Survey of Blockchain Access Control in Internet of Things

被引:0
|
作者
Shi J.-S. [1 ,2 ]
Li R. [1 ,2 ]
机构
[1] College of Computer Science, Inner Mongolia University, Hohhot
[2] Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing, Inner Mongolia University, Hohhot
来源
Ruan Jian Xue Bao/Journal of Software | 2019年 / 30卷 / 06期
基金
中国国家自然科学基金;
关键词
Access control; Blockchain; Internet of things; Privacy protection; Smart contract;
D O I
10.13328/j.cnki.jos.005740
中图分类号
学科分类号
摘要
With the development of the Internet of things, the privacy protection of the IoT has attracted people's attention, and access control technology is one of the important methods of privacy protection. The IoT access control model is based on the concept of a central trusted entity. The decentralized blockchain technology solves the security risks brought by the centralized model. This study proposes three issues that must be resolved according to the characteristics of the IoT environment. These three issues are: (1) IoT terminal device lightweight; (2) IoT has a large number of terminal nodes; and (3) dynamic issues under the IoT. Then, using these three issues as the core, it is analyzed and summarized that how the mainstream access control model in the existing IoT and blockchain-based access control model solves these problems. Finally, two types of blockchain access control models and the advantages of using blockchain for IoT access control are summarized, as well as the problems that need to be solved in the future for blockchain and IoT access control. © Copyright 2019, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1632 / 1648
页数:16
相关论文
共 69 条
  • [31] Ouaddah A., Abou Elkalam A., Ait Ouahman A., FairAccess: A new blockchain-based access control framework for the Internet of things, Security and Communication Networks, 9, 18, pp. 5943-5964, (2016)
  • [32] Jemel M., Serhrouchni A., Decentralized access control mechanism with temporal dimension based on blockchain, Proc. of the 2017 IEEE 14th Int'l Conf. on e-Business Engineering (ICEBE), pp. 177-182, (2017)
  • [33] Outchakoucht A., Hamza E.S.S., Leroy J.P., Dynamic access control policy based on blockchain and machine learning for the Internet of things, Int'l Journal of Advanced Computer Science and Applications (IJACSA), 8, 7, pp. 417-424, (2017)
  • [34] Shafagh H., Burkhalter L., Hithnawi A., Duquennoy S., Towards blockchain-based auditable storage and sharing of IoT data, Proc. of the 2017 on Cloud Computing Security Workshop, pp. 45-50, (2017)
  • [35] Mei Y., Simplification model construction of Internet access control based on block chain, Journal of Communication University of China, 24, 5, pp. 7-12, (2017)
  • [36] Dorri A., Kanhere S.S., Jurdak R., Gauravaram P., Blockchain for IoT security and privacy: The case study of a smart home, Proc. of the 2017 IEEE Int'l Conf. on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618-623, (2017)
  • [37] Zyskind G., Nathan O., Decentralizing privacy: Using blockchain to protect personal data, Proc. of the 2015 IEEE Security and Privacy Workshops (SPW), pp. 180-184, (2015)
  • [38] Zhang Y., Kasahara S., Shen Y., Jiang X., Wan J., Smart contract-based access control for the Internet of things, IEEE Internet of Things Journal, 6, 2, pp. 1594-1605, (2019)
  • [39] Rifi N., Rachkidi E., Agoulmine N., Taher N.C., Towards using blockchain technology for IoT data access protection, Proc. of the 2017 IEEE 17th Int'l Conf. on Ubiquitous Wireless Broadband (ICUWB), pp. 1-5, (2017)
  • [40] Ramachandran A., Kantarcioglu D., Using blockchain and smart contracts for secure data provenance management, (2017)