Open Access iconOpen Access



Blockchain-Empowered Token-Based Access Control System with User Reputation Evaluation

Yuzheng Yang*, Zhe Tu, Ying Liu, Huachun Zhou

School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, 100044, China

* Corresponding Author: Yuzheng Yang. Email: email

(This article belongs to this Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)

Computers, Materials & Continua 2023, 77(3), 3163-3184.


Currently, data security and privacy protection are becoming more and more important. Access control is a method of authorization for users through predefined policies. Token-based access control (TBAC) enhances the manageability of authorization through the token. However, traditional access control policies lack the ability to dynamically adjust based on user access behavior. Incorporating user reputation evaluation into access control can provide valuable feedback to enhance system security and flexibility. As a result, this paper proposes a blockchain-empowered TBAC system and introduces a user reputation evaluation module to provide feedback on access control. The TBAC system divides the access control process into three stages: policy upload, token request, and resource request. The user reputation evaluation module evaluates the user’s token reputation and resource reputation for the token request and resource request stages of the TBAC system. The proposed system is implemented using the Hyperledger Fabric blockchain. The TBAC system is evaluated to prove that it has high processing performance. The user reputation evaluation model is proved to be more conservative and sensitive by comparative study with other methods. In addition, the security analysis shows that the TBAC system has a certain anti-attack ability and can maintain stable operation under the Distributed Denial of Service (DDoS) attack environment.


Cite This Article

Y. Yang, Z. Tu, Y. Liu and H. Zhou, "Blockchain-empowered token-based access control system with user reputation evaluation," Computers, Materials & Continua, vol. 77, no.3, pp. 3163–3184, 2023.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 271


  • 169


  • 0


Share Link