Abstract
The Matrix message-oriented middleware (see https://matrix.org) is gaining momentum as a basis for a decentralized, secure messaging system as shown, for example, by its deployment within the French government and by the Mozilla foundation. Thus, understanding the corresponding access control approach is important. This paper provides an ab- straction and an analysis of the access control approach followed by Matrix. We show that Matrix can be seen as a form of Distributed Ledger Technology (DLT) based on Transaction-based Directed Acyclic Graphs (TDAGs). TDAGs connect individual transactions to form a DAG, instead of collecting transactions in blocks as in blockchains. These TDAGs only provide causal order, eventual consistency, and no finality. However, unlike conventional DLTs, Matrix does not aim for a strict system-wide consensus. Thus, there is also no guarantee for a strict consensus on access rights. By de- composition of the Matrix approach, we show that a sound decen- tralized access control can be implemented for TDAGs in general, and for Matrix in particular, despite those weak guarantees. In ad- dition, we discovered security issues in popular implementations and emphasize the need for a formal verification of the employed conflict resolution mechanism.
Author supplied keywords
Cite
CITATION STYLE
Jacob, F., Becker, L., Grashöfer, J., & Hartenstein, H. (2020). Matrix decomposition: Analysis of an access control approach on transaction-based DAGs without finality. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT (pp. 81–92). Association for Computing Machinery. https://doi.org/10.1145/3381991.3395399
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.