An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things

被引:15
作者
Hsu, Chien-Lung [1 ,2 ,3 ,4 ,5 ]
Chen, Wei-Xin [1 ]
Tuan-Vinh Le [2 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Taoyuan 33302, Taiwan
[2] Chang Gung Univ, Grad Inst Business & Management, Taoyuan 33302, Taiwan
[3] Chang Gung Univ, Hlth Aging Res Ctr, Taoyuan 33302, Taiwan
[4] Ming Chi Univ Technol, Dept Visual Commun Design, New Taipei 24301, Taiwan
[5] Taoyuan Chang Gung Mem Hosp, Dept Nursing, Taoyuan 333, Taiwan
关键词
attribute-based access control; digital forensics; evidence legality; sensor log; signature chain; PRIVACY; TECHNOLOGY; CHALLENGES; EFFICIENT; SCHEME;
D O I
10.3390/s20226471
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As the Internet of Things (IoT) has become prevalent, a massive number of logs produced by IoT devices are transmitted and processed every day. The logs should contain important contents and private information. Moreover, these logs may be used as evidences for forensic investigations when cyber security incidents occur. However, evidence legality and internal security issues in existing works were not properly addressed. This paper proposes an autonomous log storage management protocol with blockchain mechanism and access control for the IoT. Autonomous model allows sensors to encrypt their logs before sending it to gateway and server, so that the logs are not revealed to the public during communication process. Along with blockchain, we introduce the concept "signature chain". The integration of blockchain and signature chain provides efficient management functions with valuable security properties for the logs, including robust identity verification, data integrity, non-repudiation, data tamper resistance, and the legality. Our work also employs attribute-based encryption to achieve fine-grained access control and data confidentiality. The results of security analysis using AVSIPA toolset, GNY logic and semantic proof indicate that the proposed protocol meets various security requirements. Providing good performance with elliptic curve small key size, short BLS signature, efficient signcryption method, and single sign-on solution, our work is suitable for the IoT.
引用
收藏
页码:1 / 32
页数:32
相关论文
共 62 条
  • [1] Mobility-aware task scheduling in cloud-Fog IoT-based healthcare architectures
    Abdelmoneem, Randa M.
    Benslimane, Abderrahim
    Shaaban, Eman
    [J]. COMPUTER NETWORKS, 2020, 179
  • [2] RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications
    Al-Zubaidie, Mishall
    Zhang, Zhongwei
    Zhang, Ji
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [3] [Anonymous], 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), P311
  • [4] [Anonymous], 1984, Advances in Cryptology, DOI 10.1007/3-540-39568-7_5
  • [5] [Anonymous], 2007, 2007 IEEE S SECURITY
  • [6] Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems
    Arshad, Hamed
    Rasoolzadegan, Abbas
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [7] Secure and resilient demand side management engine using machine learning for IoT-enabled smart grid
    Babar, Muhammad
    Tariq, Muhammad Usman
    Jan, Mian Ahmad
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2020, 62 (62)
  • [8] Beimel A., 1996, SECURE SCHEMES SECRE
  • [9] Boneh D., 2011, ADV CRYPTOLOGY ASIAC
  • [10] On Scaling Decentralized Blockchains (A Position Paper)
    Croman, Kyle
    Decker, Christian
    Eyal, Ittay
    Gencer, Adem Efe
    Juels, Ari
    Kosba, Ahmed
    Miller, Andrew
    Saxena, Prateek
    Shi, Elaine
    Sirer, Emin Gun
    Song, Dawn
    Wattenhofer, Roger
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 : 106 - 125