4.8 Article

A Blockchain-Based Auditable Access Control System for Private Data in Service-Centric IoT Environments

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 18, Issue 5, Pages 3530-3540

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2021.3114621

Keywords

Attribute-based access control; blockchain; data security; hyperledger fabric; IoT; smart contract

Funding

  1. National Natural Science Foundation of China [61873160, 61672338]
  2. Natural Science Foundation of Shanghai [21ZR1426500, TII-21-1231]

Ask authors/readers for more resources

This article proposes an auditable access control model based on attribute-based access control for managing private data's access control policy in IoT environments. A blockchain-based auditable access control system is also introduced to ensure data security and auditable access in IoT environments. Experimental results demonstrate high throughput and data security for real application scenarios.
Internet of Things (IoT) devices are widely considered in smart cities, intelligent medicine, and intelligent transportation, among other fields that facilitate people's lives, producing a large amount of private data. However, due to the mobility, limited performance, and distributed deployment of IoT, traditional access control methods cannot support the security of private data's access control process in current IoT environments. To address such problems, this article proposes an auditable access control model, based on an attribute-based access control model, and manages the access control policy for private data through the request record, the response record, and the access record stored in the blockchain network. Additionally, a Blockchain-based auditable access control system is also proposed based on the auditable access control model, ensuring private data security in IoT environments and realizing effective management and auditable access to these data. Experimental results show that the proposed system can maintain high throughput while ensuring private data security for real application scenarios in IoT environments.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available