Skip to main content

Trusted Identity Cross-Domain Dynamic Authorization Mechanism Based on Master-Slave Chain

  • Conference paper
  • First Online:
The 10th International Conference on Computer Engineering and Networks (CENet 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1274))

Included in the following conference series:

Abstract

In order to solve the security problems existing when power users access power services in different domains, this paper proposes a dynamic authorization model for power users based on master-slave chain. In this model, the slave Blockchain conducts identity authentication in each autonomous domain, and the main Blockchain undertakes identity authentication among autonomous domains. Moreover, by constructing an attribute access control model, a trusted identity cross-domain authorization mechanism is proposed, and an attribute-based allocation strategy in both single-domain and cross-domain scenarios is designed in detail. Through application analysis and security analysis, it is verified that the trusted identity cross-domain authorization mechanism proposed in this paper can be conveniently applied to existing systems, and has better performance in confidentiality, integrity, and availability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, Q., Tai, W., Tang, Y., et al.: A review on false data injection attack toward cyber-physical power system. Acta Automatica Sinica 45(1), 72–83 (2019)

    Google Scholar 

  2. Jiang, D.X., Hou, J.N., Han, F., et al.: The research on trusted identity system on the Internet —from identity management to identity service. Inf. Sec. Commun. Priv. 3, 102–109 (2018)

    Google Scholar 

  3. Dong, G.S., Chen, Y.X., Li, H.W., et al.: Cross-domain authentication credibility based on blockchain in heterogeneous environment. Commun. Technol. 6, 27 (2019)

    Google Scholar 

  4. Zhou, Z.C., Li, L.X., Li, Z.H.: Efficient cross-domain authentication scheme based on blockchain technology. J. Comput. Appl. 38(2), 316–320 (2018)

    Google Scholar 

  5. Gao, Y., Ma, W.P., Liu, X.X.: Cross-domain authentication scheme based on trust for service entity. Syst. Eng. Electron. 41(2), 438–443 (2019)

    Google Scholar 

  6. Xie, Y.R., Ma, W.P., Luo, W.: New cross-domain authentication model for information services entity. Comput. Sci. 45(9), 177–182 (2018)

    Google Scholar 

  7. Sun, Z.W., Zhang, Y.C.: Deep belief network model for mobile terminal identity authentication. Netinfo Security 3, 34–42 (2019)

    Google Scholar 

  8. Ma, X.T., Ma, W.P., Liu, X.X.: A cross domain authentication scheme based on blockchain technology. Acta Electronica Sinica 46(11), 2571–2579 (2018)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the science and technology project of State Grid Corporation: Blockchain-Based Research and Typical Scenario Application of Trusted Service Support System for Electric Power Business (5700-201918243A-0-0-00).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiuli Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, X., Guo, Q., Yao, Q., Huo, X. (2021). Trusted Identity Cross-Domain Dynamic Authorization Mechanism Based on Master-Slave Chain. In: Liu, Q., Liu, X., Shen, T., Qiu, X. (eds) The 10th International Conference on Computer Engineering and Networks. CENet 2020. Advances in Intelligent Systems and Computing, vol 1274. Springer, Singapore. https://doi.org/10.1007/978-981-15-8462-6_101

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8462-6_101

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8461-9

  • Online ISBN: 978-981-15-8462-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics