Computer Science ›› 2019, Vol. 46 ›› Issue (4): 129-136.doi: 10.11896/j.issn.1002-137X.2019.04.021

• Information Security • Previous Articles     Next Articles

Client Puzzle Based Access Control Model in Public Blockchain

WU Dai-yue, LI Qiang, YU Xiang, HUANG Hai-jun   

  1. National University of Defense Technology,Hefei 230037,China
  • Received:2018-03-05 Online:2019-04-15 Published:2019-04-23

Abstract: Public blockchain characterizes non-centralization and decentration and allows any node to join,and thus possesses the advantages of high efficiency,low cost and high data security.However,that it allows any node to join increases the vulnerability of blockchain network.This paper proposed a Client Puzzle based access control model named CPACM.In this model,new nodes have to make use of computing power to conduct proof of work before joining the network.Only the successful nodes could join the public blockchain network.This model adopts access control when keeping public blockchain decentralizing.Experimental results show that the proposed model can restrict the low computing-power nodes and unfaithful nodes to access with high probability when not affecting the faithful nodes to access and prevent nodes collusion,thus preventing the malicious behaviors and improving the security of public blockchain.

Key words: Access control, Blockchain, Client Puzzle, Proof of work, Public blockchain

CLC Number: 

  • TP309
[1]LI X,JIANG P,CHEN T,et al.A Survey on the security of blockchain systems[J].Future Generation Computer Systems,2017,9(5):147-154.
[2]BABAIOFF M,DOBZINSKI S,OREN S,et al.On Bitcoin and red balloons[J].Acm Sigecom Exchanges,2011,10(3):5-9.
[3]Hyper Ledger.Hyper Ledger architecture working group paper[EB/OL].[2017-11-10].https://hyperledeger.org/.
[4]HUANG B,LIU Z,CHEN J,et al.Behavior pattern clustering in blockchain networks[J].Multimedia Tools & Applications,2017,76(19):1-12.
[5]CHEN L,MORRISSEY P,SMART N P,et al.Security Notions and Generic Constructions for Client Puzzles[C]∥International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology.Springer-Verlag,2009:505-523.
[6]STEBILA D,KUPPUSAMY L,RANGASAMY J,et al.Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols[M]∥Topics in Cryptology- CT-RSA 2011.2011:284-301.
[7]CHEN R C,GUO W J,TANG L Y,et al.Adaptive Client Puzzle Scheme Against Denial-of-Service Attacks[J].Journal of Software,2009,20(9):2558-2573.
[8]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[OL].http://bitcoin.org/bitcoin.pdf.
[9]WANG Z Y,LI B,ZHANG H G.Research on Security of Hash Funtions[J].Computer Engineering and Applications,2005,41(12):18-19.(in Chinese) 王张宜,李波,张焕国.Hash函数的安全性研究[J].计算机工程与应用,2005,41(12):18-19.
[10]ZHANG Z X,DU Y J,LI B,et al.Self-defence model of SIP proxy server for against Dos attack[J].Journal on Communications,2009,30(4):93-99.(in Chinese) 张兆心,杜跃进,李斌,等.SIP代理服务器抗拒绝服务攻击自防御模型[J].通信学报,2009,30(4):93-99.
[11]ZHU L H,GAO F,SHEN M,et al.Survey on Privacy Preserving Techniques for Blockchain Technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186.(in Chinese) 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186.
[12]LIU M D,SHI Y J.Remote Attestation Model Based on Blockchain[J].Computer Science,2018,45(2):48-52.(in Chinese) 刘明达,拾以娟.基于区块链的远程证明模型[J].计算机科学,2018,45(2):48-52.
[13]Underwood S.Blockchain beyond bitcoin[M].ACM,2016.
[14]LI W,SFORZIN A,FEDOROV S,et al.Towards Scalable and Private Industrial Blockchains[C]∥ACM Workshop on Blockchain,Cryptocurrencies and Contracts.ACM,2017:9-14.
[15]HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Technology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7.
[16]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.
[1] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[2] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[3] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[4] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[5] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[6] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[7] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[8] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[9] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[10] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[11] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[12] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[13] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[14] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[15] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!