A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT

被引:209
作者
Ding, Sheng [1 ]
Cao, Jin [1 ]
Li, Chen [2 ]
Fan, Kai [3 ]
Li, Hui [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shaanxi, Peoples R China
[3] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Access control; attribute-based access control; blockchain; consortium blockchain; Internet of Things; INTERNET; ARCHITECTURE;
D O I
10.1109/ACCESS.2019.2905846
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the sharp increase in the number of intelligent devices, the Internet of Things (IoT) has gained more and more attention and rapid development in recent years. It effectively integrates the physical world with the Internet over existing network infrastructure to facilitate sharing data among intelligent devices. However, its complex and large-scale network structure brings new security risks and challenges to IoT systems. To ensure the security of data, traditional access control technologies are not suitable to be directly used for implementing access control in IoT systems because of their complicated access management and the lack of credibility due to centralization. In this paper, we proposed a novel attribute-based access control scheme for IoT systems, which simplifies greatly the access management. We use blockchain technology to record the distribution of attributes in order to avoid single point failure and data tampering. The access control process has also been optimized to meet the need for high efficiency and lightweight calculation for IoT devices. The security and performance analysis show that our scheme could effectively resist multiple attacks and be efficiently implemented in IoT systems.
引用
收藏
页码:38431 / 38441
页数:11
相关论文
共 24 条
  • [1] [Anonymous], 2008, TECH REP
  • [2] SATMC: A SAT-based model checker for security protocols
    Armando, A
    Compagna, L
    [J]. LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3229 : 730 - 733
  • [3] Basin D., 2005, Int. J. Inf. Secur., V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
  • [4] Boichut Y., 2004, Proc. Int. Workshop on Automated Verification of Infinite-State Systems (AVIS 2004), P1
  • [5] Practical byzantine fault tolerance and proactive recovery
    Castro, M
    Liskov, B
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04): : 398 - 461
  • [6] IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios
    Cirani, Simone
    Picone, Marco
    Gonizzi, Pietro
    Veltri, Luca
    Ferrari, Gianluigi
    [J]. IEEE SENSORS JOURNAL, 2015, 15 (02) : 1224 - 1234
  • [7] Conoscenti M., 2016, P 2016 IEEE ACS 13 I, P1, DOI [10.1109/AICCSA.2016 .7945805, DOI 10.1109/AICCSA.2016.7945805]
  • [8] Ferraiolo D., 2003, ARTECH H COMP SEC LI
  • [9] Hardjono T., 2016, TECH REP
  • [10] Hardt D., 2012, OAUTH 2 0 AUTHORIZAT