Abstract
With the development of society and the rapid increase of social networks, access control has become a big challenge. The current mainstream centralized access control methods have shortcomings such as single point of failure, low scalability, low availability and low non-repudiation. When using blockchain technology for access control, it is necessary to consider how to use the characteristics of blockchain to solve the problem of centralized access control and improve the performance limitations of the blockchain itself. Therefore, this paper proposes a blockchain-based social network access control mechanism, which uses feature extraction to simplify roles, and uses voting to allow users to participate in the authorization process of personal information. User identity authentication is more complete, and the process of information data circulation is effectively achieved. Transparent. Simulation experiments show that the scheme can provide a fast, comprehensive and scalable access control mechanism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rosic, D., Novak, U., Vukmirovic, S.: Role-based access control model supporting regional division in smart grid system. In: 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, pp. 197–201 (2013). https://doi.org/10.1109/CICSYN.2013.59
Figueroa-Lorenzo, S., Añorga, J., Arrizabalaga, S.: A role-based access control model in modbus SCADA systems. A centralized model approach. Sens. (Basel) 19(20), 4455 (2019)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decent. Bus. Rev., 21260 (2008)
Larrucea, X., Pautasso, C.: Blockchain and smart contract engineering. IEEE Softw. 37(5), 23–29 (2020)
Ali, G., et al.: xDBAuth: blockchain based cross domain authentication and authorization framework for Internet of Things. IEEE Access 8, 58800–58816 (2020). https://doi.org/10.1109/ACCESS.2020.2982542
Shafeeq, S., Alam, M., Khan, A.: Privacy aware decentralized access control system. Future Gener. Comput. Syst. 101, 420–433 (2019)
Xu, R., Yu, C., Blasch, E., et al.: BlendCAC: a BLockchain-ENabled Decentralized Capability-based Access Control for IoTs. In: The 2018 IEEE Internal Conference on Blockchain. IEEE (2018)
Tan, L., Shi, N., Yang, C., et al.: A blockchain-based access control framework for cyber-physical-social system big data. IEEE Access 8, 77215–77226 (2020)
Qin, X., Huang, Y., Yang, Z., et al.: An access control scheme with fine-grained time constrained attributes based on smart contract and trapdoor. In: 2019 26th International Conference on Telecommunications (ICT) (2019)
Zhou, Q., Huang, H., Zheng, Z., et al.: Solutions to scalability of blockchain: a survey. IEEE Access 8, 16440–16455 (2020)
Yang, C., Tan, L., Shi, N., et al.: AuthPrivacyChain: a blockchain-based access control framework with privacy protection in cloud. IEEE Access 8, 70604–70615 (2020)
Chiu, W.Y., Meng, W., Jensen, C.D.: My data, my control: a secure data sharing and access scheme over blockchain. J. Inf. Secur. Appl. 63, 103020 (2021)
Ghaffari, F., Bertin, E., Crespi, N., et al.: A novel access control method via smart contracts for internet-based service provisioning. IEEE Access 9, 81253–81273 (2021)
Liu, A., Du, X., Wang, N., Li, S.: Big data access control mechanism based on blockchain. J. Softw. 30(09), 2636–2654 (2019)
Guo, X., Wang, Y., Feng, T., Cao, L., Jiang, Y., Zhang, D.: A role delegation access control mechanism for industrial control system based on blockchain. Comput. Sci. 48(09), 306–316 (2021)
Huang, M., Ou, B., He, S.: An access control method based on feature extraction. Comput. Sci. 46(02), 109–114 (2019)
Zhu, J., Gao, S., Duan, M., et al.: Blockchain Technology and Application. Machinery Industry Society, Beijing (2018)
Zyskind, G., Nathan, O.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops, pp. 180–184. IEEE (2015)
Wang, C., Cheng, J., Sang, X., et al.: Blockchain data privacy protection: research status and prospects. Comput. Res. Dev. 58(10), 21 (2021)
Ferraiolo, D., Chandramouli, R., Kuhn, D.R., et al.: Role-Based Access Control, 2nd edn. Artech House, Inc., Norwood (2007)
Xiong, H., Chen, X., Zhang, B., Du, X.: Scalable access control model based on two-layer roles and organizations. J. Electron. Inf. 37(07), 1612–1619 (2015)
Acknowledgement
This work was supported by National Natural Science Foundation of China (No. 61862007, No. 61866003).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dai, M., Li, Y., Wen, Y., Liu, D., Chen, H. (2022). Blockchain-Based Social Network Access Control Mechanism. In: Svetinovic, D., Zhang, Y., Luo, X., Huang, X., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2022. Communications in Computer and Information Science, vol 1679. Springer, Singapore. https://doi.org/10.1007/978-981-19-8043-5_11
Download citation
DOI: https://doi.org/10.1007/978-981-19-8043-5_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8042-8
Online ISBN: 978-981-19-8043-5
eBook Packages: Computer ScienceComputer Science (R0)