Survey of Blockchain Access Control in Internet of Things

被引:0
|
作者
Shi J.-S. [1 ,2 ]
Li R. [1 ,2 ]
机构
[1] College of Computer Science, Inner Mongolia University, Hohhot
[2] Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing, Inner Mongolia University, Hohhot
来源
Ruan Jian Xue Bao/Journal of Software | 2019年 / 30卷 / 06期
基金
中国国家自然科学基金;
关键词
Access control; Blockchain; Internet of things; Privacy protection; Smart contract;
D O I
10.13328/j.cnki.jos.005740
中图分类号
学科分类号
摘要
With the development of the Internet of things, the privacy protection of the IoT has attracted people's attention, and access control technology is one of the important methods of privacy protection. The IoT access control model is based on the concept of a central trusted entity. The decentralized blockchain technology solves the security risks brought by the centralized model. This study proposes three issues that must be resolved according to the characteristics of the IoT environment. These three issues are: (1) IoT terminal device lightweight; (2) IoT has a large number of terminal nodes; and (3) dynamic issues under the IoT. Then, using these three issues as the core, it is analyzed and summarized that how the mainstream access control model in the existing IoT and blockchain-based access control model solves these problems. Finally, two types of blockchain access control models and the advantages of using blockchain for IoT access control are summarized, as well as the problems that need to be solved in the future for blockchain and IoT access control. © Copyright 2019, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
下载
收藏
页码:1632 / 1648
页数:16
相关论文
共 69 条
  • [1] Fang L., Yin L.H., Guo Y.C., Fang B.X., A survey of key technologies in attribute-based access control scheme, Chinese Journal of Computers, 40, 7, pp. 1680-1698, (2017)
  • [2] Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E., Role-based access control models, Computer, 29, 2, pp. 38-47, (1996)
  • [3] Ferraiolo D.F., Kuhn D.R., Role-based access controls, Computer, 4, 3, pp. 554-563, (1992)
  • [4] Moyer M.J., Abamad M., Generalized role-based access control, Proc. of the 21st Int'l Conf. on Distributed Computing Systems, pp. 391-398, (2001)
  • [5] Bertino E., Bonatti P.A., Ferrari E., TRBAC: A temporal role-based access control model, ACM Trans. on Information and System Security (TISSEC), 4, 3, pp. 191-233, (2001)
  • [6] Yuan E., Tong J., Attributed based access control (ABAC) for Web services, Proc. of the IEEE Int'l Conf. on Web Services, (2005)
  • [7] Hemdi M., Deters R., Using REST based protocol to enable ABAC within IoT systems, Proc. of the Information Technology, Electronics and Mobile Communication Conf, pp. 1-7, (2016)
  • [8] Han Q., Li J., An authorization management approach in the Internet of things, Journal of Information & Computational Science, 9, 6, pp. 1705-1713, (2012)
  • [9] Wu J., Dong M., Ota K., Pei B., A fine-grained cross-domain access control mechanism for social Internet of things, Proc. of the Ubiquitous Intelligence and Computing, pp. 666-671, (2014)
  • [10] Ouechtati H., Azzouna N.B., Trust-ABAC towards an access control system for the Internet of things, Proc. of the Int'l Conf. on Green, Pervasive, and Cloud Computing, pp. 75-89, (2017)