Research Article

Trusted and Efficient Cross-Domain Access Control System Based on Blockchain

Figure 3

An overview of the proposed system. Step 1: DMSs upload the user roles, role map rules, and policies of devices on the blockchain. Step 2: users broadcast their cross-domain access requests. Steps 3 and 4: the blockchain records the audit records. Step 5: smart contract makes and returns the access decision. Step 6: devices return the resources to users.