{"title":"利用区块链属性访问控制实现安全数据管理","authors":"B. Babu, Dr. Kare Suresh Babu, Durga Prasad Kare","doi":"10.55524/ijirem.2023.10.5.16","DOIUrl":null,"url":null,"abstract":"The security of computerized systems depends on mechanisms for controlling access. For the enrichment and reinforcement of such systems, a combination of attribute-based access control and blockchain technologies may be deployed. On the other hand, attribute-based encryption may be used to enable secure data management and safeguard access policies. In this research, we have presented innovative blockchain-enabled attribute-based access control. Our architecture is the first to integrate different aspects to accomplish many security aspects as well as give partial and total revocation at the same time. The experimental findings and analysis, done utilizing the blockchain of the Ethereum network, proved the superior performance of the suggested method compared to prior research works.","PeriodicalId":507949,"journal":{"name":"International Journal of Innovative Research in Engineering and Management","volume":"17 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Data Management with Blockchain-Enabled Attribute-Based Access Control\",\"authors\":\"B. Babu, Dr. Kare Suresh Babu, Durga Prasad Kare\",\"doi\":\"10.55524/ijirem.2023.10.5.16\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security of computerized systems depends on mechanisms for controlling access. For the enrichment and reinforcement of such systems, a combination of attribute-based access control and blockchain technologies may be deployed. On the other hand, attribute-based encryption may be used to enable secure data management and safeguard access policies. In this research, we have presented innovative blockchain-enabled attribute-based access control. Our architecture is the first to integrate different aspects to accomplish many security aspects as well as give partial and total revocation at the same time. The experimental findings and analysis, done utilizing the blockchain of the Ethereum network, proved the superior performance of the suggested method compared to prior research works.\",\"PeriodicalId\":507949,\"journal\":{\"name\":\"International Journal of Innovative Research in Engineering and Management\",\"volume\":\"17 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Innovative Research in Engineering and Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.55524/ijirem.2023.10.5.16\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Innovative Research in Engineering and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55524/ijirem.2023.10.5.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Data Management with Blockchain-Enabled Attribute-Based Access Control
The security of computerized systems depends on mechanisms for controlling access. For the enrichment and reinforcement of such systems, a combination of attribute-based access control and blockchain technologies may be deployed. On the other hand, attribute-based encryption may be used to enable secure data management and safeguard access policies. In this research, we have presented innovative blockchain-enabled attribute-based access control. Our architecture is the first to integrate different aspects to accomplish many security aspects as well as give partial and total revocation at the same time. The experimental findings and analysis, done utilizing the blockchain of the Ethereum network, proved the superior performance of the suggested method compared to prior research works.