1. Introduction
Governance of mineral assets plays a pivotal role in national resource strategies, environmental regulation, and foreign investment. Yet, the mining industry continues to struggle with fragmented data infrastructure, opaque auditing processes, and centralized control of high-value asset records. As digital transformation accelerates across capital-intensive sectors, blockchain technology has been proposed as a mechanism for decentralization, traceability, and operational transparency in mining operations [
1,
2].
A prominent application of blockchain in asset management is tokenization— the process of digitally representing real-world assets, such as mining licenses or mineral reserves, as on-chain tokens. Recent studies have demonstrated the use of blockchain in mineral supply chains, highlighting its potential to improve traceability, stakeholder accountability, and provenance assurance in sectors like diamond and cobalt mining [
3]. However, if such tokenized systems lack fine-grained access control mechanisms, they risk exposing commercially sensitive data and may fail to comply with multi-jurisdictional regulations.
Traditional role-based access control models [
4] have dominated access governance in enterprise systems, including some blockchain integrations. However, RBAC struggles with the dynamic, contextual nature of access in mining operations—where permissions should depend on factors like license status, regulatory clearance, organizational affiliation, or environmental conditions. In response, the ABAC paradigm [
5] has gained attention for its flexibility and expressiveness, yet ABAC has seen limited deployment in industrial blockchain systems due to technical challenges in enforcement and scalability.
Motivated by these challenges, this paper presents a blockchain-integrated ABAC framework for tokenized mineral governance. In such regulated environments, access must account for multiple dynamic attributes—such as environmental zones, organizational roles, and jurisdictional mandates—that static RBAC models cannot accommodate [
6]. ABAC enables expressive and granular policy enforcement suitable for cross-organizational mining data sharing [
7].
To meet the performance, privacy, and compliance demands of the mining sector, we adopt Hyperledger Fabric as the blockchain foundation. Fabric’s support for permissioned networks aligns well with the consortium-based structure of mineral governance, offering enhanced identity management, transaction throughput, and confidentiality [
8,
9].
While the integration of ABAC with blockchain has been explored in various domains such as healthcare, IoT, and enterprise systems [
10,
11], its targeted application to the tokenization and governance of mineral resources remains underexplored. Prior work typically addresses generic access scenarios without accounting for the complex, multi-jurisdictional constraints of mining operations, such as dynamic licensing conditions, environmental compliance, and cross-organizational data exchange. This paper addresses that gap by proposing a domain-specific ABAC framework designed to handle the regulatory, operational, and privacy requirements unique to mineral asset tokenization.
This paper contributes a domain-specific, smart contract–driven ABAC system deployed over Hyperledger Fabric, designed for secure, configurable, and traceable access control over tokenized mining assets. Our key innovations lie in tailoring ABAC policy structures to mining-sector realities, including (i) a modular ABAC policy engine that supports context-aware, attribute-rich access rules specific to regulatory zones, organizational roles, and environmental permits; (ii) simulation of realistic mining scenarios using synthetic datasets that model industry actors and compliance conditions; (iii) performance benchmarking against RBAC and generic ABAC implementations, demonstrating superior control precision and latency under mining-relevant conditions; and (iv) verifiable on-chain policy auditing suited to high-compliance industrial settings. These contributions highlight the practical feasibility of fine-grained, regulation-conscious access control for tokenized mineral ecosystems.
1.1. Challenges
While integrating blockchain with ABAC offers significant promise for secure and auditable governance, several practical challenges hinder its adoption in compliance-critical sectors like mining:
- (i)
Rigid Access Models: Existing implementations primarily rely on role-based access control, which lacks the flexibility to accommodate the dynamic, multi-attribute requirements of operational mining environments [
12].
- (ii)
Off-Chain Policy Handling: Some systems offload access control logic to off-chain processes, reducing transparency and weakening the trust benefits of blockchain-based enforcement [
13].
- (iii)
Lack of Auditable and Scalable Infrastructure: Many solutions fail to provide structured audit trails or scalable mechanisms for high-volume enterprise data, undermining accountability and operational readiness [
11].
In parallel, tokenization pilots in the mining and energy sectors have focused on provenance and traceability but often overlook fine-grained, dynamic access boundaries and confidentiality requirements. This gap increases the risk of unauthorized exposure of sensitive financial, legal, or environmental data [
10].
These challenges motivate the need for a decentralized ABAC framework that is auditable, scalable, and specifically tailored to govern access to tokenized mineral assets in permissioned blockchain environments.
1.2. Contributions
Real-world initiatives such as the Web3in Tech-Lab [
14] demonstrate growing industry interest in leveraging permissioned blockchain for mineral resource governance. Building on this momentum, we propose a targeted, smart contract–driven ABAC framework that addresses the nuanced access control, privacy, and regulatory challenges inherent in tokenizing mining assets. We aim to simulate a realistic attribute-based access control system for tokenized mining licenses in this paper. While not a production deployment, the implementation closely mirrors enterprise-grade requirements in terms of data formats, access policy logic, and performance evaluation.
To sum it up, this paper makes the following key contributions to the field of blockchain-enabled access control for tokenized mining assets:
A modular ABAC framework: We design and implement a blockchain-integrated ABAC architecture, tailored specifically for the privacy, compliance, and scalability needs of the mining industry, building upon methodologies proposed by Rouhani et al. [
10].
Smart contract development: We develop a suite of reusable smart contracts in Go for Hyperledger Fabric, supporting decentralized user registration, policy specification, and access evaluation.
Simulation-based validation: We simulate a controlled test environment with 50 synthetic users and 30 tokenized resources to execute and log 1500 access evaluations under realistic policy constraints.
Audit logs: The system generates structured, timestamped CSV logs that support post-hoc analysis for anomaly detection, compliance auditing, and policy refinement.
Comparative evaluation: We conduct a comparative analysis between ABAC and traditional RBAC implementations, showing improved policy granularity, enforcement precision, and contextual flexibility [
11].
1.3. Organization of the Paper
The remainder of the paper is organized as follows.
Section 2 reviews the current landscape of blockchain-integrated access control, identifying key limitations in existing models.
Section 3 introduces the architectural foundations of the proposed ABAC framework, highlighting its domain-specific design considerations.
Section 4 presents the detailed implementation of system components, including smart contracts, data generation, and simulation logic.
Section 5 provides an evaluation of the framework’s performance, scalability, and auditability through controlled simulation experiments.
Section 6 concludes the paper with a summary of findings and outlines directions for future research.
Appendix A offers replication materials to facilitate transparency and reproducibility.
2. Related Work
This section reviews the state of the art in blockchain-based access control, privacy-aware access enforcement, and tokenized asset management in the context of mineral resource governance. Prior studies have explored blockchain’s potential for improving traceability and transparency in resource supply chains, but few have addressed the implementation of fine-grained, policy-driven access control systems tailored to the compliance-intensive needs of the mining sector. This paper builds upon recent advancements in ABAC and permissioned blockchain frameworks to present a practical, audit-capable solution for managing access to tokenized mineral assets.
2.1. Access Control Systems in Mineral Resource Governance
The integration of blockchain technology into mineral resource governance has introduced innovative approaches to access control, particularly through the adoption of ABAC models. Hyperledger fabric, a permissioned blockchain framework, has been instrumental in facilitating these advancements.
Pericherla et al. [
15] proposed methods to provide full ABAC functionality in Hyperledger Fabric, addressing the need for fine-grained access control in enterprise settings. Their performance evaluations using the Hyperledger Caliper benchmarking tool demonstrated the efficiency of their approach in practical scenarios.
In the context of mineral resource tokenization, platforms like Vero have emerged, transforming real-world mineral assets into verifiable digital tokens. Vero’s blockchain-powered platform ensures transparent engagement and compliant capital formation, highlighting the practical application of blockchain in mineral resource management [
16]. These real-world developments provide a comprehensive review of blockchain applications in the mining industry, including tokenization and supply chain transparency [
1].
Furthermore, DAMREV has explored the tokenization of minerals, emphasizing the potential of blockchain to enhance transparency and efficiency in the mining industry [
17]. These initiatives reflect a broader trend, where tokenized assets have been shown to improve transaction efficiency, data integrity, and regulatory alignment across decentralized resource-based sectors [
18]. Robust access control mechanisms remain essential to safeguarding sensitive data and maintaining compliance.
These developments underscore the critical role of ABAC models in managing access to tokenized mineral assets, ensuring that only authorized entities can interact with sensitive data and resources. By leveraging Hyperledger Fabric’s capabilities, these systems can enforce dynamic, attribute-driven access policies, aligning with the complex requirements of mineral resource governance.
2.2. ABAC Integration in Blockchain Systems
ABAC has gained significant traction for its ability to enforce fine-grained, context-aware policies. Unlike RBAC, ABAC leverages dynamic attributes—such as organizational role, project status, or environmental context—to enable more expressive and scalable access decisions [
19].
Implementing ABAC in blockchain environments presents challenges related to policy enforcement, system performance, and the protection of confidential data. A smart contract–based architecture for ABAC enforcement on Ethereum has demonstrated the feasibility of fine-grained access control in decentralized settings [
5]. However, public blockchains often suffer from scalability constraints and inherent privacy limitations, making them less suitable for enterprise-grade applications.
Permissioned blockchains like Hyperledger Fabric are increasingly favored for implementing enterprise-grade ABAC due to their modular architecture, decentralized identity management, and reduced consensus overhead. These features enable scalable and fine-grained policy enforcement while also supporting efficient attribute revocation and trust management—capabilities that are critical for secure access governance in dynamic environments such as the Internet of Things (IoT) and organizational networks [
20]. Recent work has also demonstrated enhanced policy expressiveness and scalability through hierarchical attribute structures and sharding techniques in smart contract–based ABAC systems [
21] as well as improved throughput in Hyperledger environments for IoT-focused applications [
22].
On-chain enforcement of attribute-based policies in Hyperledger Fabric has been demonstrated using a modular ABAC framework, improving policy expressiveness over traditional access models [
11].
These studies build upon these foundations by deploying a full ABAC-enforced system using Hyperledger Fabric for the tokenization of mining licenses. It contributes a reusable smart contract suite, structured access logs, and an evaluation framework for analyzing latency, scalability, and auditability in enterprise conditions.
2.3. Access Control in Mineral Resource Governance
The digital transformation of mineral resource governance necessitates secure, transparent, and compliant access control mechanisms. While blockchain technology has been explored for enhancing traceability in mineral supply chains, challenges remain in implementing fine-grained access control to protect sensitive data. For instance, blockchain-enabled traceability systems in mineral supply chains often fail to address existing inequalities in resource use and access, highlighting the need for robust data governance mechanisms [
3].
To address these challenges, integrating attribute-based access control models with blockchain technology has been proposed. A recent scheme presents a traceable and revocable multi-authority ABAC framework tailored for the mineral industry, utilizing blockchain and InterPlanetary File System (IPFS) to ensure secure data storage and fine-grained access control [
23]. This approach enables dynamic policy enforcement and enhances privacy preservation in multi-jurisdictional compliance scenarios.
Building upon these insights, our work implements an ABAC framework tailored to tokenized mining licenses. We introduce a scalable permissioned blockchain system that enforces contextual access policies using smart contracts, thereby enabling confidentiality, auditability, and regulatory alignment in mineral asset management.
2.4. Comparison with Existing Work
Most existing blockchain-based access control systems tend to follow rigid RBAC models, rely on public blockchains, or lack the auditability and scalability required for enterprise use. In contrast, our framework is designed for real-world deployment in the mineral governance domain, emphasizing fine-grained control, performance, and compliance readiness.
In summary, prior research has laid a strong conceptual foundation for integrating ABAC with blockchain, particularly within permissioned architectures like Hyperledger Fabric. However, existing solutions often lack domain-specific deployment, audit readiness, and scalability for compliance-heavy industries such as mining, as shown in
Table 1. This paper addresses these gaps by designing and implementing a blockchain-enforced ABAC system tailored to tokenized mineral asset governance. Our work advances beyond theoretical models by offering a deployable, auditable framework that supports dynamic policies, structured logging, and enterprise-grade evaluation metrics.
3. System Design
This section outlines the architectural design and methodology used to implement a blockchain-integrated ABAC system over Hyperledger Fabric. It describes the smart contract logic, synthetic data generation, and simulation steps employed to validate policy enforcement under realistic conditions.
3.1. Overview
The methodology adopted in this research demonstrates the practical viability of an ABAC system integrated with blockchain technology for the privacy-preserving tokenization of mineral reserves.
The primary objective is to move beyond traditional role-based systems and validate a dynamic, attribute-driven model where access permissions are governed based on real-world conditions such as mining licenses, ownership percentages, and regulatory statuses [
24]. This direction aligns with recent advances in lightweight ABAC models that leverage blockchain frameworks, such as Hyperledger Fabric, to enforce fine-grained, auditable, and decentralized access control for sensitive resources in constrained environments [
25].
The overall approach can be divided into three main phases:
3.2. Blockchain Network and Smart Contract Deployment
A permissioned blockchain network is deployed using Hyperledger Fabric v2.2 as shown in
Figure 1 to facilitate secure and verifiable policy evaluation and access management [
8,
25]. The network comprises two peer organizations (
Org1 and
Org2) and one ordering service organization. Chaincode (smart contract) is developed in Go and instantiated on the channel named
mychannel. The smart contract includes three core functions:
RegisterUser,
CreatePolicy, and
EvaluateAccess. These functions enable user registration with attribute-based details, dynamic policy creation for mining licenses, and real-time access evaluations, respectively [
27].
Recent advances have explored scalable permissioned blockchain frameworks optimized for privacy-preserving IoT authentication and lightweight data storage [
28]. These improvements are especially relevant in enterprise contexts, such as mineral resource governance, where scalability and secure data management are critical.
To ensure modular and maintainable development, the chaincode structure follows best practices as described in the Hyperledger Fabric documentation [
8]. Access control conditions are defined using logical combinations of user attributes such as role, location, and affiliation [
24].
The blockchain network uses a permissioned consortium-based architecture built with Hyperledger Fabric. For implementation details, including Docker containerization, TLS security, and organizational setup.
Deployment is orchestrated through Docker-based containers, providing modularity, isolated service management, and future extensibility [
29]. Communications among peer nodes are secured using mutual Transport Layer Security (TLS). Endorsement policies are configured to require multi-organization approval, enhancing system trust through collaborative validation.
The blockchain network uses a permissioned consortium-based architecture built with Hyperledger Fabric. For implementation details, including Docker containerization, TLS security, and organizational setup.
All chaincode invocations and queries are executed via the Fabric CLI (
peer commands), with TLS certificates and Orderer addresses explicitly configured in evxecution context [
30].
- (a)
The FABRIC_CFG_PATH environment variable is exported during simulation execution to ensure the correct linkage to peer configuration files (e.g., core.yaml).
- (b)
MSP artifacts for each peer are derived from the organizations/peerOrganizations directory to ensure identity recognition and endorsement compatibility across the network.
- (c)
Separate endorsement policies are dynamically configurable depending on the type of resource being accessed. This allowed fine-tuned control over policy enforcement and reflects a scalable and adaptable network design.
3.3. Synthetic Data Generation for Users and Resources
The smart contract encapsulates three primary functions essential to the simulated access control environment: user registration, policy creation, and access evaluation. These operations are engineered to map directly to real-world interactions within resource access management systems, ensuring contextual relevance and system fidelity.
- (1)
User Registration Function (RegisterUser)
Users are registered on the blockchain ledger with distinct identities and attribute sets. Each user’s attributes—such as designation, organization, and roles—are captured in a JSON object. Upon invocation, the smart contract securely stores these attributes on-chain, linking them immutably to the user identifier [
19,
31].
- (2)
Policy Creation Function (CreatePolicy)
Access policies are formulated for each mining license resource, based on ABAC principles. Policies specify permissible conditions (e.g., roles allowed to access specific licenses). The smart contract maintains these policies on-chain as key-value mappings between resource IDs and their access conditions, allowing efficient retrieval and enforcement during queries [
32].
- (3)
Access Evaluation Function (EvaluateAccess)
During access requests, the smart contract is invoked to dynamically evaluate user attributes against the corresponding resource’s policy rules. Access decisions are returned as Granted or Denied, with each interaction immutably logged on-chain. This mechanism ensures consistency in policy enforcement and provides a reliable basis for post-simulation analysis.
3.3.1. Chaincode Interaction Flow
A high-level view of the interaction flow among the core smart contract operations is shown in
Figure 2. The arrows indicate the sequence of interaction between the user/client and smart contract functions (
RegisterUser,
CreatePolicy,
EvaluateAccess), with each label denoting the specific operation invoked.
3.3.2. Security and Robustness Considerations
All transactions are secured with TLS, and chaincode endorsement policies are enforced to require multiple peer approvals, ensuring resistance against unilateral manipulations. Furthermore, input validations are embedded to mitigate injection or malformed query risks, enhancing system resilience.
3.3.3. Design Choices Justification
The smart contract design emphasizes modularity, allowing independent evolution of user, policy, and evaluation logic. Furthermore, the ABAC model is selected over traditional role-based models to better reflect real-world complexity, where access conditions often depend on dynamic multi-attribute evaluations rather than static role assignments.
3.3.4. Synthetic Dataset Generation
In order to simulate a realistic operational environment, synthetic datasets are generated for both users and mining licenses. This approach is commonly used in blockchain performance testing to ensure control over input variance and reproducibility [
33].
- (a)
User Dataset: A script is developed to programmatically generate 50 user profiles, each associated with randomized yet structured attributes. These included roles such as Regulator, CompanyOfficial, and FieldEngineer, along with geographic affiliations.
- (b)
Resource Dataset: A sample of mining license data is obtained from Australian government datasets of current mining licenses. Each license is identified by a unique Tenement Number (TNO) and accompanied by relevant metadata.
Attribute values are carefully balanced to simulate diversity, ensuring a mixture of users who qualify for access under different policy conditions. This was achieved by using stratified random sampling across predefined attribute categories (e.g., role, clearance level, organization), ensuring that each combination occurred with sufficient frequency to meaningfully trigger policy-based access decisions during simulation. Generated users are stored in a structured JSON file (generated_users.json), and mining licenses are organized similarly in mining_licences_sample.json.
3.4. Policy Creation and Access Simulation
In order to simulate realistic system conditions, a structured synthetic data generation methodology is adopted. The generated datasets encompass three primary entities: users, resources (mining licenses), and access control policies. Each dataset is crafted to mimic the diversity and complexity observed in real-world industrial environments, thereby enhancing the relevance and applicability of subsequent analysis. [
33,
34].
Fifty distinct users are synthetically created, each assigned a unique identifier (user01, user02, …, and user50). For every user, a set of attributes was generated, including:
- (a)
Role: (e.g., geologist, engineer, regulator)
- (b)
Organization: (e.g., Org1, Org2)
- (c)
Department: (optional, e.g., Mining Operations, Compliance)
- (d)
Clearance Level: (e.g., Confidential, Restricted, Public)
{
"user_id": "user01",
"attributes": {
"role": "geologist",
"organization": "Org1",
"clearance": "Confidential"
}
}
- 2.
Resource (Mining License) Data Generation
A curated sample of 30 mining license entries is prepared. Each mining license was identified by a unique tenement number (TNO) and accompanied by metadata such as
- (a)
Resource Type: (e.g., coal, iron ore, gold)
- (b)
Geographic Location
- (c)
Regulatory Sensitivity Level
This resource pool reflects real-world mining license databases, enabling meaningful modeling of access policies.
- 3.
Access Control Policy Generation
For each resource, policies are dynamically generated based on user attributes. Policies specify allowable access based on logical conditions such as
{
"MIN4701": {
"organization": "Org1",
"role": "geologist",
"clearance": "Confidential"
}
}
3.4.1. Workflow Summary Diagram
A summary of the synthetic data generation process is illustrated in
Figure 3.
3.4.2. Rationale Behind Structured Generation
Structured and schema-consistent generation of synthetic datasets is critical to
- (a)
Ensure compatibility with blockchain transaction formats.
- (b)
Enable repeatable and scalable simulations with minimal manual intervention.
- (c)
Facilitate AI-readiness for future data analytics and visualization tasks by maintaining machine-readable JSON formats.
3.5. Structured Output for Easier Analysis
To validate the robustness, responsiveness, and scalability of the blockchain-based access control system, an extensive simulation involving 50 unique users and 30 distinct resources was executed. This setup was designed to mirror the interaction complexity found in real-world multi-user environments such as mining governance, industrial IoT systems, and decentralized data platforms [
27,
35].
A combinatorial evaluation is performed, whereby every user is assessed against every resource to determine access eligibility. This resulted in a total of
Each query simulates a blockchain smart contract invocation that either grants or denies access based on the dynamic evaluation of attribute-based policies.
- 2.
System Execution Flow
The simulation is organized into three sequential phases:
- (a)
User Registration: All 50 users are registered on the blockchain network via smart contract invocations.
- (b)
Policy Creation: Policies are dynamically created and mapped to resources, ensuring access conditions varied in complexity.
- (c)
Access Evaluation: Each user-resource pair is evaluated individually through smart contract queries, with interactions logged systematically for later analysis.
The execution flow of the simulation script is illustrated in
Figure 4.
- 3.
Performance and Latency Considerations
Performance metrics such as transaction latency and access decision speed are implicitly captured via blockchain event timestamps. Although detailed profiling (e.g., endorsement time, commit latency) is not performed, the system demonstrates capability to handle large query volumes without error or deadlock under the test configuration.
- 4.
Scalability to Real-World Scenarios
The simulation framework ensures system scalability through the following settings.
- (a)
JSON-formatted payloads for flexible input scaling.
- (b)
Dynamic attribute-based smart contracts for adaptable evaluations.
- (c)
Structured CSV/JSON logs suitable for easier analysis with minimal preprocessing.
Access evaluation results are stored in structured, machine-readable logs with the following fields:
- (a)
Requester (user ID)
- (b)
Resource (TNO/license ID)
- (c)
Status (Granted/Denied)
- (d)
LatencyMs (response time)
- (e)
Timestamp (ISO 8601 [
36])
3.6. Simulation Scalability and Real-World Relevance
The simulation is scaled to model 50 users interacting with multiple mining license resources, reflecting enterprise or governmental deployment sizes and addressing known scalability concerns in blockchain systems [
8,
37] as depicted in
Figure 5. Each user had a unique identity and attributes to simulate role diversity. Each user-resource pair triggers three core operations: registration, policy creation, and access evaluation, as depicted in
Table 2, resulting in thousands of transactions across a single simulation run. Despite the load, the architecture requires no fundamental change, consistent with prior findings on Hyperledger Fabric’s scalability and transaction throughput [
38,
39].
Transaction latencies remain consistently in the low millisecond range [
39,
40], and system error rates are negligible post-initial configuration tuning.
It is important to note that these simulations were executed on a local, Docker-based deployment of Hyperledger Fabric, which does not reflect the full behavior of geographically distributed or enterprise-scale networks. Performance results such as latency and throughput may vary under real-world conditions due to inter-peer communication delays, consensus timing, and infrastructure variability.
In addition, the system was tested using synthetic user and policy data designed to mirror realistic mining operations. While this allows for systematic control over experiment variables, it does not fully capture the unpredictability of real-world datasets or user behavior.
Future extensions may incorporate peer failures, network delays, or adversarial scenarios for stress testing [
41,
42].
In summary, this section outlines a full-stack approach to designing, deploying, and validating a blockchain-based ABAC framework tailored for mineral asset governance. By combining smart contract implementation, synthetic data modeling, and large-scale simulation, the system is evaluated for correctness and scalability. However, we acknowledge that full deployment in operational settings may involve additional complexity not captured by this controlled simulation environment. The architecture’s modular design and structured logging enable downstream analytics and future expansion into production-ready applications in compliance-driven environments.
4. Design and Development
In this section, we present the multi-layered architecture, data structures, and deployment configurations that underpin our blockchain-integrated ABAC system. We detail how Hyperledger Fabric, structured JSON/CSV formats, and scripted simulations were combined to support automated access control, evaluation, and analysis for tokenized mining licenses.
4.1. Architecture Overview
The system architecture developed in this paper follows a multi-layered design, structured to deliver fine-grained access control for tokenized mining licenses through blockchain-enabled ABAC mechanisms. Each layer is responsible for specific operations, ranging from user interaction to policy enforcement and ledger recording. This modular and decentralized approach has been shown to enhance both security and scalability in permissioned blockchain systems [
10,
13].
4.1.1. Test Network and Base Repository Reference
Custom components—smart contracts, user registration logic, and simulation scripts—were integrated atop this base repository to support ABAC-specific functionality.
4.1.2. Layered System Breakdown
- (a)
Application Layer: This layer consists of user-facing components and the ABAC Policy, which handles attribute-based authorization, access simulations, and client requests.
- (b)
ABAC Policy Engine: Core functions include access policy parsing, rule matching, and simulation orchestration. It bridges client interactions with blockchain smart contracts, a design pattern supported by recent work on dynamic policy enforcement in blockchain-based systems [
13].
- (c)
Blockchain Network: Powered by Hyperledger Fabric for decentralized identity, chaincode execution, and immutable logging.
- (d)
Smart Contracts: Encapsulate logic for user registration, access policy creation, and access evaluation.
- (e)
Data Layer: Comprises users, resources, and structured datasets.
4.2. Data Structures and File Formats
4.2.1. User and Policy JSON Inputs
Blockchain transactions were structured using JSON-formatted payloads for user registration and policy definition. Listing 1 illustrates the structure of a user registration payload, where each user is assigned a unique identifier and a set of descriptive attributes, such as organizational affiliation, role, and clearance level.
Listing 1. Sample user registration input. |
![Applsci 15 08290 i001]() |
Similarly, Listing 2 presents a sample policy specification format, mapping resource identifiers (e.g., mining license IDs) to attribute-based access control conditions. These JSON policies are evaluated at runtime during access requests
Listing 2. Sample policy input format. |
![Applsci 15 08290 i002]() |
4.2.2. CSV Log Format for Evaluation Results
The access evaluation results are stored in a structured CSV format with the following fields:
user_id,
resource_id,
status,
latency_ms, and
timestamp. An example is shown in Listing 3.
Listing 3. Excerpt from simulation_results.csv. |
user01, MIN4701, Granted, 42, 2025-04-25T07 : 22 : 11Z |
user02, MIN5288, Denied, 38, 2025-04-25T07 : 22 : 12Z |
The use of structured JSON for inputs and CSV for logging enabled reproducible experimentation, streamlined access auditing, and seamless integration with data analytics tools such as Python (Pandas), Excel, and machine learning pipelines.
4.3. Deployment Configuration and Execution Scripts
The blockchain environment and simulation workflows were deployed and orchestrated using automated configurations and scripting tools. This setup ensured experimental consistency and facilitated reproducibility of results.
4.3.1. Docker-Based Setup
Using Docker Compose to deploy:
- (a)
peer0.org1.example.com
- (b)
peer0.org2.example.com
- (c)
orderer.example.com
- (d)
Organization-specific CAs
- (e)
CLI containers
4.3.2. Fabric Configuration
Each peer was configured using a dedicated core.yaml file, and environment variable FABRIC_CFG_PATH was set to enable secure CLI-based interactions.
4.3.3. Python Simulation Script
A script run_simulation.py automates:
- (a)
User registration
- (b)
Policy creation
- (c)
Access evaluation over 1500 user-resource interactions
4.3.4. Environment Setup
- (a)
Docker v20.10+
- (b)
Hyperledger Fabric v2.2
- (c)
Python 3.8+
- (d)
Bash with peer CLI access
4.3.5. Script Flow Overview
The simulation execution flow is summarized as in
Figure 6:
For complete YAML configurations, CLI command sequences, and reproduction instructions, refer to
Appendix A.
In summary, the architecture follows a modular and layered design that integrates Hyperledger Fabric smart contracts with an ABAC policy engine. The structured use of data formats and automated scripting ensures scalability, reproducibility, and integration readiness for performance testing and analytics workflows.
5. Evaluation and Results
In this section, the operational performance and decision accuracy of the proposed ABAC-based blockchain framework are evaluated within a permissioned mining governance context. The evaluation is conducted by simulating 1500 access requests involving 50 distinct users and 30 tokenized mining licenses, executed on a locally hosted Hyperledger Fabric network. The assessment encompasses key performance metrics, including latency and throughput, as well as access decision distributions. A comparative analysis between ABAC and RBAC models is also presented. Additionally, visualizations and log data are used to support the auditability and practical applicability of the framework under dynamic, attribute-based policy conditions.
5.1. Simulation Setup
To assess the operational validity and performance of the blockchain-integrated ABAC framework, a controlled simulation environment was configured and executed. The simulation was designed to emulate a realistic access control scenario within a permissioned mining governance network, thereby providing representative insights into the system’s behavior under practical conditions.
5.1.1. Evaluation Environment
The simulation was conducted on a locally hosted Hyperledger Fabric v2.2 network (
Figure 7) with the following configuration:
- (a)
Network Topology: Two peer organizations (Org1, Org2), one ordering service, and one Certificate Authority (CA) per organization.
- (b)
Channel: A single communication channel named mychannel for all smart contract transactions.
- (c)
Smart Contract: Written in Go, encapsulating three core functions—RegisterUser, CreatePolicy, and EvaluateAccess.
- (d)
Security: All communications were secured using Transport Layer Security (TLS). Peer CLI invocations used MSP identities and certificate chains.
5.1.2. Simulation Workflow
The evaluation was executed using a Python automation script:
Registering 50 users with unique attribute profiles.
Creating ABAC rules for 30 mining licenses.
Evaluating 1500 user-resource access queries.
5.1.3. Data Inputs and Logging
Input JSON files:
generated_users.json
mining_licenses.json
access_policies.json
Outputs were written to simulation_results.csv and included user ID, resource ID, access status, latency, and timestamp.
5.2. Access Outcome Analysis and Performance Metrics
We present the distribution of access decisions made during the simulation. The granted and denied request counts highlight how the implemented ABAC policies filtered user-resource combinations based on defined attribute conditions.
5.2.1. Access Decision Distribution
5.2.2. Pattern Observations
Here, we analyze the trends observed in the simulation results. This includes the influence of user attributes, organizational affiliation, and license policy structure on access outcomes, providing insights into policy effectiveness and selectivity.
- (a)
Attribute combinations such as Regulator + Confidential showed high access alignment with policies.
- (b)
Users from Org2 and those with Public clearance were largely filtered out by policy conditions.
- (c)
Licenses with broader attribute criteria (e.g., MIN4701) accounted for a majority of granted decisions.
5.2.3. Evaluation Accuracy
Manual cross-checks revealed zero mismatches in access decisions, confirming full decision consistency as verified during earlier validation.
5.2.4. Performance Metrics
We report key performance metrics, including latency and throughput, to evaluate the system’s operational feasibility. These results demonstrate the responsiveness, scalability, and technical robustness of the ABAC framework under simulated enterprise conditions.
Latency Observations:
Min Latency: 28 ms
Max Latency: 61 ms
Avg Latency: ∼39.7 ms
5.3. Comparative Assessment
RBAC vs. ABAC: Traditional role-based access control models lack flexibility in handling dynamic, attribute-driven conditions. In contrast, the attribute-based access control model implemented here enabled nuanced decisions based on user attributes like clearance level and organizational affiliation. Experiments showed ABAC achieved a lower false grant rate compared to a simulated RBAC baseline.
Prior Work Comparison: Previous blockchain-based ABAC models—for example, Zhang et al. [
43]—report latencies ranging from 50 to 100 milliseconds, primarily within IoT contexts. In comparison, our system achieved an average latency of approximately 39 milliseconds while supporting cryptographically verifiable, multi-attribute policies specifically tailored to mining governance.
5.4. Visualization-Based Insights
To provide a clearer understanding of access behavior, we analyzed simulation outcomes using three visual representations.
Figure 8 shows the overall access outcome distribution. Out of 1500 total access requests, 356 were granted while 1144 were denied, reflecting the strict enforcement of attribute-based policies in our framework.
Figure 9 depicts the percentage of successful access requests per user. The results indicate that users affiliated with regulatory roles and possessing higher clearance levels had significantly higher grant rates, whereas general users lacking sufficient attributes consistently experienced denials.
Finally,
Figure 10 presents an access matrix mapping users to resources. Granted and denied requests are visually clustered, illustrating how various attribute profiles either satisfied or failed to meet the ABAC policy conditions. This visualization reinforces the observed selectivity of the access control logic.
5.5. Security Considerations and Threat Awareness
While this work does not include a formal threat model, certain classes of security concerns are inherently addressed by the system’s architectural design. The use of Hyperledger Fabric ensures that all access control operations—such as policy definition, evaluation, and logging—are tamper-evident and auditable through immutable ledger records. Attribute-based access control allows for context-sensitive enforcement, reducing exposure to hardcoded privilege escalation risks typical of static RBAC systems.
However, the system has not yet been evaluated against advanced threat scenarios such as insider collusion, policy injection attacks, or compromised peer nodes. These remain important areas for future work. In particular, applying formal threat modeling frameworks such as STRIDE, attack trees, or misuse cases could provide a more systematic analysis of resilience under adversarial conditions.
6. Conclusions and Future Work
This paper presented a modular, blockchain-based access control framework that integrates ABAC with smart contracts to manage access to tokenized mining licenses. Deployed on Hyperledger Fabric and validated through structured simulation, the system demonstrated robust correctness by enforcing over 1500 access decisions in full compliance with defined policies. The framework provided fine-grained control, granting access to only 23.7% of requests based on dynamic attribute conditions, thereby mitigating the risk of unauthorized exposure. Performance testing indicated the system could sustain over 100 access evaluations per minute with sub-40 ms latency, confirming its responsiveness for real-world applications. Furthermore, the use of structured JSON inputs and CSV logs ensured auditability and readiness for integration with AI and data analytics pipelines.
Looking ahead, future research can expand this work through large-scale stress testing, including adversarial simulations and distributed peer deployments to assess fault tolerance. Such stress testing under adverse network conditions and peer failures remains to be conducted, as this study focused on controlled environments with stable parameters. Live pilot trials in partnership with industry or regulators will provide opportunities for field validation. Enhancements such as incorporating contextual conditions (e.g., geolocation or time-based rules), integrating privacy-preserving mechanisms like zero-knowledge proofs, and leveraging structured logs for AI-based policy optimization and anomaly detection represent promising directions to extend the system’s utility in compliance-critical environments.
The current framework incorporates foundational access control aligned with privacy principles, though detailed consideration of cross-border regulations and ethical frameworks is reserved for future work
Author Contributions
Conceptualization, P.N. and H.C.; Methodology, P.N. and H.C.; Validation, P.N. and H.C.; Formal analysis, P.N.; Investigation, P.N. and B.C.; Resources, P.N., B.C. and H.C.; Writing—original draft, P.N.; Writing—review & editing, H.C.; Visualization, P.N.; Supervision, B.C. and H.C. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Informed Consent Statement
Not applicable.
Data Availability Statement
The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.
Acknowledgments
During the development of the simulation environment, the authors used ChatGPT (OpenAI GPT-4, 2025 version) for the purposes of learning foundational concepts related to ABAC, Hyperledger Fabric architecture, and simulation setup strategies. The authors have reviewed and edited the output and take full responsibility for the content of this publication.
Conflicts of Interest
The authors declare no conflicts of interest.
Abbreviations
The following abbreviations are used in this manuscript:
ABAC | Attribute-Based Access Control |
RBAC | Role-Based Access Control |
IoT | Internet of Things |
AI | Artificial Intelligence |
ML | Machine Learning |
TLS | Transport Layer Security |
CLI | Command-Line Interface |
CA | Certificate Authority |
JSON | JavaScript Object Notation |
CSV | Comma-Separated Values |
MSP | Membership Service Provider |
URL | Uniform Resource Locator |
ZKPs | Zero-Knowledge Proofs |
SMPC | Secure Multi-Party Computation |
Go | Go Programming Language |
Docker | (Platform for containerized application deployment) |
Appendix A. GitHub Repository and Replication Instructions
The full source code for the simulation and ABAC smart contract implementation used in this research is available on GitHub:
Appendix A.1. Repository Contents
The repository includes:
Custom smart contracts written in Go for Attribute-based access control.
JSON datasets for users, resources, and policies.
Python-based simulation script run_simulation.py to generate and evaluate 1500 access requests.
Output logs and results saved in simulation_results.csv.
Appendix A.2. Steps for Reproduction
To replicate the simulation results, follow the steps below:
git clone https://github.com/Padmini666/Simulation-of-Blockchain-ABAC-for-Mining-Industry.git |
cd fabric-samples |
- 2.
Install and launch Docker Desktop. Ensure Docker is running.
- 3.
Navigate to the test-network directory and bring up the network with certificate authorities (CA):
./network.sh up createChannel -ca |
- 4.
Deploy the ABAC chaincode:
./network.sh deployCC -ccn abac -ccp ../chaincode/abac/go -ccl go |
cd scripts |
python3 run_simulation.py |
- 6.
View the output results in:
Appendix A.3. System Requirements
The simulation was tested under the following environment:
macOS with Apple M1 chip
Docker v20.10+
Python 3.8+
Hyperledger Fabric v2.2
This repository can be adapted to various environments with minor configuration changes for Windows or Linux.
References
- Jha, A.; Young, A.; Sattarvand, J. Blockchain Technology and Mining Industry: A Review. Min. Metall. Explor. 2023, 40, 2269–2280. [Google Scholar] [CrossRef]
- Mugurusi, G.; Ahishakiye, E. Blockchain technology needs for sustainable mineral supply chains: A framework for responsible sourcing of cobalt. Procedia Comput. Sci. 2022, 200, 638–647. [Google Scholar] [CrossRef]
- Calvão, F.; Archer, M. Digital extraction: Blockchain traceability in mineral supply chains. Political Geogr. 2021, 87, 102381. [Google Scholar] [CrossRef]
- Liu, D.; Dong, A.; Yan, B.; Yu, J. DF-RBAC: Dynamic and Fine-grained Role-Based Access Control Scheme with Smart Contract. Procedia Comput. Sci. 2021, 187, 359–364. [Google Scholar] [CrossRef]
- Zhang, Y.; Kasahara, S.; Shen, Y.; Jiang, X.; Wan, J. Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J. 2019, 6, 1594–1605. [Google Scholar] [CrossRef]
- Ouaddah, A.; Mousannif, H.; Abou Elkalam, A.; Ait Ouahman, A. Access control in the Internet of Things: Big challenges and new opportunities. Comput. Netw. 2017, 112, 237–262. [Google Scholar] [CrossRef]
- Bagga, P.; Das, A.K.; Chamola, V.; Guizani, M. Blockchain-envisioned access control for Internet of things applications: A comprehensive survey and future directions. Telecommun. Syst. 2022, 81, 125–173. [Google Scholar] [CrossRef]
- Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Yellick, J. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018; ACM: New York, NY, USA, 2018. [Google Scholar] [CrossRef]
- Sukhwani, H.; Wang, N.; Trivedi, K.S.; Rindos, A. Performance Modeling of Hyperledger Fabric (Permissioned Blockchain Network). In Proceedings of the 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 1–3 November 2018; IEEE: New York, NY, USA, 2018; pp. 1–8. [Google Scholar] [CrossRef]
- Rouhani, S.; Belchior, R.; Cruz, R.S.; Deters, R. Distributed Attribute-Based Access Control System Using Permissioned Blockchain. World Wide Web 2021, 24, 1617–1644. [Google Scholar] [CrossRef]
- Lawal, S.; Krishnan, R. Attribute-Based Access Control Policy Review in Permissioned Blockchain. In Secure Knowledge Management in the Artificial Intelligence Era, Proceedings of the 9th International Conference, SKM 2021, San Antonio, TX, USA, 8–9 October 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 97–109. [Google Scholar] [CrossRef]
- Xu, Z.; Stoller, S.D. Mining Attribute-Based Access Control Policies. arXiv 2013, arXiv:abs/1306.2401. Available online: https://arxiv.org/abs/1306.2401 (accessed on 20 May 2025). [CrossRef]
- Hameed, K.; Raza, A.; Garg, S.; Amin, M.B. A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things. SSRN Electron. J. 2022. [Google Scholar] [CrossRef]
- Web3in Tech-Lab: Real-world Blockchain Applications in Mineral Governance. Available online: https://www.web3in.tech/ (accessed on 20 July 2025).
- Pericherla, S.K.; Garimella, N.; Garimella, N. Towards Providing Full Attribute-Based Access Control Functionality in Hyperledger Fabric. In Proceedings of the International Conference on Advanced Computing Technologies and Applications, Coimbatore, India, 4–5 March 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 231–248. [Google Scholar] [CrossRef]
- Vero Minerals Platform. Transforming Mineral Ownership into Digital Assets. 2024. Available online: https://veromining.io (accessed on 3 May 2025).
- DAMREV. Tokenized Minerals: Transforming Natural Resources into Digital Assets. 2024. Available online: https://www.damrev.com/2024/03/22/tokenized-minerals-transforming-natural-resources-into-digital-assets (accessed on 1 May 2025).
- Tanveer, U.; Ishaq, S.; Hoang, T. Tokenized Assets in a Decentralized Economy: Balancing Efficiency, Value, and Risks. Int. J. Prod. Econ. 2025, 260, 109554. [Google Scholar] [CrossRef]
- Hu, V.C.; Ferraiolo, D.F.; Kuhn, R.; Schnitzer, A.; Sandlin, K.; Miller, R.; Scarfone, K. Guide to Attribute Based Access Control (ABAC) Definition and Considerations; Technical Report NIST Special Publication 800-162; National Institute of Standards and Technology (NIST): Boulder, CO, USA, 2015. [Google Scholar] [CrossRef]
- Shammar, E.A.; Zahary, A.T.; Al-Shargabi, A.A. An Attribute-Based Access Control Model for Internet of Things Using Hyperledger Fabric Blockchain. Wirel. Commun. Mob. Comput. 2022, 2022, 1–25. [Google Scholar] [CrossRef]
- Bakhtiary, V.; Mirabi, M.; Salajegheh, A.; Erfani, S.H. Combo-Chain: Towards a hierarchical attribute-based access control system for IoT with smart contract and sharding technique. Internet Things 2024, 25, 101080. [Google Scholar] [CrossRef]
- Abdulrahman, E.; Alshehri, S.; Alzubaidy, A.; Cherif, A. A Distributed Blockchain-based Access Control for the Internet of Things. arXiv 2025, arXiv:2503.17873. [Google Scholar] [CrossRef]
- Zhang, X.; Du, W.; Moshayedi, A.J. A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain. J. Supercomput. 2023, 79, 14743–14779. [Google Scholar] [CrossRef]
- Hu, V.C.; Ferraiolo, D.; Kuhn, R. Assessment of Access Control Systems. Nist Interagency/Internal Rep. (Nistir) 2015, 7316. [Google Scholar] [CrossRef]
- Alshehri, S.; Bamasag, O. AAC-IoT: Attribute Access Control Scheme for IoT Using Lightweight Cryptography and Hyperledger Fabric Blockchain. Appl. Sci. 2022, 12, 8111. [Google Scholar] [CrossRef]
- Monrat, A.A.; Schelén, O.; Andersson, K. Performance Evaluation of Permissioned Blockchain Platforms. In Proceedings of the 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), Online, 16–18 December 2020; pp. 1–8. [Google Scholar] [CrossRef]
- Liu, H.; Han, D.; Li, D. Fabric-IoT: A Blockchain-Based Access Control System in IoT. IEEE Access 2020, 8, 18207–18218. [Google Scholar] [CrossRef]
- Addula, S.R.; Ali, A. A Novel Permissioned Blockchain Approach for Scalable and Privacy-Preserving IoT Authentication. J. Cyber Secur. Risk Audit. 2025, 2025, 222–237. [Google Scholar] [CrossRef]
- Boettiger, C. An Introduction to Docker for Reproducible Research. Acm Sigops Oper. Syst. Rev. 2015, 49, 71–79. [Google Scholar] [CrossRef]
- Antwi, M.; Adnane, A.; Ahmad, F.; Hussain, R.; Rehman, M.H.u.; Kerrache, C.A. The case of HyperLedger Fabric as a blockchain solution for healthcare applications. Blockchain Res. Appl. 2021, 2, 100012. [Google Scholar] [CrossRef]
- Xu, R.; Chen, Y.; Blasch, E. Decentralized Access Control for IoT Based on Blockchain and Smart Contract. In Modeling and Design of Secure Internet of Things; Kamhoua, C.A., Njilla, L.L., Kott, A., Shetty, S., Eds.; Wiley: Hoboken, NJ, USA, 2020; pp. 499–522. [Google Scholar] [CrossRef]
- Riabi, I.; Ben Ayed, H.K.; Saidane, L.A. A Survey on Blockchain-Based Access Control for Internet of Things. In Proceedings of the 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC), Tangier, Morocc, 24–28 June 2019; IEEE: New York, NY, USA, 2019; pp. 502–507. [Google Scholar] [CrossRef]
- Alharby, M.; van Moorsel, A. BlockSim: A Simulation Framework for Blockchain Systems. Acm Sigmetrics Perform. Eval. Rev. 2019, 46, 135–138. [Google Scholar] [CrossRef]
- Razmyslovich, A.; Murasheva, K.; Sedlova, S.; Capitaine, J.; Dmitriev, E. ELTEX: A Framework for Domain-Driven Synthetic Data Generation. arXiv 2025, arXiv:2503.15055. [Google Scholar] [CrossRef]
- Ammar, M.; Russello, G.; Crispo, B. Internet of Things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl. 2018, 38, 8–27. [Google Scholar] [CrossRef]
- ISO 8601; Date and Time Format. ISO: Geneva, Switzerland, 2019.
- Rao, I.S.; Kiah, M.L.M.; Hameed, M.M.; Memon, Z.A. Scalability of Blockchain: A Comprehensive Review and Future Research Direction. Clust. Comput. 2024, 27, 5547–5570. [Google Scholar] [CrossRef]
- Gorenflo, C.; Lee, S.; Golab, L.; Keshav, S. FastFabric: Scaling Hyperledger Fabric to 20,000 Transactions per Second. Int. J. Netw. Manag. 2020, 30, e2099. [Google Scholar] [CrossRef]
- Thakkar, P.; Nathan, S.; Viswanathan, B. Performance Benchmarking and Optimizing Hyperledger Fabric Blockchain Platform. arXiv 2018, arXiv:1805.11390. Available online: https://arxiv.org/abs/1805.11390 (accessed on 10 April 2025). [CrossRef]
- Bano, S.; Sonnino, A.; Al-Bassam, M.; Azouvi, S.; McCorry, P.; Meiklejohn, S.; Danezis, G. SOK: Consensus in the age of blockchains. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies, Zurich, Switzerland, 21–23 October 2019; pp. 183–198. [Google Scholar] [CrossRef]
- Sukhwani, H.; Pai, S.; Eugster, P.T.; Garg, V.K. Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network. In Proceedings of the 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), Hong Kong, 26–29 September 2017; IEEE: New York, NY, USA, 2017; pp. 253–260. [Google Scholar] [CrossRef]
- Narayanan, A.; Bonneau, J.; Felten, E.; Miller, A.; Goldfeder, S. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction; Princeton University Press: Princeton, NJ, USA, 2016; Available online: https://press.princeton.edu/books/hardcover/9780691171692/bitcoin-and-cryptocurrency-technologies (accessed on 5 April 2025).
- Zhang, J.; Yuan, L.; Xu, S. A Lightweight Blockchain-Based Access Control Scheme for Integrated Edge Computing in the Internet of Things. arXiv 2021, arXiv:2111.06544. [Google Scholar] [CrossRef]
| Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).