Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230400080-7.doi: 10.11896/jsjkx.230400080

• Information Security • Previous Articles     Next Articles

Fine Grained Security Access Control Mechanism Based on Blockchain

TIAN Hongliang, XIAN Mingjie, GE Ping   

  1. School of Electrical Engineering,Northeast Electric Power University,Jilin,Jilin 132012,China
  • Published:2024-06-06
  • About author:TIAN Hongliang,born in 1981,Ph.D,associate professor.His main research interests include IoT and blockchain.
    XIAN Mingjie,born in 1997,postgraduate.His main research interests include blockchain and access control.

Abstract: To solve the problems of huge data scale,poor access security and privacy security in industrial IoT,a data security access control mechanism based on blockchain combined with zero-knowledge token is proposed,while IPFS interstellar file system is applied for off-chain storage to expand the storability of blockchain.A blockchain network is built and smart contracts are deployed through the Hyperledger Fabric platform to define a formal representation of the access process to achieve local and global access authorization in a more fine-grained model,while the model and process of access control are elaborated.Finally,the security and effectiveness of the model are compared and analyzed,and the latency of the blockchain network for access authorization is illustrated through experiments.The results show that the proposed mechanism has security,effectiveness and low latency in IoT access control.

Key words: Blockchain, Access control, IoT, Smart contract, IPFS

CLC Number: 

  • TP393
[1]ZHANG P,LIU H Y,LI W J,et al.Industrial intelligent network-deepening and upgrading of industrial Internet[J].Journal of Communications,2018,39(12):134-140.
[2]SIKORSKI J,HAUGHTON J,KRAFT M.Blockchain techno-logy in the chemical industry:Machine-to-machine electricity market[J].Applied Energy,2017,195(JUN.1):234-246.
[3]LI Z,KANG J,YU R,et al.Consortium Blockchain for SecureEnergy Trading in Industrial Internet of Things[J].IEEE Transactions on Industrial Informatics,2017,PP(99):1-1.
[4]QIU C,YU F,YAO H,et al.Blockchain-Based Software-De-fined Industrial Internet of Things:A Dueling Deep Q-Learning Approach[J].IEEE Internet of Things Journal,2019,6(3):4627-4639.
[5]WANG J,HAN W,ZHANG H,et al.Trust and Attribute-Based Dynamic Access Control Model for Internet of Things[C]//2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery(CyberC).2017.
[6]LENG J,YE S,ZHOU M,et al.Blockchain-Secured Smart Ma-nufacturing in Industry 4.0:A Survey[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems,2021,51(1).
[7]YANG Q,LU R,RONG C,et al.Guest Editorial The Convergence of Blockchain and IoT:Opportunities,Challenges and Solutions[J].IEEE Internet of Things Journal,2019,6(3):4556-4560.
[8]LIU Q,ZHANG H,WAN J F,et al.An Access Control Model for Resource Sharing based on the Role-Based Access Control Intended for Multi-domain Manufacturing Internet of Things[J].IEEE Access,2017,5:7001-7011.
[9]NING Y E,YAN Z,WANG R C,et al.An Efficient Authentica-tion and Access Control Scheme for Perception Layer of Internet of Things[J].Applied Mathematics & Information Sciences,2014,8(4).
[10]GUSMEROLI S,PICCIONE S,ROTONDI D.A capability-based security approach to manage access control in the Internet of Things[J].Mathematical & Computer Modelling,2013,58(5/6):1189-1205.
[11]ZHANG Y,SHOJI K,SHEN Y,et al.Smart Contract-Based Access Control for the Internet of Things[J].IEEE Internet of Things Journal,2019,6(2):1594-1605.
[12]OSCAR N.Blockchain Meets IoT:An Architecture for Scalable Access Management in IoT[J].IEEE Internet of Things Journal,2018,5(2):1184-1195.
[13]ZHANG Y,LI B,LIU B,et al.An Attribute-Based Collaborative Access Control Scheme Using Blockchain for IoT Devices[J].Electronics,2020,9(2):285.
[14]BOURAS M,XIA B,ABUASSBA A,et al.IoT-CCAC:a blockchain-based consortium capability access control approach for IoT[J].PeerJ Computer Science,2021,7(3):e455.
[15]NOVO O.Scalable Access Management in IoT using Block-chain:a Performance Evaluation[J].IEEE Internet of Things Journal,2019,6(3):4694-4701.
[16]QI X,SIFAH E,AGYEKUM O,et al.Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments[J].IEEE Internet of Things Journal,2019,6(6):10749-10762.
[17]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-Poli-cy.Attribute-Based Encryption[C]//IEEE Symposium on Security & Privacy.IEEE,2007.
[18]SUN S,CHEN S,DU R.Trusted and Efficient Cross-Domain Access Control System Based on Blockchain[J].Scientific Programming,2020,2020(10):1-13.
[19]XIE R N,LI H,SHI G Z,et al.Traceable access control mechanism based on blockchain[J].Journal of Communications,2020,41(12):82-93.
[1] ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5.
[2] LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14.
[3] TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8.
[4] KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6.
[5] GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9.
[6] ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai. Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things [J]. Computer Science, 2024, 51(6A): 230700217-5.
[7] ZHAO Ziqi, YANG Bin, ZHANG Yuanguang. Hierarchical Traffic Flow Prediction Model Based on Graph Autoencoder and GRU Network [J]. Computer Science, 2024, 51(6A): 230400148-6.
[8] XU Yiran, ZHOU Yu. Prompt Learning Based Parameter-efficient Code Generation [J]. Computer Science, 2024, 51(6): 61-67.
[9] ZHANG Ruirong, NIU Baoning, FAN Xing. Multi-attribute Blockchain Decentralization Degree Measurement Model [J]. Computer Science, 2024, 51(5): 382-389.
[10] ZHAO Geng, WU Rui, MA Yingjie, HUANG Sijie, DONG Youheng. Three-dimensional OFDM Constellation Encryption Scheme Based on Perturbed Spatiotemporal Chaos [J]. Computer Science, 2024, 51(5): 390-399.
[11] LI Fengyun, CHEN Mingming, WANG Lin, LI Peng , JU Xianyin. Study on Trust Management Mechanism of Internet of Vehicles Based on Blockchain [J]. Computer Science, 2024, 51(4): 381-387.
[12] LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47.
[13] WANG Dong, LI Zheng, XIAO Bingbing. Blockchain Coin Mixing Scheme Based on Homomorphic Encryption [J]. Computer Science, 2024, 51(3): 335-339.
[14] DONG Hao, ZHAO Hengtai, WANG Ziyao, YUAN Ye, ZHANG Aoqian. Parallel Transaction Execution Models Under Permissioned Blockchains [J]. Computer Science, 2024, 51(1): 124-132.
[15] TONG Fei, SHAO Ranran. Study on Blockchain Based Access Control Model for Cloud Data [J]. Computer Science, 2023, 50(9): 16-25.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!