Bloccess: Enabling Fine-Grained Access Control Based on Blockchain

被引:6
作者
Ding, Yepeng [1 ]
Sato, Hiroyuki [1 ]
机构
[1] Univ Tokyo, Dept Elect Engn & Informat Syst, Tokyo 1138654, Japan
关键词
Access control; Blockchain; Security and privacy; Formal methods; Internet of things; Distributed computing; Software Engineering; FRAMEWORK; INTERNET;
D O I
10.1007/s10922-022-09700-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is a fundamental security aspect and has been adopted in diverse systems. Particularly, fine-grained access control models present good flexibility and scalability to adapt to complicated systems. However, building a trustworthy fine-grained access control mechanism in untrustworthy distributed environments such as Internet of Things (IoT) environments is challenging. Conventional access control mechanisms encounter security and privacy issues caused by centralized entities, such as single point of failure and data tampering. To address these issues, we have proposed Bloccess, a fine-grained access control framework based on the consortium blockchain, in our previous work. By leveraging blockchain technology, we formulate a set of protocols to enforce a tamper-proof access control mechanism in untrustworthy distributed environments. In this paper, we refine our previous work and present the extended version of Bloccess. We optimize our protocols and extend them to support a hybrid blockchain structure. We also formulate complete identification protocols for the administration mechanism in Bloccess. Besides, we show Bloccess in practice with a Bloccess-enabled IoT system. Furthermore, we conduct a semi-formal analysis to prove the security properties of Bloccess and evaluate its security through a security model and a threat model.
引用
收藏
页数:34
相关论文
共 42 条
[1]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[2]  
[Anonymous], 2014, P 2014 USENIX ANN TE
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[5]  
Chuen D. L. K., 2015, Handbook of digital currency: Bitcoin, innovation, financial instruments, and big data, V1st
[6]  
Cimatti A., 2002, LNCS, P359
[7]   A Survey of Man In The Middle Attacks [J].
Conti, Mauro ;
Dragoni, Nicola ;
Lesyk, Viktor .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :2027-2051
[8]   RBAC-SC: Role-Based Access Control Using Smart Contract [J].
Cruz, Jason Paul ;
Kaji, Yuichi ;
Yanai, Naoto .
IEEE ACCESS, 2018, 6 :12240-12251
[9]  
Dabbagh M., 2019, Internet of Things Security and Privacy, P211, DOI 10.1007/978-3-319-99516-8_8
[10]   Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology [J].
Dagher, Gaby G. ;
Mohler, Jordan ;
Milojkovic, Matea ;
Marella, Praneeth Babu .
SUSTAINABLE CITIES AND SOCIETY, 2018, 39 :283-297