A Multi-User Collaborative Access Control Scheme Based on New Hash Chain

被引:0
|
作者
Wang, Zetian [1 ]
Li, Yunfa [2 ]
Liu, Guanxu [2 ]
Zhang, Di [2 ]
机构
[1] Hangzhou Dianzi Univ, HDU ITMO Joint Inst, Key Lab Complex Syst Modeling & Simulat, Hangzhou 310018, Peoples R China
[2] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Key Lab Complex Syst Modeling & Simulat, Hangzhou 310018, Peoples R China
关键词
blockchain; IoT; hash chain; access control; proof of work; AUTHENTICATION SCHEME;
D O I
10.3390/electronics12081792
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the threats to the Internet of Things (IoT) continue to increase, access control is widely used in various IoT information systems. However, due to the shortcomings of IoT devices such as low computing power, it is impossible to use high-performance methods to control user access. Although the emergence of the blockchain provides another way of thinking for access control, the implementation based on the blockchain requires the device to complete the proof of work (PoW) and requires the device to have high computing power. At the same time, most access control schemes existing today are intended for users to use alone, which cannot be applied to the field of multi-user coordinated access. Therefore, this paper proposes a multi-user collaborative access control scheme based on a new hash chain, which uses the identity information of multiple users as the seed value to construct the hash chain, and uses the hash chain as the PoW of the blockchain. An efficiency analysis showed that this method requires only a small amount of hash value calculation and can be applied to IoT systems with low computing power. The security analysis shows that the scheme can resist a variety of attack methods and has high security.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Hierarchical Role-Based Access Control for Multi-User Collaborative CAD Environment
    Teng C.-C.
    Mensah F.N.
    Ekstrom J.
    Helps R.
    Jensen C.G.
    Teng, Chia-Chi (ccteng@byu.edu), 1600, Bellwether Publishing, Ltd. (13) : 397 - 408
  • [2] Multi-user access control scheme based on resources hierarchies for perceptual layer of IoT
    Ma, Jun
    Guo, Yuan-Bo
    Ma, Jian-Feng
    Liu, Xi-Meng
    Li, Qi
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2014, 42 (01): : 28 - 35
  • [3] An Access Control Method Supporting Multi-User Collaborative Edit in Cloud Storage
    Shi J.
    Huang C.
    He K.
    Shen X.
    Hua C.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2017, 54 (07): : 1603 - 1616
  • [4] Research on Multi-user Access Control Scheme for Private Cloud in Space Control Center
    Liang, Min
    Zhang, Hui
    Gao, Fei
    Wang, Hao
    Wei, Jun
    Huang, Ming
    2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 558 - 564
  • [5] New Multi-User OFDM Scheme: Braided Code Division Multiple Access
    Tavares, Marcos B. S.
    Lentmaier, Michael
    Zigangirov, Kamil Sh.
    Fettweis, Gerhard P.
    2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 963 - +
  • [6] An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function
    Das, Ashok Kumar
    Goswami, Adrijit
    Odelu, Vanga
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 12 (02) : 129 - 151
  • [7] A Multi-User Access Scheme for Throughput Enhancement in UDN with NOMA
    Liu, Yiming
    Li, Xi
    Ji, Hong
    Zhang, Heli
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2017, : 1364 - 1369
  • [8] Multi-User Searchable hncryption Scheme with General Access Structure
    Zirtol, Kobra Amiri
    Noroozi, Mahnaz
    Eslami, Ziba
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 398 - 403
  • [9] Multi-user collaborative interface
    Yang, Qiang
    Liu, Jie
    Zou, Yu
    Qin, Yongqiang
    Yu, Chun
    Shi, Yuanchun
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2015, 41 (03): : 424 - 430
  • [10] Access control for adaptive reservations on multi-user systems
    Cucinotta, Tommaso
    PROCEEDINGS OF THE 14TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, 2008, : 387 - 396