A Novel Access Control Method Via Smart Contracts for Internet-Based Service Provisioning

被引:20
作者
Ghaffari, Fariba [1 ,2 ]
Bertin, Emmanuel [1 ,2 ]
Crespi, Noel [2 ]
Behrad, Shanay [3 ]
Hatin, Julien [1 ]
机构
[1] Orange Innovat, F-14000 Caen, France
[2] Telecom SudParis, Inst Polytech Paris, IMT, F-91764 Palaiseau, France
[3] Inst Res & Technol B Com, F-35510 Cesson Sevigne, France
关键词
Access control; Blockchain; Business; Smart contracts; Process control; Telecommunications; Streaming media; ABAC; blockchain; ethereum; flexible access control; network; service provisioning; smart contract; trusted payment; 5G; THINGS;
D O I
10.1109/ACCESS.2021.3085831
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The dramatic rise in internet-based service provisioning has highlighted the importance of deploying scalable access control methods, facilitating service authorization for eligible users. Existing centralized methods suffer from single-point-of-failure, low scalability, and high computational overhead. In addition, in these methods, users pay for the service provider as well as the network provider independently for a specific service, imposing extra cost for the user. New business models are needed to resolve such shortcomings. The realization of these models calls for sophisticated access control methods which consider the requirements of all parties who want to: 1) access a service; 2) provide that service; and 3) provide the network connection. Blockchain is an enabling technology that provides unprecedented opportunities to novel distributed access control methods for new business models. We propose an Attribute-based access control solution by leveraging Blockchain to share network providers' and service providers' resources. Our solution offers access flexibility based on the requirements of the parties while fulfilling reliability, accountability, and immutability. Besides, it decreases the overall service cost which is beneficial for each party. Our solution makes it possible for service providers to outsource their access control procedures without requiring a trusted third party. The experiments confirm that our solution can provide a fast, comprehensive, and scalable access control mechanism.
引用
收藏
页码:81253 / 81273
页数:21
相关论文
共 44 条
[1]   Applications of Blockchains in the Internet of Things: A Comprehensive Survey [J].
Ali, Muhammad Salek ;
Vecchio, Massimo ;
Pincheira, Miguel ;
Dolui, Koustabh ;
Antonelli, Fabio ;
Rehmani, Mubashir Husain .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1676-1717
[2]  
Anggorojati B., 2012, 2012 15th International Symposium on Wireless Personal Multimedia Communications (WPMC 2012), P604
[3]  
[Anonymous], Secure Property Titles with Owner Authority
[4]  
[Anonymous], 2003, ARTECH H COMP SEC LI
[5]  
Behrad S, 2018, 2018 21ST CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN)
[6]  
Bertoni G., 2011, The Keccak SHA-3 submission
[7]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[8]   RBAC-SC: Role-Based Access Control Using Smart Contract [J].
Cruz, Jason Paul ;
Kaji, Yuichi ;
Yanai, Naoto .
IEEE ACCESS, 2018, 6 :12240-12251
[9]  
Dannen C., 2017, Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners, P69, DOI [DOI 10.1007/978-1-4842-2535-6, 10.1007/978-1-4842-2535-6_4, DOI 10.1007/978-1-4842-2535-6_4]
[10]   Factors that Impact Blockchain Scalability [J].
Eklund, Peter W. ;
Beck, Roman .
11TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES), 2019, :126-133