Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario

被引:114
作者
Ma, Mingxin [1 ]
Shi, Guozhen [2 ]
Li, Fenghua [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Beijing Elect Sci & Technol Inst, Sch Informat Secur, Beijing 100070, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
关键词
Blockchain; fog computing; hierarchical key management; Internet of Things;
D O I
10.1109/ACCESS.2019.2904042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of the Internet of Things (IoT) and the explosive growth of valuable data produced by user equipment have led to strong demand for access control, especially hierarchical access control, which is performed from a group communication perspective. However, the key management strategies for such a future Internet are based mostly on a trusted third party that requires full trust of the key generation center (KGC) or central authority (CA). Recent studies indicate that centralized cloud centers will be unlikely to deliver satisfactory services to customers because we place too much trust in third parties; therefore, these centers do not apply to user privacy-oriented scenarios. This paper addresses these issues by proposing a novel blockchain-based distributed key management architecture (BDKMA) with fog computing to reduce latency and multiblockchains operated in the cloud to achieve cross-domain access. The proposed scheme utilizes blockchain technology to satisfy the decentralization, fine-grained auditability, high scalability, and extensibility requirements, as well as the privacy-preserving principles for hierarchical access control in IoT. We designed system operations methods and introduced different authorization assignment modes and group access patterns to reinforce the extensibility. We evaluated the performance of our proposed architecture and compared it with existing models using various performance measures. The simulation results show that the multiblockchain structure substantially improves system performance, and the scalability is excellent as the network size increases. Furthermore, dynamic transaction collection time adjustment enables the performance and system capacity to be optimized for various environments.
引用
收藏
页码:34045 / 34059
页数:15
相关论文
共 39 条
[11]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[12]  
Conoscenti M., 2016, P 2016 IEEE ACS 13 I, P1, DOI [10.1109/AICCSA.2016 .7945805, DOI 10.1109/AICCSA.2016.7945805]
[13]   Stealth Address and Key Management Techniques in Blockchain Systems [J].
Courtois, Nicolas T. ;
Mercer, Rebekah .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :559-566
[14]  
Dai W., 2009, CRYPTO LIB 8 0
[15]  
Dorri A, 2016, BLOCKCHAIN INTERNET
[16]  
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[17]  
Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
[18]   Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J].
Eyal, Ittay ;
Sirer, Emin Gun .
COMMUNICATIONS OF THE ACM, 2018, 61 (07) :95-102
[19]   World of Empowered IoT Users [J].
Hashemi, Sayed Hadi ;
Faghri, Faraz ;
Rausch, Paul ;
Campbell, Roy H. .
PROCEEDINGS 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION IOTDI 2016, 2016, :13-24
[20]  
Karafiloski E, 2017, 17TH IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES - IEEE EUROCON 2017 CONFERENCE PROCEEDINGS, P763, DOI 10.1109/EUROCON.2017.8011213