Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2021

12.06.2020

BacS: A blockchain-based access control scheme in distributed internet of things

verfasst von: Na Shi, Liang Tan, Ciaxia Yang, Chen He, Junli Xu, Yang Lu, Hao Xu

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Distributed Internet of Things (Distributed IoT) is a large-scale, heterogeneous, dynamic distributed architecture environment which is gradually formed based on Internet of Things (IoT) technology. In order to cope with the large number access requirements for IoT data brought by application expansion, the data of IoT devices are usually stored in the management server (DMS) of current domain, and adopt a centralized access control mechanism to user. This centrally approach can easily cause data to be tampered with and leaked. Moreover, registering different identities when user accesses different domains increases the difficulty to manage his identities. Therefore, this paper proposes a blockchain-based access control scheme called BacS for Distributed IoT. In BacS, firstly, we use account address of the node in blockchain as the identity to access DMS, redefine the access control permission of data of devices and store on blockchain. Then we design processes of authorization, authorization revocation, access control and audit in BacS. Finally, we use a lightweight symmetric encryption algorithm (SEA) to achieve privacy-preserving for Distributed IoT system. We build a credible experimental model on Ethereum private chain, results show that BacS is feasible and effective that it can achieve secure access in Distributed IoT environment while protecting privacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Catarinucci L, De Donno D, Mainetti L, et al. (2015) An IoT-aware architecture for smart healthcare systems[J]. IEEE Internet Things J 2(6):515–526CrossRef Catarinucci L, De Donno D, Mainetti L, et al. (2015) An IoT-aware architecture for smart healthcare systems[J]. IEEE Internet Things J 2(6):515–526CrossRef
3.
Zurück zum Zitat Xu Y, Ren J, Wang G, et al. (2019) A blockchain-based nonrepudiation network computing service scheme for industrial IoT[J]. IEEE Trans Ind Inform 15(6):3632–3641CrossRef Xu Y, Ren J, Wang G, et al. (2019) A blockchain-based nonrepudiation network computing service scheme for industrial IoT[J]. IEEE Trans Ind Inform 15(6):3632–3641CrossRef
4.
Zurück zum Zitat Liu Z, Tsuda T, Watanabe H, et al. (2019) Data driven cyber-physical system for landslide detection[J]. Mobile Netw Appl 24(3):991–1002CrossRef Liu Z, Tsuda T, Watanabe H, et al. (2019) Data driven cyber-physical system for landslide detection[J]. Mobile Netw Appl 24(3):991–1002CrossRef
5.
Zurück zum Zitat Qi X, Su Y, Yu K, et al. (2019) Design and performance evaluation of content-oriented communication system for iot network: a case study of named node networking for real-time video streaming system[J]. IEEE Access 7:88138–88149CrossRef Qi X, Su Y, Yu K, et al. (2019) Design and performance evaluation of content-oriented communication system for iot network: a case study of named node networking for real-time video streaming system[J]. IEEE Access 7:88138–88149CrossRef
6.
Zurück zum Zitat Yu K, Arifuzzaman M, Wen Z, et al. (2015) A key management scheme for secure communications of information centric advanced metering infrastructure in smart grid[J]. IEEE Trans Instrum Meas 64(8):2072–2085CrossRef Yu K, Arifuzzaman M, Wen Z, et al. (2015) A key management scheme for secure communications of information centric advanced metering infrastructure in smart grid[J]. IEEE Trans Instrum Meas 64(8):2072–2085CrossRef
7.
Zurück zum Zitat Xu Y, Wang G, Ren J, et al. (2019) An adaptive and configurable protection framework against android privilege escalation threats[J]. Future Gener Comput Syst 92:210–224CrossRef Xu Y, Wang G, Ren J, et al. (2019) An adaptive and configurable protection framework against android privilege escalation threats[J]. Future Gener Comput Syst 92:210–224CrossRef
8.
Zurück zum Zitat Ren Y, Li X, Liu H, et al. (2018) Research on trust management method of distributed internet of things based on Blockchain[J]. J Comput Res Dev 55(7):1462–1478 Ren Y, Li X, Liu H, et al. (2018) Research on trust management method of distributed internet of things based on Blockchain[J]. J Comput Res Dev 55(7):1462–1478
9.
Zurück zum Zitat Le Nguyen P, Ji Y, Liu Z, et al. (2017) Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing[J]. Comput Netw 129:232–250CrossRef Le Nguyen P, Ji Y, Liu Z, et al. (2017) Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing[J]. Comput Netw 129:232–250CrossRef
10.
Zurück zum Zitat Hussein D, Bertin E, Frey V (2017) A community-driven access control approach in distributed IoT environments[J]. IEEE Commun Mag 55(3):146–153CrossRef Hussein D, Bertin E, Frey V (2017) A community-driven access control approach in distributed IoT environments[J]. IEEE Commun Mag 55(3):146–153CrossRef
11.
Zurück zum Zitat Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things[J]. Comput Netw 57(10):2266–2279CrossRef Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things[J]. Comput Netw 57(10):2266–2279CrossRef
14.
Zurück zum Zitat Yong Yuan, Feiyue Wang (2016). Thdevelopment status and prospect of blockchain technology[J]. J of Automatica Sinica Yong Yuan, Feiyue Wang (2016). Thdevelopment status and prospect of blockchain technology[J]. J of Automatica Sinica
15.
Zurück zum Zitat Ferrag MA, Derdour M, Mukherjee M, et al. (2018) Blockchain technologies for the internet of things: Research issues and challenges[J]. IEEE Internet Things J 6(2):2188–2204CrossRef Ferrag MA, Derdour M, Mukherjee M, et al. (2018) Blockchain technologies for the internet of things: Research issues and challenges[J]. IEEE Internet Things J 6(2):2188–2204CrossRef
16.
Zurück zum Zitat Nawir M, Amir A, Yaakob N et al (2016) Internet of Things (IoT): Taxonomy of security attacks[C]. In: 2016 3rd International Conference on Electronic Design (ICED). IEEE, pp 321–326 Nawir M, Amir A, Yaakob N et al (2016) Internet of Things (IoT): Taxonomy of security attacks[C]. In: 2016 3rd International Conference on Electronic Design (ICED). IEEE, pp 321–326
17.
Zurück zum Zitat Chen R, Bao F, Guo J (2015) Trust-based service management for social internet of things systems[J]. IEEE Trans Dependable Secure Comput 13(6):684–696CrossRef Chen R, Bao F, Guo J (2015) Trust-based service management for social internet of things systems[J]. IEEE Trans Dependable Secure Comput 13(6):684–696CrossRef
18.
Zurück zum Zitat Sandhu RS, Samarati P (1994) Access control: principle and practice[J]. IEEE Commun Mag 32(9):40–48CrossRef Sandhu RS, Samarati P (1994) Access control: principle and practice[J]. IEEE Commun Mag 32(9):40–48CrossRef
19.
Zurück zum Zitat Xu Y, Ren J, Zhang Y, et al. (2019) Blockchain empowered arbitrable data auditing scheme for network storage as a Service[J]. IEEE Trans Serv Comput Xu Y, Ren J, Zhang Y, et al. (2019) Blockchain empowered arbitrable data auditing scheme for network storage as a Service[J]. IEEE Trans Serv Comput
20.
Zurück zum Zitat Liu K (2001). Formal Modeling and Implementation of Secure Linux Operating System and Secure Web System[D]. Beijing: Institute of Software, Chinese Academy of Sciences Liu K (2001). Formal Modeling and Implementation of Secure Linux Operating System and Secure Web System[D]. Beijing: Institute of Software, Chinese Academy of Sciences
21.
Zurück zum Zitat Yan X, Cui B, Xu Y, et al. (2019) A method of information protection for collaborative deep learning under GAN model Attack[J]. IEEE/ACM Trans Comput Biol Bioinform Yan X, Cui B, Xu Y, et al. (2019) A method of information protection for collaborative deep learning under GAN model Attack[J]. IEEE/ACM Trans Comput Biol Bioinform
22.
Zurück zum Zitat Wang X, Liu Z, Gao Y, et al. (2019) A near-optimal protocol for the grouping problem in RFID systems[J]. IEEE Trans Mobile Comput Wang X, Liu Z, Gao Y, et al. (2019) A near-optimal protocol for the grouping problem in RFID systems[J]. IEEE Trans Mobile Comput
23.
Zurück zum Zitat Ferraiolo DF, Sandhu R, Gavrila S, et al. (2001) Proposed NIST standard for role-based access control[J]. ACM Trans Inform Syst Secur (TISSEC) 4(3):224–274CrossRef Ferraiolo DF, Sandhu R, Gavrila S, et al. (2001) Proposed NIST standard for role-based access control[J]. ACM Trans Inform Syst Secur (TISSEC) 4(3):224–274CrossRef
24.
Zurück zum Zitat Hu VC, Kuhn DR, Ferraiolo DF, et al. (2015) Attribute-based access control[J]. Computer 48(2):85–88CrossRef Hu VC, Kuhn DR, Ferraiolo DF, et al. (2015) Attribute-based access control[J]. Computer 48(2):85–88CrossRef
25.
Zurück zum Zitat Guoping Z, Wentao G (2012) The research of access control in the application of VANET based on UCON[j]. Procedia Eng 29:4091–4095CrossRef Guoping Z, Wentao G (2012) The research of access control in the application of VANET based on UCON[j]. Procedia Eng 29:4091–4095CrossRef
26.
Zurück zum Zitat Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things[J]. Math Comput Model 58(5-6):1189–1205CrossRef Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things[J]. Math Comput Model 58(5-6):1189–1205CrossRef
27.
Zurück zum Zitat Mahalle PN, Anggorojati B, Prasad NR, et al. (2013) Identity authentication and capability based access control (iacac) for the internet of things[J]. J Cyber Secur Mobil 1(4):309–348 Mahalle PN, Anggorojati B, Prasad NR, et al. (2013) Identity authentication and capability based access control (iacac) for the internet of things[J]. J Cyber Secur Mobil 1(4):309–348
28.
Zurück zum Zitat Anggorojati B, Mahalle PN, Prasad NR (2012) Capability-based access control delegation model on the federated IoT network[C]. In: The 15th International Symposium on Wireless Personal Multimedia Communications. IEEE, pp 604–608 Anggorojati B, Mahalle PN, Prasad NR (2012) Capability-based access control delegation model on the federated IoT network[C]. In: The 15th International Symposium on Wireless Personal Multimedia Communications. IEEE, pp 604–608
29.
Zurück zum Zitat Yu K, Eum S, Kurita T, et al. (2019) Information-centric networking: research and standardization status[J]. IEEE Access 7:126164–126176CrossRef Yu K, Eum S, Kurita T, et al. (2019) Information-centric networking: research and standardization status[J]. IEEE Access 7:126164–126176CrossRef
31.
Zurück zum Zitat Yu S, Wang C, Ren K, et al. (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing[C]. In: 2010 Proceedings IEEE INFOCOM. IEEE, pp 1–9 Yu S, Wang C, Ren K, et al. (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing[C]. In: 2010 Proceedings IEEE INFOCOM. IEEE, pp 1–9
32.
Zurück zum Zitat Xue K, Xue Y, Hong J, et al. (2017) RAAC: Robust And auditable access control with multiple attribute authorities for public cloud storage[J]. IEEE Trans Inf Forensics Secur 12(4):953–967CrossRef Xue K, Xue Y, Hong J, et al. (2017) RAAC: Robust And auditable access control with multiple attribute authorities for public cloud storage[J]. IEEE Trans Inf Forensics Secur 12(4):953–967CrossRef
33.
Zurück zum Zitat Zhang P, Chen Z, Liu JK, et al. (2018) An efficient access control scheme with outsourcing capability and attribute update for fog computing[J]. Future Gener Comput Syst 78:753–762CrossRef Zhang P, Chen Z, Liu JK, et al. (2018) An efficient access control scheme with outsourcing capability and attribute update for fog computing[J]. Future Gener Comput Syst 78:753–762CrossRef
34.
Zurück zum Zitat Huang Q, Yang Y, Wang L (2017) Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things[J]. IEEE Access 5:12941–12950CrossRef Huang Q, Yang Y, Wang L (2017) Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things[J]. IEEE Access 5:12941–12950CrossRef
35.
Zurück zum Zitat Xu Y, Zeng Q, Wang G, et al. (2019) An efficient privacy-enhanced attribute-based access control mechanism[J]. Concurr Comput Pract Exper Xu Y, Zeng Q, Wang G, et al. (2019) An efficient privacy-enhanced attribute-based access control mechanism[J]. Concurr Comput Pract Exper
36.
Zurück zum Zitat Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage[J]. IEEE Trans Inf Forensics Secur 8(12):1947–1960CrossRef Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage[J]. IEEE Trans Inf Forensics Secur 8(12):1947–1960CrossRef
37.
Zurück zum Zitat Chen HC (2015) A hierarchical virtual role assignment for negotiation-based RBAC scheme[C]. In: 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA). IEEE, pp 538–543 Chen HC (2015) A hierarchical virtual role assignment for negotiation-based RBAC scheme[C]. In: 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA). IEEE, pp 538–543
38.
Zurück zum Zitat Li H, Wang S, Tian X, et al. (2015) A survey of extended role-based access control in cloud computing[C]. In: Proceedings of the 4th international conference on computer engineering and networks. Springer, Cham, pp 821–831 Li H, Wang S, Tian X, et al. (2015) A survey of extended role-based access control in cloud computing[C]. In: Proceedings of the 4th international conference on computer engineering and networks. Springer, Cham, pp 821–831
39.
Zurück zum Zitat Almutairi A, Sarfraz M, Basalamah S, et al. (2011) A distributed access control architecture for cloud computing[J]. IEEE Softw 29(2):36–44CrossRef Almutairi A, Sarfraz M, Basalamah S, et al. (2011) A distributed access control architecture for cloud computing[J]. IEEE Softw 29(2):36–44CrossRef
40.
Zurück zum Zitat Chen L, Urian R (2015) DAA-A direct anonymous attestation with attributes[c], Springer, Cham Chen L, Urian R (2015) DAA-A direct anonymous attestation with attributes[c], Springer, Cham
41.
Zurück zum Zitat Ouaddah A, Elkalam AA, Ouahman AA (2017) Towards a novel privacy-preserving access control model based on blockchain technology in iot[m]. In: Europe and MENA cooperation advances in information and communication technologies. Springer, Cham, pp 523–533 Ouaddah A, Elkalam AA, Ouahman AA (2017) Towards a novel privacy-preserving access control model based on blockchain technology in iot[m]. In: Europe and MENA cooperation advances in information and communication technologies. Springer, Cham, pp 523–533
42.
Zurück zum Zitat Rahulamathavan Y, Phan RCW, Rajarajan M, et al. (2017) Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption[C]. In: 2017 IEEE international conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6 Rahulamathavan Y, Phan RCW, Rajarajan M, et al. (2017) Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption[C]. In: 2017 IEEE international conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6
44.
Zurück zum Zitat Truong NB, Sun K, Lee GM, et al. (2019). GDPR-compliant personal data management: A blockchain-based solution[J]. arXiv:1904.03038 Truong NB, Sun K, Lee GM, et al. (2019). GDPR-compliant personal data management: A blockchain-based solution[J]. arXiv:1904.​03038
45.
Zurück zum Zitat Zyskind G, Nathan O (2015) Decentralizing privacy: Using blockchain to protect personal data[C]. In: 2015 IEEE security and privacy workshops. IEEE, pp 180–184 Zyskind G, Nathan O (2015) Decentralizing privacy: Using blockchain to protect personal data[C]. In: 2015 IEEE security and privacy workshops. IEEE, pp 180–184
46.
Zurück zum Zitat Ding S, Cao J, Li C, et al. (2019) A novel attribute-based access control scheme using blockchain for IoT[J]. IEEE Access 7:38431–38441CrossRef Ding S, Cao J, Li C, et al. (2019) A novel attribute-based access control scheme using blockchain for IoT[J]. IEEE Access 7:38431–38441CrossRef
Metadaten
Titel
BacS: A blockchain-based access control scheme in distributed internet of things
verfasst von
Na Shi
Liang Tan
Ciaxia Yang
Chen He
Junli Xu
Yang Lu
Hao Xu
Publikationsdatum
12.06.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2021
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00930-5

Weitere Artikel der Ausgabe 5/2021

Peer-to-Peer Networking and Applications 5/2021 Zur Ausgabe

Premium Partner