Abstract

With opportunities brought by the Internet of Things (IoT), it is quite a challenge to maintain concurrency and privacy when a huge number of resource-constrained distributed devices are involved. Blockchain have become popular for its benefits, including decentralization, persistence, immutability, auditability, and consensus. Great attention has been received by the IoT based on the construction of distributed file systems worldwide. A new generation of IoT-based distributed file systems has been proposed with the integration of Blockchain technology, such as the Swarm and Interplanetary File System. By using IoT, new technical challenges, such as Credibility, Harmonization, large-volume data, heterogeneity, and constrained resources are arising. To ensure data security in IoT, centralized access control technologies do not provide credibility. In this work, we propose an attribute-based access control model for the IoT. The access control lists are not required for each device by the system. It enhances access management in terms of effectiveness. Moreover, we use blockchain technology for recording the attribute, avoiding data tempering, and eliminating a single point of failure at edge computing devices. IoT devices control the user’s environment as well as his or her private data collection; therefore, the exposure of the user’s personal data to non-trusted private and public servers may result in privacy leakage. To automate the system, smart contracts are used for data accessing, whereas Proof of Authority is used for enhancing the system’s performance and optimizing gas consumption. Through smart contracts, ciphertext can be stored on a blockchain by the data owner. Data can only be decrypted in a valid access period, whereas in blockchains, the trace function is achieved by the storage of invocation and the creation of smart contracts. Scalability issues can also be resolved by using the multichain blockchain. Eventually, it is concluded from the simulation results that the proposed system is efficient for IoT.

Highlights

  • We propose an attribute-based access control mechanism for Internet of Things (IoT)

  • After successful authentication is provided by the policy management contract (PMC), object attribute management contract (OAMC), and subject attribute management contract (SAMC), the access control contract (ACC) can retrieve the subject and object attributes with the concerned policy information and verify the results

  • We propose an attribute-based access control mechanism for IoTs that provides local access, authorization of clients, privacy, and interoperability by using smart contract data sharing and user-controlled encoded policies

Read more

Summary

Introduction

Sustainability 2021, 13, 10556 number of devices involved, storage-related challenges arise, and along with that, data protection and large-scale efficient data storage are significant issues [3]. The cost of cloud storage services based on a centralized system are gradually increasing. From this point of view, the future requires a decentralized storage system, which is independent of third-party interference, that honestly stores and transmits the user’s data. Has led the combination of Blockchain technology with IoT to become a promising trend, through which a publicly verifiable, decentralized, and credible database can be established, and a distributed trust of billions of connected things can be achieved. An automatically repairing order by the coffee machine, the identification of parking lot usage, and the detection of rubbish bin fullness are all electronic devices used daily [22]

Paper Contributions
Background and Motivation
Existing Access Control IoT Architectures and Related Challenges
Centralized Architecture
Trust Entity with Decentralized Architecture
Distributed Architecture
Issues Faced by the Present Architectures
Blockchain
Multichain
Smart Contracts
Related Work
Ethereum-Based Existing Access Control Schemes
Limitations
System Model and Proposed Methodology
Smart Contract System
Data Sharing Model
Policy Model
Attribute-Based Encryption
Access Policy
Security Assumptions and Attacker Model
Performance Evaluation
An Attribute-Based Access Control Model for IoTs
Cost Evaluation and Comparison
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call