Skip to main content
Erschienen in:

01.04.2025

AccessChain: A scalable and privacy-preserving access control scheme for blockchain-based IoT

verfasst von: Guirong Piao, Jianming Zhu

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 2/2025

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Der Artikel stellt AccessChain vor, ein neuartiges Zugangskontrollsystem für Blockchain-basierte IoT-Umgebungen. Sie adressiert die Sicherheitsherausforderungen, die das rasche Wachstum von IoT-Geräten mit sich bringt, indem sie Blockchain-Technologie und Edge Computing nutzt. Das System gewährleistet die Vertraulichkeit und Privatsphäre der Daten und verringert zugleich die Rechen- und Speicherlast der Endgeräte. AccessChain verwendet eine datenschutzerhaltende attributbasierte Verschlüsselung (PP-ABE), um Attribute und Zugriffsrichtlinien zu verbergen, und nutzt intelligente Verträge für transparente und überprüfbare Zugangskontrollen. Das System wird durch das InterPlanetary File System (IPFS) für effiziente Datenspeicherung und -abfrage weiter verbessert. Der Artikel bietet einen detaillierten Überblick über das Systemmodell, die Designziele und die theoretische Analyse und hebt die Korrektheit, Vertraulichkeit und Privatsphäre des Systems hervor. Die Leistungsanalyse zeigt die Effizienz und Praktikabilität von AccessChain in realen IoT-Anwendungen. Die Schlussfolgerung betont das Potenzial des Programms als sichere, effiziente und praktische Lösung für die IoT-Zugangskontrolle.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dai H, Zheng Z, Zhang Y (2019) Blockchain for internet of things: a survey. IEEE Internet Things J 6(5):8076–8094CrossRef Dai H, Zheng Z, Zhang Y (2019) Blockchain for internet of things: a survey. IEEE Internet Things J 6(5):8076–8094CrossRef
2.
Zurück zum Zitat Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot. J Netw Comput Appl 149:102481CrossRef Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot. J Netw Comput Appl 149:102481CrossRef
3.
Zurück zum Zitat Yang R, Yu FR, Si P, Yang Z, Zhang Y (2019) Integrated blockchain and edge computing systems: a survey, some research issues and challenges. IEEE Commun Surv Tutorials 21(2):1508–1532CrossRef Yang R, Yu FR, Si P, Yang Z, Zhang Y (2019) Integrated blockchain and edge computing systems: a survey, some research issues and challenges. IEEE Commun Surv Tutorials 21(2):1508–1532CrossRef
4.
Zurück zum Zitat Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B (2020) A survey on access control in the age of internet of things. IEEE Internet Things J 7(6):4682–4696CrossRef Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B (2020) A survey on access control in the age of internet of things. IEEE Internet Things J 7(6):4682–4696CrossRef
5.
Zurück zum Zitat Ding Y, Sato H (2023) Bloccess: enabling fine-grained access control based on blockchain. J Netw Syst Manage 31(1):6CrossRef Ding Y, Sato H (2023) Bloccess: enabling fine-grained access control based on blockchain. J Netw Syst Manage 31(1):6CrossRef
6.
Zurück zum Zitat Hu VC, Ferraiolo D, Kuhn R, Friedman AR, Lang AJ, Cogdell MM, Schnitzer A, Sandlin K, Miller R, Scarfone K et al (2013) Guide to attribute based access control (abac) definition and considerations (draft). NIST Spec Publ 800(162):1–54 Hu VC, Ferraiolo D, Kuhn R, Friedman AR, Lang AJ, Cogdell MM, Schnitzer A, Sandlin K, Miller R, Scarfone K et al (2013) Guide to attribute based access control (abac) definition and considerations (draft). NIST Spec Publ 800(162):1–54
7.
Zurück zum Zitat Servos D, Osborn SL (2017) Current research and open problems in attribute-based access control. ACM Comput Surv (CSUR) 49(4):1–45CrossRef Servos D, Osborn SL (2017) Current research and open problems in attribute-based access control. ACM Comput Surv (CSUR) 49(4):1–45CrossRef
8.
Zurück zum Zitat Sun J, Xiong H, Liu X, Zhang Y, Nie X, Deng RH (2020) Lightweight and privacy-aware fine-grained access control for iot-oriented smart health. IEEE Internet Things J 7(7):6566–6575CrossRef Sun J, Xiong H, Liu X, Zhang Y, Nie X, Deng RH (2020) Lightweight and privacy-aware fine-grained access control for iot-oriented smart health. IEEE Internet Things J 7(7):6566–6575CrossRef
9.
Zurück zum Zitat Fan K, Xu H, Gao L, Li H, Yang Y (2019) Efficient and privacy preserving access control scheme for fog-enabled iot. Futur Gener Comput Syst 99:134–142CrossRef Fan K, Xu H, Gao L, Li H, Yang Y (2019) Efficient and privacy preserving access control scheme for fog-enabled iot. Futur Gener Comput Syst 99:134–142CrossRef
10.
Zurück zum Zitat Xiong S, Ni Q, Wang L, Wang Q (2020) Sem-acsit: secure and efficient multiauthority access control for iot cloud storage. IEEE Internet Things J 7(4):2914–2927CrossRef Xiong S, Ni Q, Wang L, Wang Q (2020) Sem-acsit: secure and efficient multiauthority access control for iot cloud storage. IEEE Internet Things J 7(4):2914–2927CrossRef
11.
Zurück zum Zitat Ma J, Li T, Cui J, Ying Z, Cheng J (2021) Attribute-based secure announcement sharing among vehicles using blockchain. IEEE Internet Things J 8(13):10873–10883CrossRef Ma J, Li T, Cui J, Ying Z, Cheng J (2021) Attribute-based secure announcement sharing among vehicles using blockchain. IEEE Internet Things J 8(13):10873–10883CrossRef
12.
Zurück zum Zitat Xu R, Chen Y, Blasch E, Chen G (2018) Blendcac: a blockchain-enabled decentralized capability-based access control for IoTs. Paper presented at the 2018 IEEE international conference on iThings and IEEE CreenCom and IEEE CPSCom and IEEE SmartData, 1027–1034 Xu R, Chen Y, Blasch E, Chen G (2018) Blendcac: a blockchain-enabled decentralized capability-based access control for IoTs. Paper presented at the 2018 IEEE international conference on iThings and IEEE CreenCom and IEEE CPSCom and IEEE SmartData, 1027–1034
13.
Zurück zum Zitat Zhang Y, Yutaka M, Sasabe M, Kasahara S (2020) Attribute-based access control for smart cities: a smart-contract-driven framework. IEEE Internet Things J 8(8):6372–6384CrossRef Zhang Y, Yutaka M, Sasabe M, Kasahara S (2020) Attribute-based access control for smart cities: a smart-contract-driven framework. IEEE Internet Things J 8(8):6372–6384CrossRef
14.
Zurück zum Zitat Islam MA, Madria S (2019) A permissioned blockchain based access control system for IOT. Paper presented at the 2019 IEEE international conference on blockchain, 469–476 Islam MA, Madria S (2019) A permissioned blockchain based access control system for IOT. Paper presented at the 2019 IEEE international conference on blockchain, 469–476
15.
Zurück zum Zitat Lao L, Li Z, Hou S, Xiao B, Guo S, Yang Y (2020) A survey of iot applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Comput Surv (CSUR) 53(1):1–32CrossRef Lao L, Li Z, Hou S, Xiao B, Guo S, Yang Y (2020) A survey of iot applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Comput Surv (CSUR) 53(1):1–32CrossRef
16.
Zurück zum Zitat Kapadia A, Tsang PP, Smith SW (2007) Attribute-Based Publishing with Hidden Credentials and Hidden Policies. Pap presented NDSS 179–192:2007 Kapadia A, Tsang PP, Smith SW (2007) Attribute-Based Publishing with Hidden Credentials and Hidden Policies. Pap presented NDSS 179–192:2007
17.
Zurück zum Zitat Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145CrossRef Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145CrossRef
18.
Zurück zum Zitat Gao S, Piao G, Zhu J, Ma X, Ma J (2020) Trustaccess: a trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain. IEEE Trans Veh Technol 69(6):5784–5798 Gao S, Piao G, Zhu J, Ma X, Ma J (2020) Trustaccess: a trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain. IEEE Trans Veh Technol 69(6):5784–5798
19.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. Paper presented at the 2007 IEEE symposium on security and privacy (SP’07), 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. Paper presented at the 2007 IEEE symposium on security and privacy (SP’07), 321–334
21.
Zurück zum Zitat Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart iot-based healthcare big data storage and self-adaptive access control system. Inf Sci 479:567–592CrossRef Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart iot-based healthcare big data storage and self-adaptive access control system. Inf Sci 479:567–592CrossRef
22.
Zurück zum Zitat Aghili SF, Mala H, Shojafar M, Peris-Lopez P (2019) Laco: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in iot. Futur Gener Comput Syst 96:410–424CrossRef Aghili SF, Mala H, Shojafar M, Peris-Lopez P (2019) Laco: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in iot. Futur Gener Comput Syst 96:410–424CrossRef
23.
Zurück zum Zitat Malani S, Srinivas J, Das AK, Srinathan K, Jo M (2019) Certificate-based anonymous device access control scheme for iot environment. IEEE Internet Things J 6(6):9762–9773CrossRef Malani S, Srinivas J, Das AK, Srinathan K, Jo M (2019) Certificate-based anonymous device access control scheme for iot environment. IEEE Internet Things J 6(6):9762–9773CrossRef
24.
Zurück zum Zitat Mandal S, Bera B, Sutrala AK, Das AK, Choo K-KR, Park Y (2020) Certificateless-signcryption-based three-factor user access control scheme for iot environment. IEEE Internet Things J 7(4):3184–3197CrossRef Mandal S, Bera B, Sutrala AK, Das AK, Choo K-KR, Park Y (2020) Certificateless-signcryption-based three-factor user access control scheme for iot environment. IEEE Internet Things J 7(4):3184–3197CrossRef
25.
Zurück zum Zitat Riad K, Huang T, Ke L (2020) A dynamic and hierarchical access control for iot in multi-authority cloud storage. J Netw Comput Appl 160:102633CrossRef Riad K, Huang T, Ke L (2020) A dynamic and hierarchical access control for iot in multi-authority cloud storage. J Netw Comput Appl 160:102633CrossRef
26.
Zurück zum Zitat Amoon M, Altameem T, Altameem A (2020) Rrac: role based reputed access control method for mitigating malicious impact in intelligent iot platforms. Comput Commun 151:238–246CrossRef Amoon M, Altameem T, Altameem A (2020) Rrac: role based reputed access control method for mitigating malicious impact in intelligent iot platforms. Comput Commun 151:238–246CrossRef
27.
Zurück zum Zitat Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594–1605CrossRef Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594–1605CrossRef
28.
Zurück zum Zitat Zaidi T, Usman M, Aftab MU, Aljuaid H, Ghadi YY (2023) Fabrication of flexible role-based access control based on blockchain for internet of things use cases. IEEE Access. 11:106315–106333CrossRef Zaidi T, Usman M, Aftab MU, Aljuaid H, Ghadi YY (2023) Fabrication of flexible role-based access control based on blockchain for internet of things use cases. IEEE Access. 11:106315–106333CrossRef
29.
Zurück zum Zitat Bera B, Chattaraj D, Das AK (2020) Designing secure blockchain-based access control scheme in iot-enabled internet of drones deployment. Comput Commun 153:229–249CrossRef Bera B, Chattaraj D, Das AK (2020) Designing secure blockchain-based access control scheme in iot-enabled internet of drones deployment. Comput Commun 153:229–249CrossRef
30.
Zurück zum Zitat Qi S, Yang X, Yu J, Qi Y (2023) Blockchain-aware rollbackable data access control for iot-enabled digital twin. IEEE J Sel Areas Commun 41(11):3517–3532CrossRef Qi S, Yang X, Yu J, Qi Y (2023) Blockchain-aware rollbackable data access control for iot-enabled digital twin. IEEE J Sel Areas Commun 41(11):3517–3532CrossRef
31.
Zurück zum Zitat Yu G, Zha X, Wang X, Ni W, Yu K, Yu P, Zhang JA, Liu RP, Guo YJ (2020) Enabling attribute revocation for fine-grained access control in blockchain-iot systems. IEEE Trans Eng Manage 67(4):1213–1230CrossRef Yu G, Zha X, Wang X, Ni W, Yu K, Yu P, Zhang JA, Liu RP, Guo YJ (2020) Enabling attribute revocation for fine-grained access control in blockchain-iot systems. IEEE Trans Eng Manage 67(4):1213–1230CrossRef
32.
Zurück zum Zitat Bera B, Saha S, Das AK, Vasilakos AV (2020) Designing blockchain-based access control protocol in iot-enabled smart-grid system. IEEE Internet Things J 8(7):5744–5761CrossRef Bera B, Saha S, Das AK, Vasilakos AV (2020) Designing blockchain-based access control protocol in iot-enabled smart-grid system. IEEE Internet Things J 8(7):5744–5761CrossRef
33.
Zurück zum Zitat Zahoor A, Mahmood K, Shamshad S, Saleem MA, Ayub MF, Conti M, Das AK (2023) An access control scheme in iot-enabled smart-grid systems using blockchain and puf. Internet Things 22:100708–100721 Zahoor A, Mahmood K, Shamshad S, Saleem MA, Ayub MF, Conti M, Das AK (2023) An access control scheme in iot-enabled smart-grid systems using blockchain and puf. Internet Things 22:100708–100721
34.
Zurück zum Zitat Saha S, Sutrala AK, Das AK, Kumar N, Rodrigues JJ (2020) On the design of blockchain-based access control protocol for IoT-enabled healthcare applications. Paper presented at the 2020 IEEE ICC, 1–6 Saha S, Sutrala AK, Das AK, Kumar N, Rodrigues JJ (2020) On the design of blockchain-based access control protocol for IoT-enabled healthcare applications. Paper presented at the 2020 IEEE ICC, 1–6
35.
Zurück zum Zitat Li J, Li D, Zhang X (2023) A secure blockchain-assisted access control scheme for smart healthcare system in fog computing. IEEE Internet Things J 10(18):15980–15989CrossRef Li J, Li D, Zhang X (2023) A secure blockchain-assisted access control scheme for smart healthcare system in fog computing. IEEE Internet Things J 10(18):15980–15989CrossRef
36.
Zurück zum Zitat Delmolino K, Arnett M, Kosba A, Miller A, Shi E (2016) Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. Pap presented Int Conf Financ Cryptography Data Secur Berlin Heidelberg 79–94:2016 Delmolino K, Arnett M, Kosba A, Miller A, Shi E (2016) Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. Pap presented Int Conf Financ Cryptography Data Secur Berlin Heidelberg 79–94:2016
37.
Zurück zum Zitat ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472 ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472
38.
Zurück zum Zitat Phan DH, Pointcheval D (2004) About the security of ciphers (semantic security and pseudo-random permutations). Pap presented Int Works Select Areas Cryptography 182–197:2004 Phan DH, Pointcheval D (2004) About the security of ciphers (semantic security and pseudo-random permutations). Pap presented Int Works Select Areas Cryptography 182–197:2004
Metadaten
Titel
AccessChain: A scalable and privacy-preserving access control scheme for blockchain-based IoT
verfasst von
Guirong Piao
Jianming Zhu
Publikationsdatum
01.04.2025
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 2/2025
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-025-01906-z