An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT

被引:5
|
作者
Mihaljevic, Miodrag J. [1 ,2 ]
Knezevic, Milica [2 ]
Urosevic, Dragan [2 ]
Wang, Lianhai [1 ]
Xu, Shujiang [1 ]
机构
[1] Qilu Univ Technol, Shandong Acad Sci, Shandong Prov Key Lab Comp Networks, Jinan 250014, Peoples R China
[2] Serbian Acad Arts & Sci, Math Inst, Belgrade 11000, Serbia
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 02期
关键词
IoT; data access control; broadcast encryption; blockchain; Ethereum platform; SCHEME; STORAGE;
D O I
10.3390/sym15020299
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This paper considers the problem of data access control when the subscribers are IoT devices with initialization that cannot be updated during the entire life cycle. A generic framework and a particular instance for conditional data access control within IoT are proposed. The generic framework is based on the employment of a dedicated secret key-based broadcast encryption scheme where encrypted credentials for conditional data access is available in the blockchain and encrypted data subject to conditional access are available in an off-chain source of streaming data. Reduction of the keys management overhead in comparison with a straightforward decryption keys delivery is experimentally illustrated. An instance of the proposed framework built over the Ethereum blockchain platform is developed and experimentally evaluated.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] IoT Access Control Model Based on Blockchain and Trusted Execution Environment
    Jiang, Weijin
    Li, En
    Zhou, Wenying
    Yang, Ying
    Luo, Tiantian
    PROCESSES, 2023, 11 (03)
  • [22] A Review on Blockchain-based Access Control Models in IoT Applications
    Zhang, Yunpeng
    Memariani, Ali
    Bidikar, Nirupam
    2020 IEEE 16TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION (ICCA), 2020, : 671 - 676
  • [23] A novel broadcast encryption based on time-bound cryptographic keys
    Mihaljevic, Miodrag J.
    Fossorier, Marc P. C.
    Imai, Hideki
    DIGITAL RIGHTS MANAGEMENT: TECHNOLOGIES, ISSUES, CHALLENGES AND SYSTEMS, 2006, 3919 : 258 - 276
  • [24] An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption
    Hu, Ronglei
    Ma, Ziwei
    Li, Li
    Zuo, Peiliang
    Li, Xiuying
    Wei, Jiaxin
    Liu, Sihui
    SENSORS, 2023, 23 (19)
  • [25] EnC-IoT: An Efficient Encryption and Access Control Framework based on IPFS for Decentralized IoT
    Song, Mansub
    Lee, Minji
    Kim, Sunggon
    Eom, Hyeonsang
    Son, Yongseok
    2024 IEEE 24TH INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING, CCGRID 2024, 2024, : 425 - 434
  • [26] Verifiable Dynamic Searchable Symmetric Encryption Based on Blockchain
    Xu W.-S.
    Zhang J.-B.
    Yuan Y.-L.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (11): : 5392 - 5407
  • [27] Blockchain-based searchable symmetric encryption scheme
    Li, Huige
    Tian, Haibo
    Zhang, Fangguo
    He, Jiejie
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 : 32 - 45
  • [28] Access control mechanism for the Internet of Things based on blockchain and inner product encryption
    Han, Pengchong
    Zhang, Zhouyang
    Ji, Shan
    Wang, Xiaowan
    Liu, Liang
    Ren, Yongjun
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [29] Blockchain-Based Searchable Encryption Access Control Mechanism for the Internet of Things
    Li, Mengyuan
    Guo, Shaoyong
    Li, Wengjing
    Xiong, Ao
    Wang, Dong
    Li, Da
    Qi, Feng
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 258 - 268
  • [30] Role based access control using identity and broadcast based encryption for securing cloud data
    Urvashi Rahul Saxena
    Taj Alam
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 171 - 182