Decentralized Authorization and Authentication Based on Consortium Blockchain

4Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the development of digital society, the number of Internet platforms increases rapidly and a huge amount of personal information is stored online. It is convenient for users to log in to all platforms with a common account. Third-party authorization protocols like OAuth 2.0 allow the delegation of access control to dedicated service providers. However, OAuth protocol follows the centralized approach to manage authorization and authentication information, which relies on a centralized party and makes it a target under attack. In practice, it is vulnerable to attacks like replay attack, cross-site request forgery (CSRF) attack, and so on. Also, the centralized party cannot provide customized access control for other platforms. To solve these problems, the paper proposes a consortium blockchain architecture and designs protocols for account management and distributed consensus. The paper discusses the potentials of the proposed approach to effectively address certain vulnerabilities in current OAuth-like authorization and authentication services with tolerable performance.

Cite

CITATION STYLE

APA

Zhang, A., & Bai, X. (2020). Decentralized Authorization and Authentication Based on Consortium Blockchain. In Communications in Computer and Information Science (Vol. 1156 CCIS, pp. 267–272). Springer. https://doi.org/10.1007/978-981-15-2777-7_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free