4.8 Article

Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 10, 期 5, 页码 4239-4256

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3217087

关键词

Blockchains; Internet of Things; Access control; Security; Cloud computing; Performance evaluation; Encryption; Access delegation; blockchain; edge computing; Internet of Things (IoT); practical Byzantine fault tolerance (PBFT) consensus; revocation; secure data sharing

向作者/读者索取更多资源

This research proposes a dynamic secure access control using the blockchain (DSA-Block) model, which ensures secure access control and data sharing. The model registers IoT device attributes and user attributes at a local domain authority (LDA) using the hyperelliptic curve cryptography (HECC) algorithm to ensure user and device legitimacy. Requests from IoT devices are filtered by edge nodes (ENs) and access delegation is performed using rock hyraxes swarm optimization (RHSO). Trusted practical Byzantine fault tolerance (PBFT) consensus algorithm is used for access control decision-making. The proposed DSA-Block model achieves superior performance compared to previous works.
The Internet of Things (IoT) is vulnerable to leakage of private information during data sharing. To avoid this problem, access control and secure data sharing have been introduced in IoT; however, many challenges are faced because of centralized access control and single delegator selection. Additionally, blockchain is integrated into IoT to enhance the security of the environment. For that purpose, this research proposes dynamic secure access control using the blockchain (DSA-Block) model, which performs secure access control and data sharing. Initially, the IoT device attributes and user attributes are registered at a local domain authority (LDA) for generating private and public keys using the hyperelliptic curve cryptography (HECC) algorithm, which ensures the legitimacy of the users and devices. Then, the IoT devices send a request message to the edge nodes (ENs) via a gateway, which performs request filtration by validating the user's authenticity. The filtered requests are sent to the edge server to perform access delegation using rock hyraxes swarm optimization (RHSO), which selects a set of delegator nodes. The access control decision is made by using the Trusted practical Byzantine fault tolerance (PBFT) consensus algorithm. The IoT data are stored in the cloud server for secure storage, in which the data are secured using a differential privacy mechanism. Finally, dual revocations, such as user attribute revocation and user revocation, are used to maintain security. The performance of DSA-Block is evaluated and the results demonstrate that the proposed DSA-Block model achieves superior performance compared to previous works.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据