International Journal of Engineering

International Journal of Engineering

Enhancing Smart Contract Access Control via Digital Identity Management and Machine Learning

Document Type : Original Article

Authors
Department of Computer Science, University of Tabriz, Tabriz, Iran
Abstract
In the field of blockchain technology, ensuring secure and efficient access control for smart contracts remains a critical challenge. Traditional methods are often complex and resource-intensive, potentially hindering widespread adoption. This study proposes a novel machine learning-based approach to enhance access control mechanisms. Specifically, we classify users as either benign or potentially malicious based on transaction behavior and interaction patterns. A Support Vector Machine (SVM) classifier, combined with a Genetic Algorithm (GA) for dimensionality reduction, is applied to a dataset containing 50,000 transaction records from 1,000 blockchain addresses. The model achieved an accuracy of 94% on the test set and effectively distinguished users based on server interaction frequency and connection duration. Through visual analysis and comprehensive evaluation, we demonstrate that the proposed method improves both anomaly detection and operational efficiency. This approach has the potential to bolster trust and facilitate broader adoption of blockchain-based applications.

Graphical Abstract

Enhancing Smart Contract Access Control via Digital Identity Management and Machine Learning
Keywords

Subjects


1.       Nakonechnyi V, Toliupa S, Saiko V, Lutsenko V, Ghno GSN, Hussain AK, editors. Blockchain implementation in the protection system of banking system during online banking operations. 2024 35th Conference of Open Innovations Association (FRUCT); 2024: IEEE. 10.23919/FRUCT61870.2024.10516404
2.       Khedmati M, Seifi F, Azizi M. Time series forecasting of bitcoin price based on autoregressive integrated moving average and machine learning approaches. International Journal of Engineering Transactions A: Basics. 2020;33(7):1293-303. 10.5829/ije.2020.33.07a.16
3.       Alamsyah A, Muhammad IF. Unraveling the crypto market: A journey into decentralized finance transaction network. Digital Business. 2024;4(1):100074. 10.1016/j.digbus.2024.100074
4.       Zheng Z, Xie S, Dai H-N, Chen X, Wang H. Blockchain challenges and opportunities: A survey. International journal of web and grid services. 2018;14(4):352-75. 10.1504/IJWGS.2018.095647
5.       Dey A, Nandi S, Sarkar M, editors. Security measures in IoT based 5G networks. 2018 3rd International Conference on Inventive Computation Technologies (ICICT); 2018: IEEE. 10.1109/ICICT43934.2018.9034365
6.       Anusha R, Saravanan R. Revolutionizing signature scheme: the enhanced Edward Elgamal extreme performance accumulate signature approach for IoT and blockchain applications. Soft Computing. 2025;29(3):1473-96. 10.1007/s00500-025-10426-0
7.       Eskandari S, Clark J, Barrera D, Stobert E. A first look at the usability of bitcoin key management. arXiv preprint arXiv:180204351. 2018. 10.48550/arXiv.1802.04351
8.       Hamidi H, Sayah A. Combining machine learning algorithms to detect phishing urls: a stacking approach. International Journal of Engineering Transactions B: Applications. 2025;38(8):1939-52. 10.5829/ije.2025.38.08b.18
9.       Atzei N, Bartoletti M, Cimoli T, editors. A survey of attacks on ethereum smart contracts (sok). International conference on principles of security and trust; 2017: Springer. 10.1007/978-3-662-54455-6_8
10.    Bamert T, Decker C, Elsen L, Wattenhofer R, Welten S, editors. Have a snack, pay with Bitcoins. IEEE P2P 2013 Proceedings; 2013: IEEE. 10.1109/P2P.2013.6688717
11.    Kersic V, Vidovic U, Vrecko A, Domajnko M, Turkanovic M. Orchestrating digital wallets for on-and off-chain decentralized identity management. IEEE access. 2023;11:78135-51. 10.1109/ACCESS.2023.3299047
12.    Ahmed MR, Islam AM, Shatabda S, Islam S. Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey. Ieee Access. 2022;10:113436-81. 10.1109/ACCESS.2022.3215286
13.    Babel M, Willburger L, Lautenschlager J, Völter F, Guggenberger T, Körner M-F, et al. Self-sovereign identity and digital wallets. Electronic Markets. 2025;35(1):1-14.  https://doi.org/10.1007/s12525-025-00772-0
14.    Albshaier L, Almarri S, Hafizur Rahman M. A review of blockchain’s role in E-Commerce transactions: Open challenges, and future research directions. Computers. 2024;13(1):27. 10.3390/computers13010027
15.    Krishnan LP, Vakilinia I, Reddivari S, Ahuja S. Scams and solutions in cryptocurrencies—A survey analyzing existing machine learning models. Information. 2023;14(3):171. 10.3390/electronics12061422
16.    Chen T, Li X, Luo X, Zhang X, editors. Under-optimized smart contracts devour your money. 2017 IEEE 24th international conference on software analysis, evolution and reengineering (SANER); 2017: IEEE. 10.1109/SANER.2017.7884650
17.    Ntousis O, Makris E, Tsanakas P, Pavlatos C. A dual-stage processing architecture for unmanned aerial vehicle object detection and tracking using lightweight onboard and ground server computations. Technologies. 2025;13(1):35.  https://doi.org/10.3390/technologies13010035
18.    Podgorelec B, Turkanović M, Karakatič S. A machine learning-based method for automated blockchain transaction signing including personalized anomaly detection. Sensors. 2019;20(1):147. 10.3390/s19245433
19.    Ou W, Huang S, Zheng J, Zhang Q, Zeng G, Han W. An overview on cross-chain: Mechanism, platforms, challenges and advances. Computer Networks. 2022;218:109378. 10.1016/j.comnet.2022.109378
20.    Tschorsch F, Scheuermann B. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials. 2016;18(3):2084-123. 10.1109/COMST.2016.2535718
21.    Dominguez Anguiano T, Parte L. The state of art, opportunities and challenges of blockchain in the insurance industry: a systematic literature review. Management Review Quarterly. 2024;74(2):1097-118.  https://doi.org/10.1007/s11301-023-00328-6
22.    Decker C, Eidenbenz R, Wattenhofer R, editors. Exploring and improving BitTorrent topologies. IEEE P2P 2013 Proceedings; 2013: IEEE.
23.    Chou C-C, Hwang N-CR, Schneider GP, Wang T, Li C-W, Wei W. Using smart contracts to establish decentralized accounting contracts: An example of revenue recognition. Journal of Information Systems. 2021;35(3):17-52.  https://doi.org/10.2308/ISYS-18-028
24.    Buterin V. A next-generation smart contract and decentralized application platform. white paper. 2014;3(37):2-1.  https://ethereum.org/en/whitepaper/
25.    Boneh D, Franklin M, editors. Identity-based encryption from the Weil pairing. Annual international cryptology conference; 2001: Springer.
26.    Béres F, Seres IA, Benczúr AA, Quintyne-Collins M, editors. Blockchain is watching you: Profiling and deanonymizing ethereum users. 2021 IEEE international conference on decentralized applications and infrastructures (DAPPS); 2021: IEEE.
27.    Lin S-Y, Zhang L, Li J, Ji L-l, Sun Y. A survey of application research based on blockchain smart contract. Wireless Networks. 2022;28(2):635-90.  https://doi.org/10.1007/s11276-021-02874-x
28.    Szabo N. Formalizing and securing relationships on public networks. First monday. 1997.  https://doi.org/10.5210/fm.v2i9.548
29.    Bodziony N, Jemioło P, Kluza K, Ogiela MR. Blockchain-based address alias system. Journal of Theoretical and Applied Electronic Commerce Research. 2021;16(5):1280-96.  https://doi.org/10.3390/jtaer16050072
30.    Akbarfam AJ, Barazandeh S, Gupta D, Maleki H. Deep learning meets blockchain for automated and secure access control. arXiv preprint arXiv:231106236. 2023.  https://arxiv.org/abs/2311.06236
31.    Mounnan O, Boubchir L, Manad O, El Mouatasim A, Daachi B. DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology. Computer Standards & Interfaces. 2025;92:103929.  https://doi.org/10.1016/j.csi.2024.103929
32.    Jiang F, Chao K, Xiao J, Liu Q, Gu K, Wu J, et al. Enhancing smart-contract security through machine learning: A survey of approaches and techniques. Electronics. 2023;12(9):2046.  https://doi.org/10.3390/electronics12092046
33.    Guo Z. Blockchain-enhanced smart contracts for formal verification of IoT access control mechanisms. Alexandria Engineering Journal. 2025;118:315-24.  https://doi.org/10.1016/j.aej.2022.03.064
34.    Ghaly M, Elbeltagi E, Elsmadony A, Tantawy MA. Integration of Blockchain-Enabled smart contracts in construction: SWOT framework and social network analysis. Civil Engineering Journal. 2024;10(05):1662-97.  https://doi.org/10.28991/CEJ-2024-010-05-020
35.    Gaur R, Prakash S, Kumar S, Abhishek K, Msahli M, Wahid A. A machine-learning–blockchain-based authentication using smart contracts for an IoHT system. Sensors. 2022;22(23):9074.  https://doi.org/10.3390/s22239074
36.    Benaich R, Gahi Y, El Mendili S. Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework. Emerging Science Journal. 2025;9(1):161-87.  https://doi.org/10.28991/ESJ-2025-09-01-010
37.    Alizadeh M, Koohi, S., Vahidi, V. A decentralized access control framework for the personal health records based on blockchain and smart contract. Journal of Information Security and Applications. 2023;72:103375.  https://doi.org/10.1016/j.jisa.2022.103375
38.    Liao C-H, Guan X-Q, Cheng J-H, Yuan S-M. Blockchain-based identity management and access control framework for open banking ecosystem. Future Generation Computer Systems. 2022;135:450-66.  https://doi.org/10.1016/j.future.2022.05.015
39.    Criollo S, Guerrero-Arias A, Arif YM, Samala AD, Jaramillo-Alcázar Á, Luján-Mora S. Usability Evaluation of a Mobile Augmented Reality App for PC Hardware Training: A Comparative Study in Three Countries. 2025.  https://doi.org/10.28991/ESJ-2025-09-02-024
 
40.    Aliyev V. Ethereum fraud detection dataset. Kaggle Retrieved March. 2021;13:2022.  https://www.kaggle.com/datasets/vagifa/ethereum-frauddetection-dataset