Towards Secure and Decentralized Sharing of IoT Data

被引:53
作者
Hien Thi Thu Truong [1 ]
Almeida, Miguel [1 ]
Karame, Ghassan [1 ]
Soriente, Claudio [1 ]
机构
[1] NEC Labs Europe, Heidelberg, Germany
来源
2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019) | 2019年
基金
欧盟地平线“2020”;
关键词
blockchain; hyperledger; data sharing; data marketplace; access control; IoT; security; policy; BLOCKCHAIN;
D O I
10.1109/Blockchain.2019.00031
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Internet of Things (IoT) bears unprecedented security and scalability challenges due to the magnitude of data produced and exchanged by IoT devices and platforms. Some of those challenges are currently being addressed by coupling IoT applications with blockchains. However, current blockchain-backed IoT systems simply use the blockchain to store access control policies, thereby underutilizing the power of blockchain technology. In this paper, we propose a new framework named Sash that couples IoT platforms with blockchain that provides a number of advantages compared to state of the art. In Sash, the blockchain is used to store access control policies and take access control decisions. Therefore, both changes to policies and access requests are correctly enforced and publicly auditable. Further, we devise a "data marketplace" by leveraging the ability of blockchains to handle financial transaction and providing "by design" remuneration to data producers. Finally, we exploit a special flavor of identity-based encryption to cater for cryptography-enforced access control while minimizing the overhead to distribute decryption keys. We prototype Sash by using the FIWARE open source IoT platform and the Hyperledger Fabric framework as the blockchain back-end. We also evaluate the performance of our prototype and show that it incurs tolerable overhead in realistic deployment settings.
引用
收藏
页码:176 / 183
页数:8
相关论文
共 20 条
[1]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[2]  
[Anonymous], 2018, 2018209 CRYPT EPRINT
[3]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[4]   Chosen-ciphertext security from identity-based encryption [J].
Boneh, Dan ;
Canetti, Ran ;
Halevi, Shai ;
Katz, Jonathan .
SIAM JOURNAL ON COMPUTING, 2006, 36 (05) :1301-1328
[5]  
Chatzopoulos D., 2018, ARXIV E PRINTS
[6]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[7]  
Esposito C, 2018, IEEE CLOUD COMPUT, V5, P31
[8]  
Hu SS, 2018, IEEE INFOCOM SER, P792, DOI 10.1109/INFOCOM.2018.8485890
[9]   Security SLA based Monitoring in Clouds [J].
Kaaniche, Nesrine ;
Mohamed, Mohamed ;
Laurent, Maryline ;
Ludwig, Heiko .
2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, :90-97
[10]  
Laurent M., 2018, ACCESS CONTROL SCHEM