Janus: Hierarchical Multi-Blockchain-Based Access Control (HMBAC) for Multi-Authority and Multi-Domain Environments
-
Published:2022-12-31
Issue:1
Volume:13
Page:566
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Malamas VangelisORCID, Palaiologos George, Kotzanikolaou PanayiotisORCID, Burmester MikeORCID, Glynos DimitrisORCID
Abstract
Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, without relying on strong trust assumptions, is still an open challenge. We present HMBAC, a distributed fine-grained access control model for shared and dynamic multi-authority and multi-domain environments, along with Janus, a practical system for HMBAC policy enforcement. The proposed HMBAC model supports: (a) dynamic trust management between different authorities; (b) flexible access control policy enforcement, defined at the domain and cross-domain level; (c) a global source of truth for all entities, supported by an immutable, audit-friendly mechanism. Janus implements the HMBAC model and relies on the effective fusion of two core components. First, a Hierarchical Multi-Blockchain architecture that acts as a single access point that cannot be bypassed by users or authorities. Second, a Multi-Authority Attribute-Based Encryption protocol that supports flexible shared multi-owner encryption, where attribute keys from different authorities are combined to decrypt data distributedly stored in different authorities. Our approach was implemented using Hyperledger Fabric as the underlying blockchain, with the system components placed in Kubernetes Docker container pods. We experimentally validated the effectiveness and efficiency of Janus, while fully reproducible artifacts of both our implementation and our measurements are provided.
Funder
European Union and Greek national funds through the Operational Program Competitiveness, Entrepreneurship and Innovation
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference60 articles.
1. Statista (2022, January 22). Volume of Data Created, Captured, Copied, and Consumed Worldwide from 2010 to 2020. Available online: www.statista.com/statistics/871513. 2. Zhang, P., Chen, Z., Liang, K., Wang, S., and Wang, T. (2016, January 4–6). A cloud-based access control scheme with user revocation and attribute update. Proceedings of the Australasian Conference on Information Security and Privacy, Melbourne, VIC, Australia. 3. Lo, C.C., Huang, C.C., and Ku, J. (2010, January 13–16). A cooperative intrusion detection system framework for cloud computing networks. Proceedings of the 2010 39th International Conference on Parallel Processing Workshops, San Diego, CA, USA. 4. Multi-authority fine-grained access control with accountability and its application in cloud;Li;J. Netw. Comput. Appl.,2018 5. Malamas, V., Palaiologos, G., Kotzanikolaou, P., Burmester, M., and Glynos, D. (2022, September 12). Janus. Available online: https://census-labs.com/news/2022/06/21/janus-hmbac/.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|