首页 » 文章 » 文章详细信息
International Journal of Distributed Sensor Networks Volume 14 ,Issue 11 ,2018-11-01
A privacy-preserving Internet of Things device management scheme based on blockchain
Trust and Privacy in Blockchain Enabled Internet of Things - Research Article
Qingsu He 1 , 2 , 3 Yu Xu 1 , 2 , 3 Zhoubin Liu 4 Jinhong He 1 , 2 , 3 You Sun 5 , 6 Rui Zhang 5 , 6
Show affiliations
DOI:10.1177/1550147718808750
Received 2018-6-26, accepted for publication 2018-9-18, Published 2018-9-18
PDF
摘要

Blockchain as a new technique has attracted attentions from industry and academics for sharing data across organizations. Many blockchain-based data sharing applications, such as Internet of Things devices management, need privacy-preserving access services over encrypted data with dual capabilities. On one hand, they need to keep the sensitive data private such that others cannot trace and infer sensitive data stored in the block. On the other hand, they need to support fine-grained access control both from time and users’ attributes. However, to the best of our knowledge, no blockchain systems can support time-bound and attributes-based access with high efficiency. In this article, we propose a privacy-preserving Internet of Things devices management scheme based on blockchain, which provides efficient time-bound and attribute-based access and supports key automatic revocation. The analysis and experiments show that our scheme is quite efficient and deployable.

关键词

Internet of Things device management;time-bound key management;attribute-based encryption;Blockchain

授权许可

© The Author(s) 2018
This article is distributed under the terms of the Creative Commons Attribution 4.0 License (http://www.creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access pages (https://us.sagepub.com/en-us/nam/open-access-at-sage).

通讯作者

Yu Xu.State Grid Electronic Commerce Co. Ltd. (State Grid Xiongan Financial Technology Group Co. Ltd.), Beijing, China;State Grid Power Finance and Electronic Commerce Lab, Beijing, China;State Grid Huitong Financial Information Technology Co. Ltd., Beijing, China.xuyu@sgec.sgcc.com.cn

推荐引用方式

Qingsu He,Yu Xu,Zhoubin Liu,Jinhong He,You Sun,Rui Zhang. A privacy-preserving Internet of Things device management scheme based on blockchain. International Journal of Distributed Sensor Networks ,Vol.14, Issue 11(2018)

您觉得这篇文章对您有帮助吗?
分享和收藏
0

是否收藏?

参考文献
[1] S. Nakamoto Bitcoin: a peer-to-peer electronic cash system, 2008, www.bitcoin.org
[2] K Christidis, M. Devetsikiotis Blockchains and smart contracts for the Internet of Things. IEEE Access 2016; 4: 2292–2303.
[3] J Bethencourt, A Sahai, B Waters. Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE symposium on security and privacy (SP’07), Berkeley, CA, 20–23 May 2007, pp.321–334. New York: IEEE.
[4] DDF Maesa, P Mori, L Ricci. Blockchain based access control. In: 17th IFIP WG 6.1 international conference, DAIS 2017, 19–22 June 2017, pp.206–220. Switzerland: Springer.
[5] M Castro, B Liskov. Practical Byzantine fault tolerance. In: OSDI’99 proceedings of the third symposium on operating systems design and implementation, New Orleans, LA, 22–25 February 1999. Berkeley, CA: USENIX Association.
[6] V Goyal, O Pandey, A Sahai. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13Th ACM conference on computer and communications security (CCS’06), Alexandria, VA, 30 October–3 November 2006, pp.89–98. New York: ACM.
[7] Y Rahulamathavan, RC Phan, S Misra. Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In: IEEE international conference on advanced networks and telecommunications systems (ANTS) 2017, 17–20 December 2017. India: IEEE.
[8] A Sahai, B. Waters Fuzzy identity-based encryption. In: Annual international conference on theory and application of cryptographic techniques, Aarhus, 22–26 May 2005, pp.457–473. Berlin: Springer.
[9] E Bertino, N Shang, SS Wagstaff An efficient time-bound hierarchical key management scheme for secure broadcasting. IEEE T Depend Secure 2008; 5(2): 65–70.
[10] S Alansari, F Paci, A Margheri. Privacy-preserving access control in cloud federations. In: IEEE international conference on cloud computing (CLOUD), Honolulu, HI, 25–30 June 2017, pp.757–760. New York: IEEE.
[11] TF Xue, QC Fu, C Wang. A medical data sharing model via blockchain. Acta Autom Sinic 2017; 43(9): 1555–1562.
[12] D Johnson, A Menezes, S. Vanstone The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 2001; 1(1): 36–63.
[13] A Ouaddah, AA Elkalam, AA. Ouahman Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: RochaÁSerrhiniMFelgueirasC (eds) Europe and MENA cooperation advances in information and communication technologies. Cham: Springer, 2017, pp.523–533.
[14] A Ouaddah, I Bouij-Pasquier, AA Elkalam. Security analysis and proposal of new access control model in the internet of thing. In: International conference on electrical and information technologies, Marrakech, Morocco, 25–27 March 2015, pp.30–35. New York: IEEE.
[15] VC Hu, D Ferraiolo, R Kuhn. Guide to attribute based access control (ABAC) definition and considerations, 2013, https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=915660
[16] G Zyskind, O Nathan, A. Pentland Decentralizing privacy: using blockchain to protect personal data. In: IEEE security and privacy workshops, San Jose, CA, 21–22 May 2015, pp.180–184. New York: IEEE.
[17] S Alansari, F Paci, V Sassone. A distributed access control system for cloud federations. In: IEEE international conference on distributed computing systems (ICDCS), Atlanta, GA, 5–8 June 2017, pp.2131–2136. New York: IEEE.
[18] A Ekblaw, A Azaria, JD Halamka. A case study for blockchain in healthcare: “MedRec” prototype for electronic health records and medical research data. White Paper, August2016, https://www.healthit.gov/sites/default/files/5-56-onc_blockchainchallenge_mitwhitepaper.pdf
[19] A Ouaddah, AA Elkalam, AA. Ouahman FairAccess: a new blockchain-based access control framework for the Internet of Things. Secur Commun Netw 2016; 9: 5943–5964.
[20] Smart contracts, http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart.contracts.html
[21] A Outchakoucht, H Es-Samaali, JP. Leroy Dynamic access control policy based on blockchain and machine learning for the Internet of Things. Int J Adv Comput Sci Appl 2017; 8(7): 417–424.
[22] A Ouaddah, H Mousannif, AA Elkalam. Access control in the Internet of Things: big challenges and new opportunities. Comput Netw 2017; 112: 237–262.
[23] A Dorri, SS Kanhere, R Jurdak. Blockchain for IoT security and privacy: the case study of a smart home. In: IEEE international conference on pervasive computing and communications workshops (PerCom Workshops), Kona, HI, 13–17 March 2017. New York: IEEE.
[24] A Azaria, A Ekblaw, T Vieira. MedRec: using blockchain for medical data access and permission management. In: International conference on open and big data, Vienna, 22–24 August 2016, pp.25–30. New York: IEEE.