Computer Science ›› 2019, Vol. 46 ›› Issue (4): 129-136.doi: 10.11896/j.issn.1002-137X.2019.04.021

• Information Security • Previous Articles     Next Articles

Client Puzzle Based Access Control Model in Public Blockchain

WU Dai-yue, LI Qiang, YU Xiang, HUANG Hai-jun   

  1. National University of Defense Technology,Hefei 230037,China
  • Received:2018-03-05 Online:2019-04-15 Published:2019-04-23

Abstract: Public blockchain characterizes non-centralization and decentration and allows any node to join,and thus possesses the advantages of high efficiency,low cost and high data security.However,that it allows any node to join increases the vulnerability of blockchain network.This paper proposed a Client Puzzle based access control model named CPACM.In this model,new nodes have to make use of computing power to conduct proof of work before joining the network.Only the successful nodes could join the public blockchain network.This model adopts access control when keeping public blockchain decentralizing.Experimental results show that the proposed model can restrict the low computing-power nodes and unfaithful nodes to access with high probability when not affecting the faithful nodes to access and prevent nodes collusion,thus preventing the malicious behaviors and improving the security of public blockchain.

Key words: Public blockchain, Blockchain, Access control, Client Puzzle, Proof of work

CLC Number: 

  • TP309
[1]LI X,JIANG P,CHEN T,et al.A Survey on the security of blockchain systems[J].Future Generation Computer Systems,2017,9(5):147-154.
[2]BABAIOFF M,DOBZINSKI S,OREN S,et al.On Bitcoin and red balloons[J].Acm Sigecom Exchanges,2011,10(3):5-9.
[3]Hyper Ledger.Hyper Ledger architecture working group paper[EB/OL].[2017-11-10].
[4]HUANG B,LIU Z,CHEN J,et al.Behavior pattern clustering in blockchain networks[J].Multimedia Tools & Applications,2017,76(19):1-12.
[5]CHEN L,MORRISSEY P,SMART N P,et al.Security Notions and Generic Constructions for Client Puzzles[C]∥International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology.Springer-Verlag,2009:505-523.
[6]STEBILA D,KUPPUSAMY L,RANGASAMY J,et al.Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols[M]∥Topics in Cryptology- CT-RSA 2011.2011:284-301.
[7]CHEN R C,GUO W J,TANG L Y,et al.Adaptive Client Puzzle Scheme Against Denial-of-Service Attacks[J].Journal of Software,2009,20(9):2558-2573.
[8]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[OL].
[9]WANG Z Y,LI B,ZHANG H G.Research on Security of Hash Funtions[J].Computer Engineering and Applications,2005,41(12):18-19.(in Chinese) 王张宜,李波,张焕国.Hash函数的安全性研究[J].计算机工程与应用,2005,41(12):18-19.
[10]ZHANG Z X,DU Y J,LI B,et al.Self-defence model of SIP proxy server for against Dos attack[J].Journal on Communications,2009,30(4):93-99.(in Chinese) 张兆心,杜跃进,李斌,等.SIP代理服务器抗拒绝服务攻击自防御模型[J].通信学报,2009,30(4):93-99.
[11]ZHU L H,GAO F,SHEN M,et al.Survey on Privacy Preserving Techniques for Blockchain Technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186.(in Chinese) 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186.
[12]LIU M D,SHI Y J.Remote Attestation Model Based on Blockchain[J].Computer Science,2018,45(2):48-52.(in Chinese) 刘明达,拾以娟.基于区块链的远程证明模型[J].计算机科学,2018,45(2):48-52.
[13]Underwood S.Blockchain beyond bitcoin[M].ACM,2016.
[14]LI W,SFORZIN A,FEDOROV S,et al.Towards Scalable and Private Industrial Blockchains[C]∥ACM Workshop on Blockchain,Cryptocurrencies and Contracts.ACM,2017:9-14.
[15]HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Technology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7.
[16]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.
[1] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[2] SHAO Wei-hui, WANG Ning, HAN Chuan-feng, XU Wei-sheng. Integrated Emergency-Defense System Based on Blockchain [J]. Computer Science, 2021, 48(1): 287-294.
[3] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[4] WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65.
[5] LIU Shuai, GAN Guo-hua, LIU Ming-xi, FANG Yong, WANG Shou-yang. Multi-subblock Incentive Consensus Mechanism Based on Topology and Distribution Mechanism [J]. Computer Science, 2020, 47(7): 268-277.
[6] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[7] GU Rong-Jie, WU Zhi-ping and SHI Huan. New Approach for Graded and Classified Cloud Data Access Control for Public Security Based on TFR Model [J]. Computer Science, 2020, 47(6A): 400-403.
[8] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[9] ZHANG Qi-ming, LU Jian-hua, LI Shou-zhi and XU Jian-dong. Building Innovative Enterprise Customer Service Technology Platform Based on Blockchain [J]. Computer Science, 2020, 47(6A): 639-642.
[10] YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302.
[11] PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318.
[12] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
[13] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[14] FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye. Medical Health Data Security Model Based on Alliance Blockchain [J]. Computer Science, 2020, 47(4): 305-311.
[15] PAN Ji-fei,HUANG De-cai. Blockchain Dynamic Sharding Model Based on Jump Hash and Asynchronous Consensus Group [J]. Computer Science, 2020, 47(3): 273-280.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .