Access Control Scheme of Kiwifruit Traceability Consortium Blockchain Application Based on PBFT
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Aiming at the problem that attribute information and access control policies might be untrustworthy due to the existence of Byzantine nodes in the attribute-based consortium blockchain application access control model, combined with the actual needs of the kiwifruit traceability scenario, an access control scheme of kiwifruit traceability application based on PBFT and consortium blockchain was proposed. The attribute authority was used as the attribute certificate authority of the consortium blockchain entity organization and the query verification node to generate signatures and verify the access request contents. The attribute information related to the subject and the authority was stored in the attribute certificate. The user attributes, data attributes and access control policies based on the PBFT were verified to ensure the credibility of the access control process. The tests based on the Hyperledger Fabric prototype system showed that the system could work normally when the number of Byzantine nodes in the accounting node was less than 1/3. The total number of transactions submitted to the blockchain was 1000, 2000, 3000, and the transaction sending rate was 100TPS, 200TPS, …, 1400TPS and 1500TPS, the transaction throughput was stable when the transaction sending rate was 300TPS, and the average latency was stable when the transaction sending rate was 400TPS. The scheme met the requirements of the consortium blockchain kiwifruit traceability application.

    Reference
    Related
    Cited by
Get Citation
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:February 07,2022
  • Revised:
  • Adopted:
  • Online: January 10,2023
  • Published:
Article QR Code