Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment

被引:11
|
作者
Alshehri, Suhair [1 ]
Bamasaq, Omaimah [2 ]
Alghazzawi, Daniyal [3 ]
Jamjoom, Arwa [3 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Technol, Jeddah 22254, Saudi Arabia
[2] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 22254, Saudi Arabia
[3] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 22254, Saudi Arabia
关键词
Blockchains; Internet of Things; Access control; Security; Cloud computing; Performance evaluation; Encryption; Access delegation; blockchain; edge computing; Internet of Things (IoT); practical Byzantine fault tolerance (PBFT) consensus; revocation; secure data sharing; ATTRIBUTE-BASED ENCRYPTION; KEY MANAGEMENT; CONTROL SCHEME; LIGHTWEIGHT; INTERNET; AUTHENTICATION; AUTHORIZATION;
D O I
10.1109/JIOT.2022.3217087
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is vulnerable to leakage of private information during data sharing. To avoid this problem, access control and secure data sharing have been introduced in IoT; however, many challenges are faced because of centralized access control and single delegator selection. Additionally, blockchain is integrated into IoT to enhance the security of the environment. For that purpose, this research proposes dynamic secure access control using the blockchain (DSA-Block) model, which performs secure access control and data sharing. Initially, the IoT device attributes and user attributes are registered at a local domain authority (LDA) for generating private and public keys using the hyperelliptic curve cryptography (HECC) algorithm, which ensures the legitimacy of the users and devices. Then, the IoT devices send a request message to the edge nodes (ENs) via a gateway, which performs request filtration by validating the user's authenticity. The filtered requests are sent to the edge server to perform access delegation using rock hyraxes swarm optimization (RHSO), which selects a set of delegator nodes. The access control decision is made by using the Trusted practical Byzantine fault tolerance (PBFT) consensus algorithm. The IoT data are stored in the cloud server for secure storage, in which the data are secured using a differential privacy mechanism. Finally, dual revocations, such as user attribute revocation and user revocation, are used to maintain security. The performance of DSA-Block is evaluated and the results demonstrate that the proposed DSA-Block model achieves superior performance compared to previous works.
引用
收藏
页码:4239 / 4256
页数:18
相关论文
共 50 条
  • [1] Secure Data Sharing: Blockchain-Enabled Data Access Control Framework for IoT
    Wei, Xin
    Yan, Yong
    Guo, Shaoyong
    Qiu, Xuesong
    Qi, Feng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8143 - 8153
  • [2] Blockchain-Enabled Secure and Trusted Federated Data Sharing in IIoT
    Zhou, Zhou
    Tian, Youliang
    Xiong, Jinbo
    Ma, Jianfeng
    Peng, Changgen
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (05) : 6669 - 6681
  • [3] Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme
    School of Computer Science and Communication Engineering, Jiangsu University, ZhenJiang, China
    不详
    [J]. J Syst Archit, 2024,
  • [4] Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme
    Xie, Qingqing
    Zhu, Fatong
    Feng, Xia
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 154
  • [5] Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing
    Fugkeaw, Somchart
    Wirz, Leon
    Hak, Lyhour
    [J]. IEEE ACCESS, 2023, 11 : 62998 - 63012
  • [6] Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0
    Hongmin Gao
    Pengfei Duan
    Xiaofeng Pan
    Xiaojing Zhang
    Keke Ye
    Ziyuan Zhong
    [J]. Journal of Cloud Computing, 13
  • [7] Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0
    Gao, Hongmin
    Duan, Pengfei
    Pan, Xiaofeng
    Zhang, Xiaojing
    Ye, Keke
    Zhong, Ziyuan
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [8] Study of Access Control Techniques on the Blockchain-enabled Secure Data Sharing Scheme in Edge Computing
    Mathur, Neha
    Sinha, Shweta
    Tyagi, Rajesh Kumar
    Jatana, Nishtha
    [J]. Recent Advances in Computer Science and Communications, 2024, 17 (08) : 1 - 13
  • [9] Trusted execution environment enabled dynamic group access control for data in cloud
    Li, Yue
    Song, Qipeng
    Jia, Hao
    Deng, Xin
    Ma, Jianfeng
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (04): : 194 - 205
  • [10] Secure data access using blockchain technology through IoT cloud and fabric environment
    Gupta, Sangeeta
    Chithaluru, Premkumar
    El Barachi, May
    Kumar, Manoj
    [J]. SECURITY AND PRIVACY, 2024, 7 (02)