Towards Secure Distributed Trust Management on a Global Scale An analytical approach for applying Distributed Ledgers for authorization in the IoT

被引:13
作者
Alexopoulos, Nikolaos [1 ]
Habib, Sheikh Mahbub [1 ]
Muehlhaeuser, Max [1 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
来源
PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18) | 2018年
关键词
ACCESS-CONTROL;
D O I
10.1145/3229565.3229569
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Authorization, and more generally Trust Management (TM), is an indispensable part of the correct operation of most IT systems. The advent of the Internet of Things (IoT), with its cyber-physical and distributed nature, creates new challenges, that existing TM systems cannot adequately address, such as for example the need for non-interactive exclusive access enforcement. In the meantime, a line of thought in the research community is that Distributed Ledgers (DLs), like the one implemented by the Ethereum blockchain, can provide strong security guarantees for distributed access control. However, this approach has not yet been examined in a scientific, systematic manner, and has many pitfalls, with arguably the most important one being scalability. In this paper, we critically explore the shortcomings of existing solutions for trust management in distributed networks, pinpoint which of these shortcomings can be addressed by utilizing DLs, and offer a conceptual design for a scalable, secure TM system. Our design approaches the problem in three layers, namely a global, an intermediate group or shard layer, and a local layer, corresponding to the set of embedded devices behind an internet access point. We view our design as a novel first step, helping the community to produce more secure and realistic authorization solutions for the IoT, in the near future.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 29 条
[1]   Beyond the Hype: On Using Blockchains in Trust Management for Authentication [J].
Alexopoulos, Nikolaos ;
Daubert, Joerg ;
Muehlhaeuser, Max ;
Habib, Sheikh Mahbub .
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, :546-553
[2]  
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[3]  
Andersen Michael P, 2017, TECHNICAL REPORT
[4]  
[Anonymous], ENCY CRYPTOGRAPHY SE
[5]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173
[6]  
Blaze M., 1999, The keyNote trust-management system, Version 2
[7]  
Cachin C., 2016, WORKSH DISTR CRYPT C, V310
[8]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[9]  
Frisch A., 2002, Essential System Administration, V3rd
[10]  
Fromknecht C, 2014, A decentralized public [key infrastructure with identity retention