AUTHORIZATION MODELS FOR TRUSTLESS NODE INTERACTION IN PUBLIC DECENTRALIZED NETWORKS

Authors

DOI:

https://doi.org/10.17721/ISTS.2024.8.56-59

Keywords:

authorization, decentralized networks, reputation, Proof of Useful Work, security, trustless interaction

Abstract

B a c k g r o u n d . Decentralized networks, such as blockchain and peer-to-peer systems, have become the foundation for new technologies that ensure the security and transparency of operations without the need for centralized control authorities. These networks enable interaction between nodes without prior trust. However, ensuring reliable and efficient authorization in such networks presents a challenge due to the absence of a single authorization center. This creates the need to develop new models that allow secure access management based on the interaction between nodes. One of the main issues is that each node can potentially be malicious, and traditional authorization models used in centralized systems cannot provide the necessary level of security. The purpose of this study is to explore new approaches to authorizati on in public decentralized networks that do not require trust between participants.

M e t h o d s . The research investigates reputation-based authorization models and Proof of Useful Work (PoUW) models, which show promise for decentralized systems. The reputation model grants access rights based on the node's previous activity in the network, where each node accumulates reputation points for completing specific tasks. The second model, PoUW, allows nodes to gain authorization based on the number of useful computations performed. This approach not only enhances network security but also incentivizes nodes to carry out computational tasks that have practical value for the community.

R e s u l t s . Modeling has shown that both models effectively ensure the security and reliability of interaction between nodes. Nodes with a high reputation level or those that have completed a significant volume of useful computations gain access to critical network resources. The implementation of such approaches reduces the risk of malicious activity, as nodes that do not perform useful actions are restricted in their access rights.

C o n c l u s i o n s . The proposed authorization models based on reputation and Proof of Useful Work have demonstrated high efficiency in public decentralized networks. They enable secure interaction between nodes without the need for trust, making these approaches promising for future implementation in various fields. The use of these models provides dynamic access management to resources, minimizing the risks of malicious activity.

Downloads

Download data is not yet available.

References

Azouvi, S., Maller, M., & Meiklejohn, S. (2018). Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance. Financial Cryptography and Data Security, 127–143. https://doi.org/10.1007/978-3-662-58387-6_9

Buterin, V. (2014). Ethereum White Paper. A Next-Generation Smart Contract and Decentralized Application Platform. https://ethereum.org/en/whitepaper

Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., & Felten, E. W. (2015). SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IEEE Symposium on Security and Privacy, 104–121. https://doi.org/10.1109/SP.2015.14

Ball, M., Rosen, A., Sabin, M., & Vasudevan, P. (2017). Proofs of Useful Work. IACR Cryptology ePrint Archive. https://eprint.iacr.org

Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644. https://doi.org/10.1016/j.dss.2005.05.019.

Kiayias, A., Russell, A., David, B., & Oliynykov, R. (2017). Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. Annual International Cryptology Conference (рр. 357–388). https://doi.org/10.1007/978-3-319-63688-7_12

Nakamoto, S. (2008). Bitcoin. A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf

Published

2025-03-21

Issue

Section

Cybersecurity and information protection

How to Cite

AUTHORIZATION MODELS FOR TRUSTLESS NODE INTERACTION IN PUBLIC DECENTRALIZED NETWORKS. (2025). Information Systems and Technologies Security, 2(8), 56-59. https://doi.org/10.17721/ISTS.2024.8.56-59

Most read articles by the same author(s)