2020 2nd Conference on Blockchain Research &Amp; Applications for Innovative Networks and Services (BRAINS) 2020
DOI: 10.1109/brains49436.2020.9223297
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Access Control based on Distributed Ledger Technology: A survey

Abstract: As the first step in preserving system security, Authentication and Access Control (AAC) plays a vital role in all businesses. Recently, emerging the blockchain and smart contract technology has attracted significant scientific interest in research areas like authentication and access control processes. In the context of authentication and access control, blockchain can offer greater data and rule confidentiality and integrity, as well as increasing the availability of the system by removing the single point o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 46 publications
0
14
0
Order By: Relevance
“…On the other hand, Ghaffari et al [ 11 ] conducted a comprehensive study to provide a comprehensive picture of the current state of the art in integrating blockchain and smart contracts in access control and authentication techniques. They began by outlining the history of distributed ledger technology, proposing a taxonomy for categorizing current methods based on type, application environment, and blockchain exploitation.…”
Section: Literature Reviewmentioning
confidence: 99%
“…On the other hand, Ghaffari et al [ 11 ] conducted a comprehensive study to provide a comprehensive picture of the current state of the art in integrating blockchain and smart contracts in access control and authentication techniques. They began by outlining the history of distributed ledger technology, proposing a taxonomy for categorizing current methods based on type, application environment, and blockchain exploitation.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As an example, using Blockchain for access control procedure may decrease the time efficiency, while it increases the non-repudiation and removes the single point of failure. Existing Blockchain-based access control methods can be classified into two main categories [21]. In the first category, they use Blockchain as a distributed database to store rules (see Fig.…”
Section: Related Workmentioning
confidence: 99%
“…While a few other proposals (e.g., [21], [22], [23], [24], [25], [26], [27]) try to survey blockchain convergence in access control for the IoT, they do not focus on the various distinct properties of blockchain and their integration into IoT access control to a fine-grained level. Their discussions do not focus on key attributes that determine the suitability of an access control approach for a given context, e.g., how access control manages resources, whether it transfers access rights, how it enforces permissions or manages attributes, and whether it is scalable.…”
Section: B Contributionsmentioning
confidence: 99%