Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 3/2022

25-03-2022

Blockchain-based access control for dynamic device management in microgrid

Authors: Kai Zhang, Jinhu Yu, Chao Lin, Jianting Ning

Published in: Peer-to-Peer Networking and Applications | Issue 3/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Microgrid is a self-sufficient grid system that covers one or more kinds of distributed energy, where a variety of terminal devices collect, transmit and store electricity data based on fog-based network infrastructure. Due to security and privacy concerns, efficient and secure access control over terminal devices in microgrid is the primary way to prevent unauthorized access and data breach. Therefore, a number of solutions of device management are proposed. However, they are usually prone to single point of failure, decision-centralized, over-manual intervened. To address the problem, we introduce a blockchain-based fast and dynamic access control (FDAC) system for device management in fog-assisted microgrid. In particular, we adopt an attribute-based access control formula to model a flexible, dynamic and fast fine-grained access control system. FDAC deploys four smart contracts that dynamically manages devices, which includes user authentication, subject/object attributes, access policy, decision-making and credit assessment of user behavior. In addition, FDAC employs a Cuckoo filter to speed up policy search in smart contracts and proposes new credit verification algorithm to improve credit rewards and punishments. To clarify practical performance, we build a private blockchain platform to simulate FDAC. Compared to classic traversal approaches for policy search, FDAC maintains higher accuracy and lower time delay.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani M (2017) Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wirel Commun 24(3):10–16CrossRef Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani M (2017) Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wirel Commun 24(3):10–16CrossRef
2.
go back to reference Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: Enablers, architecture, and business models. IEEE J Sel Areas Commun 34(3):510–527CrossRef Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: Enablers, architecture, and business models. IEEE J Sel Areas Commun 34(3):510–527CrossRef
3.
go back to reference D’Orazio CJ, Choo KKR, Yang LT (2016) Data exfiltration from internet of things devices: ios devices as case studies. IEEE Internet of Things J 4(2):524–535CrossRef D’Orazio CJ, Choo KKR, Yang LT (2016) Data exfiltration from internet of things devices: ios devices as case studies. IEEE Internet of Things J 4(2):524–535CrossRef
5.
6.
go back to reference Osborn S, Sandhu R, Munawer Q (2000) Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security (TISSEC) 3(2):85–106CrossRef Osborn S, Sandhu R, Munawer Q (2000) Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security (TISSEC) 3(2):85–106CrossRef
7.
go back to reference Sandhu R (1998) Role-based access control. vol 46, Elsevier, pp 237–248 Sandhu R (1998) Role-based access control. vol 46, Elsevier, pp 237–248
8.
go back to reference Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40–48CrossRef Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40–48CrossRef
9.
go back to reference Yavari A, Panah AS, Georgakopoulos D, Jayaraman PP, van Schyndel R (2017) Scalable role-based data disclosure control for the internet of things. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), IEEE, pp 2226–2233 Yavari A, Panah AS, Georgakopoulos D, Jayaraman PP, van Schyndel R (2017) Scalable role-based data disclosure control for the internet of things. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), IEEE, pp 2226–2233
10.
go back to reference Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things. Math Comput Model 58(5–6):1189–1205CrossRef Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things. Math Comput Model 58(5–6):1189–1205CrossRef
11.
go back to reference Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2013) Identity authentication and capability based access control (iacac) for the internet of things. J Cyber Sec Mobility 1(4):309–348 Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2013) Identity authentication and capability based access control (iacac) for the internet of things. J Cyber Sec Mobility 1(4):309–348
12.
go back to reference Hu VC, Ferraiolo D, Kuhn R, Friedman AR, Lang AJ, Cogdell MM, Schnitzer A, Sandlin K, Miller R, Scarfone K et al (2013) Guide to attribute based access control (abac) definition and considerations (draft). NIST Spec Publ 800(162):1–54 Hu VC, Ferraiolo D, Kuhn R, Friedman AR, Lang AJ, Cogdell MM, Schnitzer A, Sandlin K, Miller R, Scarfone K et al (2013) Guide to attribute based access control (abac) definition and considerations (draft). NIST Spec Publ 800(162):1–54
13.
go back to reference Ye N, Zhu Y, Wang Rc, Malekian R, Lin Qm (2014) An efficient authentication and access control scheme for perception layer of internet of things Ye N, Zhu Y, Wang Rc, Malekian R, Lin Qm (2014) An efficient authentication and access control scheme for perception layer of internet of things
14.
go back to reference Bhatt S, Patwa F, Sandhu R (2017) Access control model for aws internet of things. In: International Conference on Network and System Security, Springer, pp 721–736 Bhatt S, Patwa F, Sandhu R (2017) Access control model for aws internet of things. In: International Conference on Network and System Security, Springer, pp 721–736
15.
go back to reference Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for iot security and privacy: The case study of a smart home. In: 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops), IEEE, pp 618–623 Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for iot security and privacy: The case study of a smart home. In: 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops), IEEE, pp 618–623
16.
go back to reference Zyskind G, Nathan O et al (2015) Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops, IEEE, pp 180–184 Zyskind G, Nathan O et al (2015) Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops, IEEE, pp 180–184
17.
go back to reference Maesa DDF, Mori P, Ricci L (2017) Blockchain based access control. In: IFIP international conference on distributed applications and interoperable systems, Springer, pp 206–220 Maesa DDF, Mori P, Ricci L (2017) Blockchain based access control. In: IFIP international conference on distributed applications and interoperable systems, Springer, pp 206–220
18.
go back to reference Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594–1605CrossRef Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594–1605CrossRef
19.
go back to reference Sifah EB, Xia Q, Agyekum KOBO, Amofa S, Gao J, Chen R, Xia H, Gee JC, Du X, Guizani M (2018) Chain-based big data access control infrastructure. J Supercomput 74(10):4945–4964CrossRef Sifah EB, Xia Q, Agyekum KOBO, Amofa S, Gao J, Chen R, Xia H, Gee JC, Du X, Guizani M (2018) Chain-based big data access control infrastructure. J Supercomput 74(10):4945–4964CrossRef
20.
go back to reference Saini A, Zhu Q, Singh N, Xiang Y, Gao L, Zhang Y (2020) A smart-contract-based access control framework for cloud smart healthcare system. IEEE Internet Things J 8(7):5914–5925CrossRef Saini A, Zhu Q, Singh N, Xiang Y, Gao L, Zhang Y (2020) A smart-contract-based access control framework for cloud smart healthcare system. IEEE Internet Things J 8(7):5914–5925CrossRef
21.
go back to reference Zhang Y, Yutaka M, Sasabe M, Kasahara S (2020) Attribute-based access control for smart cities: A smart-contract-driven framework. IEEE Internet Things J 8(8):6372–6384CrossRef Zhang Y, Yutaka M, Sasabe M, Kasahara S (2020) Attribute-based access control for smart cities: A smart-contract-driven framework. IEEE Internet Things J 8(8):6372–6384CrossRef
22.
go back to reference Qashlan A, Nanda P, He X (2020) Security and privacy implementation in smart home: Attributes based access control and smart contracts. 2020 IEEE 19th International Conference on Trust. Security and Privacy in Computing and Communications (TrustCom), IEEE, pp 951–958 Qashlan A, Nanda P, He X (2020) Security and privacy implementation in smart home: Attributes based access control and smart contracts. 2020 IEEE 19th International Conference on Trust. Security and Privacy in Computing and Communications (TrustCom), IEEE, pp 951–958
23.
go back to reference Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) Fairaccess: a new blockchain-based access control framework for the internet of things. Sec Com Netw 9(18):5943–5964CrossRef Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) Fairaccess: a new blockchain-based access control framework for the internet of things. Sec Com Netw 9(18):5943–5964CrossRef
24.
go back to reference Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: Using blockchain for medical data access and permission management. In: 2016 2nd international conference on open and big data (OBD), IEEE, pp 25–30 Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: Using blockchain for medical data access and permission management. In: 2016 2nd international conference on open and big data (OBD), IEEE, pp 25–30
25.
go back to reference Pinno OJA, Gregio ARA, De Bona LC (2017) Controlchain: Blockchain as a central enabler for access control authorizations in the iot. In: GLOBECOM 2017-2017 IEEE Global Communications Conference, IEEE, pp 1–6 Pinno OJA, Gregio ARA, De Bona LC (2017) Controlchain: Blockchain as a central enabler for access control authorizations in the iot. In: GLOBECOM 2017-2017 IEEE Global Communications Conference, IEEE, pp 1–6
26.
go back to reference Ferdous MS, Margheri A, Paci F, Yang M, Sassone V (2017) Decentralised runtime monitoring for access control systems in cloud federations. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), IEEE, pp 2632–2633 Ferdous MS, Margheri A, Paci F, Yang M, Sassone V (2017) Decentralised runtime monitoring for access control systems in cloud federations. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), IEEE, pp 2632–2633
27.
go back to reference Novo O (2018) Blockchain meets iot: An architecture for scalable access management in iot. IEEE Internet Things J 5(2):1184–1195CrossRef Novo O (2018) Blockchain meets iot: An architecture for scalable access management in iot. IEEE Internet Things J 5(2):1184–1195CrossRef
28.
go back to reference Xu R, Chen Y, Blasch E, Chen G (2018) Blendcac: A smart contract enabled decentralized capability-based access control mechanism for the iot. Computers 7(3):39CrossRef Xu R, Chen Y, Blasch E, Chen G (2018) Blendcac: A smart contract enabled decentralized capability-based access control mechanism for the iot. Computers 7(3):39CrossRef
29.
go back to reference Song L, Li M, Zhu Z, Yuan P, He Y (2020) Attribute-based access control using smart contracts for the internet of things. Proc Comp Sci 174:231–242CrossRef Song L, Li M, Zhu Z, Yuan P, He Y (2020) Attribute-based access control using smart contracts for the internet of things. Proc Comp Sci 174:231–242CrossRef
30.
go back to reference Zhang Y, Li B, Liu B, Wu J, Wang Y, Yang X (2020) An attribute-based collaborative access control scheme using blockchain for iot devices. Electronics 9(2):285CrossRef Zhang Y, Li B, Liu B, Wu J, Wang Y, Yang X (2020) An attribute-based collaborative access control scheme using blockchain for iot devices. Electronics 9(2):285CrossRef
31.
go back to reference Rouhani S, Belchior R, Cruz RS, Deters R (2021) Distributed attribute-based access control system using permissioned blockchain. World Wide Web 24(5):1617–1644CrossRef Rouhani S, Belchior R, Cruz RS, Deters R (2021) Distributed attribute-based access control system using permissioned blockchain. World Wide Web 24(5):1617–1644CrossRef
32.
go back to reference Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review p 21260 Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review p 21260
34.
go back to reference Yang XS, Deb S (2010) Engineering optimisation by cuckoo search. Int J Math Model Numer Optim 1(4):330–343 Yang XS, Deb S (2010) Engineering optimisation by cuckoo search. Int J Math Model Numer Optim 1(4):330–343
35.
go back to reference Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Cryptographers track at the RSA conference, Springer, pp 376–392 Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Cryptographers track at the RSA conference, Springer, pp 376–392
39.
go back to reference Fan B, Andersen DG, Kaminsky M, Mitzenmacher MD (2014) Cuckoo filter: Practically better than bloom. In: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, pp 75–88 Fan B, Andersen DG, Kaminsky M, Mitzenmacher MD (2014) Cuckoo filter: Practically better than bloom. In: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, pp 75–88
Metadata
Title
Blockchain-based access control for dynamic device management in microgrid
Authors
Kai Zhang
Jinhu Yu
Chao Lin
Jianting Ning
Publication date
25-03-2022
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 3/2022
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01316-5

Other articles of this Issue 3/2022

Peer-to-Peer Networking and Applications 3/2022 Go to the issue

Premium Partner