Font Size: a A A

Research On Trusted Access Control Technology Based On Blockchain

Posted on:2023-09-22Degree:MasterType:Thesis
Country:ChinaCandidate:B L LiFull Text:PDF
GTID:2568306845959569Subject:Electronic Information (Computer Technology) (Professional Degree)
Abstract/Summary:PDF Full Text Request
As the mobile Internet,the Internet of Things,big data,and cloud computing gradually become infrastructure,the network boundary gradually disintegrated,and the Internet world has continued to increase entropy,becoming unpredictable,incomprehensible,and uncontrollable.This complex change in the Internet world has caused frequent network attack incidents and caused a large amount of data security issues.The authorization mechanism of traditional access control technology is unsatisfactory in the current complex network environment.Its inherent centralized characteristics,hidden trust,and static and trustworthiness seriously hinder the progress and development of network security.In recent years,the blockchain has received widespread attention as a highly trusted platform,and its decentralized and data non-tampering has provided opportunities for the development of access control technology.Therefore,this article proposes a trusted access control model based on blockchain.The specific work is as follows:(1)Design of data privacy protection mechanisms in Hyperledger Fabric channels.Because the data on the blockchain is highly transparent,the certificate of the certificate is used as a trusted authorization center,and the privacy protection of the data on the chain is achieved in combination with attribute base crypto technology.(2)Design of a trust assessment model.In order to realize the objective dynamics of access control,a trust evaluation model is designed.The Bayesian function in probability theory is introduced,and the expectation formula of Bayesian posterior probability is used to calculate the direct trust value of the access subject;the reward and punishment function is introduced to realize the rapid decline of the trust value when the access fails,and the slow increase of the trust value when the access is successful.Reduce the traffic attack of malicious entities;in order to reduce the influence of human factors on the trust value,a weight function is introduced.The weight of indirect trust will increase with the increase of the number of recommenders,but the weight of direct trust value is always greater than that of indirect trust value;after the comprehensive trust value is calculated,the comprehensive trust value is rated according to the resource level.(3)Extended attribute-based access control model.Fine fine authorization strategy sets according to the user’s attributes to achieve the fine particle size of access control;currently,the attribute-based access control model uses four basic attributes to formulate an authorized strategy set,but these four basic attributes are all from the client.It is generated and has certain tampering.So Introduce objective access to the level attributes of entity trust.Use the access to the entity trust level attributes to evaluate the safety level of the visitors,and combine other basic attributes to form an authorized strategy set to judge whether the access subject has certain operating permissions for resources.(4)Blockchain-based trusted access control model design.The trust evaluation model and extended attribute-based access control model are deployed on the blockchain in the form of smart contracts to achieve the linkage of trust evaluation models and extended attribute-based access control models.With the help of centralization and data transparency on the blockchain and the transparency of data on the chain,the problem of single-point failure and the transparency of the authorization of access control;the data on the chain of the blockchain cannot be tampered with to achieve the non-tampering of attributes and strategy sets;The dynamic dynamics of the degeneration of the trust level can be used;the traceability of the blockchain record can be used to achieve the traceability of access authorization.(5)Experimental verification and analysis.Verify the ability to identify the identification of malicious nodes;verify the reward and punishment function,value function,the trust evaluation model of the power function,and the traditional trust assessment model on dynamic attack and destruction attacks under the same conditions;observe the agreement in different consensus throughput change in the lower zone chain and the system’s transaction delay in the number of different transactions.Theoretical analysis shows that this model realizes the dynamic,fine-grained,and decentralized authorization of access control.The experiment of trust evaluation shows that the trust evaluation simulation model designed in this thesis has strong resistance to dynamic attacks and collusion attacks;while the experimental analysis of blockchain shows that the Raft consensus protocol is more suitable for the current network environment.
Keywords/Search Tags:Blockchain, Trust assessment, Smart contract, Access control
PDF Full Text Request
Related items