Download presentation
Presentation is loading. Please wait.
Published byΘήρα Ζέρβας Modified over 5 years ago
1
RBAC-SC: Role-Based Access Control Using Smart Contract
Authors: Jason Paul Cruz, Yuichi Kaji, Naoto Yanai Source: IEEE Access, Vol. 6, pp – 12251, March 2018 Speaker: Kaifan Chien Date: 2018/11/01
2
Outline Introduction Role-Based Access Control Using Smart Contract (RBAC-SC) Analysis and Evaluation Conclusions
3
Introduction (1/2) Role-based access control (RBAC)
Roles are often used in a trans-organizational manner. Permissions A Permissions B Permissions C Permissions D Permissions E Permissions F Role 1 Role 2 Student Discount Bookstore School
4
+ A B C Introduction (2/2) 10 $ 20 $ 30 $ Smart contract .sol Compile
Bytecode Deploy Contract Local Ethereum Smart contract 10 $ 20 $ 30 $ + A B C
5
Role-Based Access Control Using Smart Contract (RBAC-SC) (1/3)
RBAC-SC framework School addUser( ) removeUser( ) addEndorsee( ) removeEndorsee( ) changeStatus( ) Create smart contract Function Publish SC Details Student Bookstore S.EOA Information check Response Challenge
6
Role-Based Access Control Using Smart Contract (RBAC-SC) (2/3)
addUser(u .EOA, u .role, u .notes) addUser(u .EOA, “Student”, “ ”) removeUser(u .EOA) addEndorsee(eu .EOA, eu .notes) addUser(u .EOA, “EOA’s classmate”) smart contract removeEndorsee(eu .EOA) changeStatus( ) Deactivate the SC
7
Role-Based Access Control Using Smart Contract (RBAC-SC) (3/3)
Challenge-response protocol OK Secret: 7 Name: Bob Password:123456 Challenge: 1、2、3、4、5 Secret: 7 OK ???? Name: Bob Password:123456 Challenge: 5、4、8、3、1 Name: Bob Password:123456
8
Analysis and Evaluation
Management addUser( ) addEndorsee( ) Revocation removeUser( ) Verification Challenge-response protocol QR codes NFC
9
Conclusions Present the design and framework of the RBAC-SC.
Rights management.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.