{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T14:31:01Z","timestamp":1777991461934,"version":"3.51.4"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:00:00Z","timestamp":1619568000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:00:00Z","timestamp":1619568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s12083-021-01150-1","type":"journal-article","created":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T06:04:30Z","timestamp":1619589870000},"page":"2961-2976","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":65,"title":["User authentication using Blockchain based smart contract in role-based access control"],"prefix":"10.1007","volume":"14","author":[{"given":"Priyanka","family":"Kamboj","sequence":"first","affiliation":[]},{"given":"Shivang","family":"Khare","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6652-9669","authenticated-orcid":false,"given":"Sujata","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,28]]},"reference":[{"key":"1150_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbvi.2019.e00151","volume":"13","author":"Y Chen","year":"2020","unstructured":"Chen Y, Bellavitis C (2020) Blockchain disruption and decentralized finance: the rise of decentralized business models. J Bus Ventur Insights 13:e00151","journal-title":"J Bus Ventur Insights"},{"key":"1150_CR2","doi-asserted-by":"crossref","unstructured":"Bhardwaj A, Shah SBH, Shankar A, Alazab M, Kumar M, Gadekallu TR (2020) Penetration testing framework for smart contract blockchain. Peer-to-Peer Networking and Applications pp 1\u201316","DOI":"10.1007\/s12083-020-00991-6"},{"key":"1150_CR3","unstructured":"Solidity (2020) Solidity. [Online]. Available:. URL https:\/\/solidity.readthedocs.io\/en\/develop\/"},{"key":"1150_CR4","doi-asserted-by":"crossref","unstructured":"Park JS, Costello KP, Neven TM, Diosomito JA (2004) A composite RBAC approach for large, complex organizations. In: Proceedings of the ninth ACM symposium on Access control models and technologies, pp. 163\u2013172","DOI":"10.1145\/990036.990063"},{"issue":"4","key":"1150_CR5","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1049\/iet-ifs.2009.0174","volume":"4","author":"P Bera","year":"2010","unstructured":"Bera P, Ghosh SK, Dasgupta P (2010) Integrated security analysis framework for an enterprise network\u2013a formal approach. IET Inf Secur 4(4):283\u2013300","journal-title":"IET Inf Secur"},{"key":"1150_CR6","doi-asserted-by":"crossref","unstructured":"He X (2014) Role security access control of the distributed object systems. In: 11th international computer conference on wavelet Actiev media technology and information processing (ICCWAMTIP), IEEE, pp 389\u2013392","DOI":"10.1109\/ICCWAMTIP.2014.7073433"},{"key":"1150_CR7","doi-asserted-by":"crossref","unstructured":"Kamboj P, Trivedi MC, Yadav VK, Singh VK (2017) Detection techniques of DDoS attacks: a survey. In: 4th IEEE Uttar Pradesh section international conference on electrical, Computer and Electronics (UPCON), IEEE, pp. 675\u2013679","DOI":"10.1109\/UPCON.2017.8251130"},{"key":"1150_CR8","unstructured":"Scholer K (2016) An introduction to Bitcoin and Blockchain technology. Kaye Scholer LLP pp 3\u201322"},{"key":"1150_CR9","doi-asserted-by":"crossref","unstructured":"Gao W, Hatcher WG, Yu W (2018) A survey of blockchain: techniques, applications, and challenges. In: 27th international conference on computer communication and networks (ICCCN), IEEE, pp 1\u201311","DOI":"10.1109\/ICCCN.2018.8487348"},{"key":"1150_CR10","doi-asserted-by":"crossref","unstructured":"Vuji\u02c7ci\u2019c D, Jagodi\u2019c D, Rani\u2019c S (2018) Blockchain Technology, Bitcoin, and Ethereum: A Brief Overview. In: 17th International Symposium INFOTEH-JAHORINA (INFOTEH), pp 1\u20136, DOI 10.1109\/INFOTEH.2018.8345547","DOI":"10.1109\/INFOTEH.2018.8345547"},{"key":"1150_CR11","doi-asserted-by":"crossref","unstructured":"Ding Y, Sato H (2020) Bloccess: towards fine-grained access control using blockchain in a distributed untrustworthy environment. In: 2020 8th IEEE international conference on Mobile cloud computing, services, and engineering (MobileCloud), IEEE, pp 17\u201322","DOI":"10.1109\/MobileCloud48802.2020.00011"},{"issue":"6","key":"1150_CR12","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/65.806987","volume":"13","author":"R Perlman","year":"1999","unstructured":"Perlman R (1999) An overview of PKI trust models. IEEE Netw 13(6):38\u201343","journal-title":"IEEE Netw"},{"key":"1150_CR13","doi-asserted-by":"crossref","unstructured":"Kosba A, Miller A, Shi E, Wen Z, Papamanthou C (2016) Hawk: The Blockchain model of Cryptography and Privacy-Preserving Smart Contracts. In: IEEE symposium on security and privacy (SP), IEEE, pp 839\u2013858","DOI":"10.1109\/SP.2016.55"},{"key":"1150_CR14","doi-asserted-by":"crossref","unstructured":"Matsumoto S, Reischuk RM (2017) IKP: turning a PKI around with decentralized automated incentives. In: IEEE symposium on security and privacy (SP), IEEE, pp 410\u2013426","DOI":"10.1109\/SP.2017.57"},{"issue":"3","key":"1150_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3316481","volume":"52","author":"R Zhang","year":"2019","unstructured":"Zhang R, Xue R, Liu L (2019) Security and privacy on Blockchain. ACM Computing Surveys (CSUR) 52(3):1\u201334","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"1150_CR16","doi-asserted-by":"crossref","unstructured":"Feng C, Yu K, Bashir A, AI-Otaibi Y, Lu Y, Chen S, Zhang D (2020) Efficient and secure data sharing for 5G flying drones: a BlockchainEnabled approach. IEEE Netw","DOI":"10.1109\/MNET.011.2000223"},{"issue":"14","key":"1150_CR17","doi-asserted-by":"publisher","first-page":"1460","DOI":"10.1016\/S0140-3664(01)00293-6","volume":"24","author":"R Hunt","year":"2001","unstructured":"Hunt R (2001) Technological infrastructure for PKI and digital certification. Comput Commun 24(14):1460\u20131471","journal-title":"Comput Commun"},{"key":"1150_CR18","doi-asserted-by":"crossref","unstructured":"Kamboj P, Raj G (2016) Analysis of role-based access control in softwaredefined networking. In: Proceedings of Fifth International Conference on Soft Computing for Problem Solving, Springer, pp. 687\u2013697","DOI":"10.1007\/978-981-10-0448-3_57"},{"key":"1150_CR19","doi-asserted-by":"publisher","first-page":"12240","DOI":"10.1109\/ACCESS.2018.2812844","volume":"6","author":"JP Cruz","year":"2018","unstructured":"Cruz JP, Kaji Y, Yanai N (2018) RBAC-SC: role-based access control using smart contract. IEEE Access 6:12240\u201312251","journal-title":"IEEE Access"},{"key":"1150_CR20","doi-asserted-by":"crossref","unstructured":"Shi N, Tan L, Yang C, He C, Xu J, Lu Y, Xu H (2020) Bacs: a blockchainbased access control scheme in distributed internet of things. Peer-to-peer networking and applications pp 1\u201315","DOI":"10.1007\/s12083-020-00930-5"},{"issue":"8","key":"1150_CR21","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1016\/j.cose.2011.08.002","volume":"30","author":"L Fuchs","year":"2011","unstructured":"Fuchs L, Pernul G, Sandhu R (2011) Roles in information security\u2013a survey and classification of the research area. Computers & security 30(8):748\u2013769","journal-title":"Computers & security"},{"key":"1150_CR22","doi-asserted-by":"crossref","unstructured":"Zyskind G, Nathan O, et al. (2015) Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops, IEEE, pp 180\u2013184","DOI":"10.1109\/SPW.2015.27"},{"key":"1150_CR23","doi-asserted-by":"publisher","unstructured":"Yu KP, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) BlockchainEnhanced data sharing with traceable and direct revocation in IIoT. IEEE transactions on industrial informatics pp 1\u20131, DOI https:\/\/doi.org\/10.1109\/TII.2021.3049141","DOI":"10.1109\/TII.2021.3049141"},{"key":"1150_CR24","doi-asserted-by":"crossref","unstructured":"Ma G, Ge C, Zhou L (2020) Achieving reliable timestamp in the bitcoin platform. Peer-to-Peer Networking and Applications pp 1\u20139","DOI":"10.1007\/s12083-020-00905-6"},{"key":"1150_CR25","doi-asserted-by":"crossref","unstructured":"Maesa DDF, Mori P, Ricci L (2017) Blockchain based access control. In: International Conference on Distributed Applications and Interoperable Systems, Springer, pp. 206\u2013220","DOI":"10.1007\/978-3-319-59665-5_15"},{"issue":"18","key":"1150_CR26","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) FairAccess: a new Blockchain-based access control framework for the internet of things. Secur Commun Netw 9(18):5943\u20135964","journal-title":"Secur Commun Netw"},{"issue":"4","key":"1150_CR27","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1049\/iet-ifs.2009.0260","volume":"4","author":"JA Calero","year":"2010","unstructured":"Calero JA, Perez GM, Skarmeta AG (2010) Towards an authorisation model for distributed systems based on the semantic web. IET Inf Secur 4(4):411\u2013421","journal-title":"IET Inf Secur"},{"key":"1150_CR28","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","volume":"107","author":"X Li","year":"2020","unstructured":"Li X, Jiang P, Chen T, Luo X, Wen Q (2020) A survey on the security of blockchain systems. Futur Gener Comput Syst 107:841\u2013853","journal-title":"Futur Gener Comput Syst"},{"key":"1150_CR29","doi-asserted-by":"crossref","unstructured":"Shi N, Tan L, Li W, Qi X, Yu K (2020) A blockchain-empowered AAA scheme in the large-scale HetNet. Digital Communications and Networks","DOI":"10.1016\/j.dcan.2020.10.002"},{"key":"1150_CR30","doi-asserted-by":"crossref","unstructured":"Yu K, Tan L, Shang X, Huang J, Srivastava G, Chatterjee P (2020) Efficient and privacy-preserving medical research support platform against COVID-19: a Blockchain-based approach. IEEE Consumer Electronics Magazine","DOI":"10.1109\/MCE.2020.3035520"},{"key":"1150_CR31","doi-asserted-by":"publisher","first-page":"12253","DOI":"10.1109\/ACCESS.2020.2965333","volume":"8","author":"R Ghazal","year":"2020","unstructured":"Ghazal R, Malik AK, Qadeer N, Raza B, Shahid AR, Alquhayz H (2020) Intelligent role-based access control model and framework using semantic business roles in multi-domain environments. IEEE Access 8:12253\u201312267","journal-title":"IEEE Access"},{"key":"1150_CR32","doi-asserted-by":"crossref","unstructured":"Contiu S, Pires R, Vaucher S, Pasin M, Felber P, Reveillere L (2018) IBBE-SGX: Cryptographic Group Access Control using Trusted Execution Environments. In: 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), IEEE, pp 207\u201321","DOI":"10.1109\/DSN.2018.00032"},{"issue":"2","key":"1150_CR33","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38\u201347","journal-title":"Computer"},{"key":"1150_CR34","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.jnca.2017.11.012","volume":"103","author":"L Zhou","year":"2018","unstructured":"Zhou L, Wang Q, Sun X, Kulicki P, Castiglione A (2018) Quantum technique for access control in cloud computing II: encryption and key distribution. J Netw Comput Appl 103:178\u2013184","journal-title":"J Netw Comput Appl"},{"key":"1150_CR35","doi-asserted-by":"crossref","unstructured":"Karbasi AH, Shahpasand S (2020) A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks. Peer-to-peer networking and applications pp 1\u201319","DOI":"10.1007\/s12083-020-00901-w"},{"key":"1150_CR36","doi-asserted-by":"crossref","unstructured":"Astorga J, Jacob E, Huarte M, Higuero M (2012) Ladon: end-to-end authorisation support for resource-deprived environments. IET information security 6(2):93\u2013101 5","DOI":"10.1049\/iet-ifs.2010.0259"},{"issue":"6","key":"1150_CR37","first-page":"119","volume":"20","author":"N Choi","year":"2019","unstructured":"Choi N, Kim H (2019) A Blockchain-based user authentication model using MetaMask. Journal of Internet Computing and Services 20(6):119\u2013127","journal-title":"Journal of Internet Computing and Services"},{"key":"1150_CR38","doi-asserted-by":"crossref","unstructured":"Anilkumar C, Subramanian S (2020) A novel predicate based access control scheme for cloud environment using open stack swift storage. Peer-toPeer networking and applications pp 1\u201313","DOI":"10.1007\/s12083-020-00961-y"},{"key":"1150_CR39","unstructured":"Ropsten (2020) The Ethereum Block Explorer: ROPSTEN (Revival) TESTNET. Etherscan. [Online]. Available:. https:\/\/ropsten.etherscan.io"},{"issue":"2","key":"1150_CR40","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1049\/iet-ifs.2018.5010","volume":"13","author":"S Jha","year":"2018","unstructured":"Jha S, Sural S, Atluri V, Vaidya J (2018) Security analysis of abac under an administrative model. IET Inf Secur 13(2):96\u2013103","journal-title":"IET Inf Secur"},{"key":"1150_CR41","doi-asserted-by":"crossref","unstructured":"Al-Bassam M (2017) SCPKI: a smart contract-based PKI and identity system. In: Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, pp. 35\u201340","DOI":"10.1145\/3055518.3055530"},{"key":"1150_CR42","unstructured":"Nakamoto S (2008) Bitcoin: A Peer-to-Peer Electronic Cash System,\u201d http:\/\/bitcoin.org\/bitcoin.pdf"},{"issue":"1","key":"1150_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3146025","volume":"51","author":"F Paci","year":"2018","unstructured":"Paci F, Squicciarini A, Zannone N (2018) Survey on access control for community-centered collaborative systems. ACM Comput Surv (CSUR) 51(1):1\u201338","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1150_CR44","unstructured":"Ferraiolo D, Richard D (1992) Role-based access controls. In: proceedings of the 15th NIST-NSA National Computer Security Conference, Baltimore, Maryland"},{"key":"1150_CR45","unstructured":"Community E (2020) Ethereum Homestead Documentation. [Online]. Available:. URL https:\/\/readthedocs.org\/projects\/ethereum-homestead\/downloads\/pdf\/latest\/"},{"key":"1150_CR46","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of Blockchain technology: architecture, consensus, and future trends. In: IEEE international congress on big data (BigData congress), IEEE, pp 557\u2013564","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"1150_CR47","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow paper 151:1\u201332","journal-title":"Ethereum project yellow paper"},{"issue":"19","key":"1150_CR48","doi-asserted-by":"publisher","first-page":"3187","DOI":"10.1049\/iet-com.2019.0194","volume":"13","author":"U Tariq","year":"2019","unstructured":"Tariq U, Ibrahim A, Ahmad T, Bouteraa Y, Elmogy A (2019) Blockchain in internet-of-things: a necessity framework for security, reliability, transparency, immutability and liability. IET Commun 13(19):3187\u20133192","journal-title":"IET Commun"},{"key":"1150_CR49","doi-asserted-by":"crossref","unstructured":"Rouhani S, Deters R (2019) Blockchain based access control systems: state of the art and challenges. In: IEEE\/WIC\/ACM International Conference on Web Intelligence, pp. 423\u2013428","DOI":"10.1145\/3350546.3352561"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01150-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01150-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01150-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T11:27:02Z","timestamp":1629372422000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01150-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,28]]},"references-count":49,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["1150"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01150-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,28]]},"assertion":[{"value":"26 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}