Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

AccessChain: An Access Control Framework to Protect Data Access in Blockchain Enabled Supply Chain

Version 1 : Received: 7 February 2022 / Approved: 8 February 2022 / Online: 8 February 2022 (12:00:25 CET)

A peer-reviewed article of this Preprint also exists.

Sarfaraz, A.; Chakrabortty, R.K.; Essam, D.L. AccessChain: An Access Control Framework to Protect Data Access in Blockchain Enabled Supply Chain. Future Generation Computer Systems 2023, doi:10.1016/j.future.2023.06.009. Sarfaraz, A.; Chakrabortty, R.K.; Essam, D.L. AccessChain: An Access Control Framework to Protect Data Access in Blockchain Enabled Supply Chain. Future Generation Computer Systems 2023, doi:10.1016/j.future.2023.06.009.

Abstract

In recent years supply chains have evolved into huge ecosystems, demanding trust, provenance, and data privacy. Since blockchain technology (BCT) allows for the development of a distributed environment, it is ideal for supply chain management (SCM) applications. However, concerns regarding data privacy have impeded the development of blockchains. Despite the fact that some blockchains can restrict participants to read and write data, the blockchain’s transparency makes protecting sensitive data challenging. To solve the data privacy challenge, this paper proposes a framework, AccessChain, that is an SCM access control framework based on an attribute-based access control (ABAC) model that restricts access to competing parties while allowing for network scalability. This proposed AccessChain model has two types of ledgers in the system: local and global. Local ledgers are used to store business contracts between stakeholders and the ABAC model management, whereas the global ledger is used to record transaction data. AccessChain can enable decentralized, fine-grained and dynamic access control management in SCM when combined with the ABAC model and BCT. This paper’s experimental results illustrate that high throughput can be achieved in a large-scale request environment while maintaining data privacy and sustaining a scalable network.

Keywords

Blockchain; Supply chain; Access control; ABAC; Data Security and Privacy

Subject

Computer Science and Mathematics, Information Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.