychological Experiment on Users," The Guardian, Oct. 2, 2014.
  3. C. Cadwalladr, E Mraham-Harrison, "Revealed: 50 Million Facebook Profiles Harvested for Cambridge Analytica in Major Data Breach," The Guardian, Mar. 17, 2018.
  4. S. de Capitani di Vimercati et al., "Encryption Policies for Regulating Access to Outsourced Data," ACM Trans. Database Syst. (TODS), vol. 35, no. 2, Apr. 2010, pp. 12:1-46.
  5. C. Dwork, "Differential privacy," in Encyclopedia of Cryptography and Security, Springer: New York, USA, 2011, pp. 338-340.
  6. G. Zyskind, O. Nathan, A. Pentland, "Decentralizing Privacy: Using Blockchain to Protect Personal Data," in IEEE Security Privacy Workshops, San jose, CA, USA, May 2015, pp. 180-184.
  7. M. Crosby et al., "Blockchain Technology: Beyond Bitcoin," Appl. Innovation Rev., vol. 2, 2016, pp. 7-19.
  8. K. Christidis, M. Devetsikiotis, "Blockchains and Smart Contracts for the Internet of Things," IEEE Access, vol. 4, 2016, pp. 2292-2303. https://doi.org/10.1109/ACCESS.2016.2566339
  9. M. Pilkington, "11 Blockchain technology: principles and applications," in Research Handbook on Digital Transformations, Sept. 2016, pp. 225-253.
  10. M. Vukolic, "The Quest for Scalable Blockchain Fabric: Proofof- Work vs. BFT Replication," in International Workshop on Open Problems in Network Security, Springer: New York, USA, 2015, pp. 112-125.
  11. J. Zheng et al., "Dynamic Role-Based Access control model," J. Softw., vol. 6, no. 6, 2011, pp. 1096-1102.
  12. J.L. Hernandez-Ramos et al., "Distributed Capability-Based Access Control for the Internet of Things," J. Internet Services Inf. Security (JISIS), vol. 3, no. 3/4, 2013, pp. 1-16. https://doi.org/10.22667/JISIS.2013.11.31.001
  13. E. Bertino, "Big Data-Security and Privacy," in IEEE Int. Congress Big Data, New York, USA, 2015, pp. 757-761.
  14. T. Salman et al., "Security Services Using Blockchains: A State of the Art Survey," IEEE Commun. Surveys Tuts., vol. 21, no. 1, 2018, pp. 858-880. https://doi.org/10.1109/COMST.2018.2863956
  15. A. Ouaddah et al., "FairAccess: A New Blockchain‐Based Access Control Framework for the Internet of Things," Security Commun. Netw., vol. 9, no. 18, 2016, pp. 5943-5964. https://doi.org/10.1002/sec.1748
  16. N. Zhang et al., "PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution," in Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer: New York, USA, 2018. pp. 345-353.
  17. N. Kaaniche, M. Laurent, "A Blockchain-Based Data Usage Auditing Architecture with Enhanced Privacy and Availability," in IEEE 16th Int. Symp. Netw. Comput. Applicat (NCA), Cambridge, MA, USA, 2017, pp. 1-5.
  18. C. Gentry, S. Halevi, "Hierarchical Identity Based Encryption with Polynomially Many Levels," in Theory of Cryptography Conference, Springer, New York, USA, 2009. pp. 437-456.