IOTA-Based Access Control Framework for the Internet of Things

被引:0
作者
Nakanishi, Ruka [1 ]
Zhang, Yuanyu [1 ]
Sasabe, Masahiro [1 ]
Kasahara, Shoji [1 ]
机构
[1] Nara Inst Sci & Technol, Grad Sch Sci & Technol, 8916-5 Takayama Cho, Ikoma, Nara 6300192, Japan
来源
2020 2ND CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS) | 2020年
基金
日本学术振兴会;
关键词
Internet of Things; IOTA; Blockchain; Access Control; Ciphertext-Policy Attribute-Based Encryption (CP-ABE);
D O I
10.1109/brains49436.2020.9223293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid dissemination of the Internet of Things (IoT), the number of resources deployed in IoT systems such as devices and data is growing explosively. Since IoT systems often handle private information, it is essential to enforce appropriate access control to prevent unauthorized access. However, conventional access control schemes in which access rights are stored in a centralized server are prone to load concentration and a single point of failure. Although distributed access control schemes leveraging blockchain technologies have been proposed to deal with such problems, they inherit the drawbacks of the blockchain technologies, such as high transaction fee and low throughput. This paper proposes a novel access control framework based on IOTA, an emerging distributed ledger technology which enables free micro transactions with high throughput. This framework provides scalable and fine-grained access control by encrypting access rights using the Ciphertext-Policy AttributeBased Encryption (CP-ABE) technology and storing them on the distributed ledger of IOTA, called Tangle.
引用
收藏
页码:87 / 91
页数:5
相关论文
共 17 条
[1]  
[Anonymous], NEXT GENERATION DIST
[2]  
[Anonymous], DEVNET IOTA DOCUMENT
[3]  
[Anonymous], INTRO MASKED AUTHENT
[4]  
[Anonymous], MASKED AUTHENTICATIO
[5]  
[Anonymous], Smart Contracts
[6]  
[Anonymous], 2013, GARTNER IDENTIFIES T
[7]  
[Anonymous], BITCOIN OPEN SOURCE
[8]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[9]  
Gusmeroli S., 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), P787, DOI 10.1109/IMIS.2012.38
[10]  
Nakamura Y, 2019, IEEE GLOB COMM CONF, DOI [10.1109/globecom38437.2019.9013321, 10.1109/RADECS47380.2019.9745719]