4.5 Article

A blockchain based approach for the definition of auditable Access Control systems

期刊

COMPUTERS & SECURITY
卷 84, 期 -, 页码 93-119

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2019.03.016

关键词

Blockchain; Smart Contract; Ethereum; Access Control; XACML

向作者/读者索取更多资源

This work proposes to exploit blockchain technology to define Access Control systems that guarantee the auditability of access control policies evaluation. The key idea of our proposal is to codify attribute-based Access Control policies as smart contracts and deploy them on a blockchain, hence transforming the policy evaluation process into a completely distributed smart contract execution. Not only the policies, but also the attributes required for their evaluation are managed by smart contracts deployed on the blockchain. The auditability property derives from the immutability and transparency properties of blockchain technology. This paper not only presents the proposed Access Control system in general, but also its application to the innovative reference scenario where the resources to be protected are themselves smart contracts. To prove the feasibility of our approach, we present a reference implementation exploiting XACML policies and Solidity written smart contracts deployed on the Ethereum blockchain. Finally, we evaluate the system performances through a set of experimental results, and we discuss the advantages and drawbacks of our proposal. (C) 2019 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation

Andrea De Salve, Luca Franceschi, Andrea Lisi, Paolo Mori, Laura Ricci

Summary: The popularity of blockchain technology and smart contracts is increasing, but there is a need to restrict the execution rights of smart contracts to certain users. This article proposes a system called L2DART, based on the RT framework, to regulate smart contracts execution on a public blockchain. L2DART is designed as a layer-2 technology that combines on-chain and off-chain functionalities to reduce costs while ensuring auditability. The on-chain costs of L2DART on Ethereum were evaluated and compared with a previous solution, showing that L2DART's costs are relatively low for real-world deployment.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2023)

Article Computer Science, Hardware & Architecture

Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge

Damiano Di Francesco Maesa, Andrea Lisi, Paolo Mori, Laura Ricci, Gianluca Boschi

Summary: Recent years have seen a shift towards putting users at the center of digital systems, particularly in Europe. This has led to innovation in decentralized systems and the Self Sovereign Identity paradigm. In this paper, we demonstrate how this concept can be applied to traditionally centralized and opaque Access Control systems by expanding the XACML standard with the concept of private attributes. Using blockchain systems, we show how to achieve transparent policy evaluation without disclosing sensitive attribute values through smart contracts and zero knowledge proofs.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2023)

Article Computer Science, Information Systems

SentiTrust: A New Trust Model for Decentralized Online Social Media

Barbara Guidi, Andrea Michienzi, Laura Ricci, Fabrizio Baiardi, Lucia Gomez-Zaragoza, Lucia A. Carrasco-Ribelles, Javier Marin-Morales

Summary: Online Social Media (OSM) play a dominant role in Internet services. Evaluating the interpersonal trust among OSM users is crucial for identifying reliable sources of information, meaningful relationships, and trustworthy users. SentiTrust is an innovative trust model for Decentralized Online Social Networks that utilizes AI-powered Sentiment Analysis and leverages features enabled by mobile Social Media adoption. The model is easily customizable and extendable based on specific scenarios. Testing the sentiment analysis component involved 30 participants completing guided tasks using a social media application, while measuring their electrodermal activity and rate responses. Results indicate that low arousal states correlate with receiving happy faces and sending more messages per minute. Positive interactions lead to shorter interactions and more multimedia exchanges.

IEEE ACCESS (2023)

Proceedings Paper Computer Science, Information Systems

Self-Sovereign Identity for Privacy-Preserving Shipping Verification System

Andrea De Salve, Andrea Lisi, Paolo Mori, Laura Ricci, Calogero Turco

Summary: The paper explores the concept of Self Sovereign Identity (SSI) to provide digital identity, trust, and privacy in the context of a Shipping Verification System, addressing challenges in ensuring transparency of supply chain activities and customer privacy. The proposed system relies on decentralized identifiers, verifiable credentials, and blockchain technology to allow customers to monitor shipment of items.

2022 5TH INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, ICBTA 2022 (2022)

Article Computer Science, Cybernetics

Assessment of Wealth Distribution in Blockchain Online Social Media

Barbara Guidi, Andrea Michienzi, Laura Ricci

Summary: This article introduces the emerging scenario of blockchain online social media (BOSMs), which utilize blockchain technology to redistribute the wealth generated by the platform and reward socially impactful users. The authors propose a methodological framework to study the "rich-get-richer" phenomenon in BOSMs through measures and indices, and apply it to a case study of Steem, comparing the distribution of wealth on its blockchain to other scenarios.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2022)

Article Computer Science, Information Systems

Authenticating Spatial Queries on Blockchain Systems

Matteo Loporchio, Anna Bernasconi, Damiano Di Francesco Maesa, Laura Ricci

Summary: A new authentication mechanism based on Merkle R-trees is proposed for lightweight nodes to retrieve data from the blockchain. The algorithm developed in this study improves query performance and reduces verification times compared to other methods, as the structure of trees generated enhance information integrity.

IEEE ACCESS (2021)

Proceedings Paper Computer Science, Interdisciplinary Applications

Lightnings over rose bouquets: an analysis of the topology of the Bitcoin Lightning Network

Andrea Lisi, Damiano Di Francesco Maesa, Paolo Mori, Laura Ricci

Summary: The Lightning Network is a P2P overlay network that improves Bitcoin's scalability and is suitable for frequent micro-payments. The study analyzed the network's topology, churn rate, centrality measurements, clustering coefficient, and the impact of a pattern named bouquet. Removal of specific nodes of the bouquets causes disconnection from the largest component by about 41% nodes.

2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021) (2021)

Proceedings Paper Computer Science, Information Systems

How to Request Network Resources Just-in-Time using Smart Contracts

Tooba Faisal, Damiano Di Francesco Maesa, Nishanth Sastry, Simone Mangiante

Summary: 5G promises unprecedented levels of network connectivity for diverse applications like remote surgery, requiring transparent Service Level Agreements for customer trust. Short-term and specialized service contracts are advocated, supported by a Permissioned Distributed Ledger (PDL) focused architecture for transparent and automatic SLAs. Evaluation of permissioned and permissionless ledgers demonstrated the benefits of using a permissioned ledger for efficient contract execution.

2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC) (2021)

Proceedings Paper Computer Science, Information Systems

Putting Trust back in IP Licensing: DLT Smart Licenses for the Internet of Things

Damiano Di Francesco Maesa, Frank Tietze, Julius Theye

Summary: Our proposal aims to address trust issues in licensing markets using smart licenses (SL) and an Automated Licensing Payment System (ALPS). SLs act as digital twins of licensing contracts, allowing for automated royalty computation and payment execution. This system eliminates the need for costly audits, lowering entry barriers and enabling novel business models in licensing markets.

2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC) (2021)

Article Engineering, Multidisciplinary

Leveraging the Users Graph and Trustful Transactions for the Analysis of Bitcoin Price

Jon Crowcroft, Damiano Di Francesco Maesa, Alessandro Magrini, Andrea Marino, Laura Ricci

Summary: This paper analyzes the influence of the topological properties of the Bitcoin Users Graph on Bitcoin's exchange rate. Results show that certain features significantly impact the exchange rate for several days, contributing to a more accurate prediction.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Computer Science, Cybernetics

A Graph-Based Socioeconomic Analysis of Steemit

Barbara Guidi, Andrea Michienzi, Laura Ricci

Summary: The article discusses the development of decentralized online social networks (DOSNs) and blockchain online social medias (BOSMs) and their impact on user privacy and wealth distribution. The study evaluates the characteristics of the Steemit follower-following graph to understand how the social and economic aspects of BOSMs intertwine and influence each other.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2021)

Review Computer Science, Information Systems

Blockchains for COVID-19 Contact Tracing and Vaccine Support: A Systematic Review

Laura Ricci, Damiano Di Francesco Maesa, Alfredo Favenza, Enrico Ferro

Summary: Blockchain technology combined with advanced cryptographic techniques can provide secure and privacy-preserving support to combat COVID-19, with current applications focusing on contact tracing and vaccine/immunity passport support.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)