A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration

被引:4
作者
Sun H. [1 ]
Tan Y.-A. [1 ]
Zhu L. [2 ]
Zhang Q. [2 ]
Ai S. [3 ]
Zheng J. [4 ]
机构
[1] School of Computer Science and Technology, Beijing Institute of Technology, Beijing
[2] School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou
[3] Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou
[4] Cyberspace Science and Technology, Beijing Institute of Technology, Beijing
基金
中国国家自然科学基金;
关键词
Access control; Attribute authentication; Blockchain; Edge cloud collaboration;
D O I
10.1007/s12652-022-04020-7
中图分类号
学科分类号
摘要
The application scenarios of edge-cloud collaboration are very wide. In order to ensure the operational security of resource sharing among intelligent terminals in edge-cloud collaboration scenarios, and prevent unauthorized entities from accessing sensitive data, a blockchain-based access control protocol for secure resource sharing is proposed. For the characteristics of edge-cloud collaborative application scenarios, the attribute authentication, secure storage, intra-domain access control, inter-domain access control and dynamic update of access permissions are studied in this paper. The proposed protocol has the following advantages. (1) Privacy protection: in the edge-cloud collaborative application scenario, the privacy of mobile terminals is easily leaked. The access control technology with hidden attributes is adopted, which can not only achieve the purpose of access control, but also ensure that the identity and attribute information of terminals are not leaked; (2) cross-domain access control: edge-cloud collaborative application scenarios, resource sharing among terminals may span multiple different security domains, and the proposed protocol supports cross-domain access control; (3) dynamic access control: some mobile terminals may frequently join or exit some application scenarios, the access permissions of these terminals can be dynamically updated using blockchain in this protocol; (4) fine-grained access control: the permissions for access resources are set by the combination of attribute permissions of the terminals. The terminal can access a variety of resources by setting different combinations of its attribute permissions. The performance analysis shows that compared with the cited literatures, the proposed protocol has advantages in terms of computational time, computational complexity and communication overhead. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
引用
收藏
页码:13661 / 13672
页数:11
相关论文
共 27 条
[1]  
Chang J., Ni J., Xiao J., Et al., SynergyChain: a multichain-based data sharing framework with hierarchical access control, IEEE Internet Things J, (2021)
[2]  
Gao S., Piao G., Zhu J., Et al., Trustaccess: a trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain, IEEE Trans Veh Technol, 69, 6, pp. 5784-5798, (2020)
[3]  
Guo L., Yang X., Yau W.C., TABE-DAC: efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain, IEEE Access, 9, pp. 8479-8490, (2021)
[4]  
Gupta M., Awaysheh F.M., Benson J., Et al., An attribute-based access control for cloud enabled industrial smart vehicles, IEEE Trans Ind Inform, 17, 6, pp. 4288-4297, (2020)
[5]  
Huang K., Wang X., Lin Z., Practical multiauthority attribute-based access control for edge-cloud-aided internet of things, Secur Commun Netw, (2021)
[6]  
Huang Q., Yue W., Yang Y., Et al., P2gt: fine-grained genomic data access control with privacy-preserving testing in cloud computing, IEEE/ACM Trans Comput Biol Bioinform, (2021)
[7]  
Kumar R., Tripathi R., Scalable and secure access control policy for healthcare system using blockchain and enhanced Bell–LaPadula model, J Ambient Intell Humaniz Comput, 12, 2, pp. 2321-2338, (2021)
[8]  
Li Y., Yao S., Zhang R., Et al., Analyzing host security using D-S evidence theory and multisource information fusion, Int J Intell Syst, 36, 2, pp. 1053-1068, (2021)
[9]  
Li Y., Wang X., Shi Z., Et al., Boosting training for pdf malware classifier via active learning, Int J Intell Syst, 37, 4, pp. 2803-2821, (2022)
[10]  
Lu X., Fu S., Jiang C., Et al., A fine-grained IoT data access control scheme combining attribute-based encryption and blockchain, Secur Commun Netw, (2021)