Chrome Extension
WeChat Mini Program
Use on ChatGLM

Blockchain-Based Access Control Model for Security Attributes in the Internet of Things.

Xincheng Yan, Jianhua Wu, Na Zhou, Zhihong Jiang, Juqin Wu, Jianhui Yin,Ying Liu

IEEE/ACM International Conference on Green Computing and Communications(2023)

Cited 0|Views0
No score
Abstract
With smart devices and high-speed networks advancing rapidly, the Internet of Things (IoT) is widespread across sectors. However personal privacy becomes a concern within the vast expanse of IoT data in this more convenient era. Access control stands out as a pivotal technology for safeguarding data integrity, ensuring authorized user-exclusive data access. Attribute-based access control (ABAC), a traditional access control model, offers the key benefit of allowing access control based on multiple attributes for enhanced flexibility. However, ABAC model faces drawbacks like single points of failure and limited transparency due to its single-server focus, potentially leading to data vulnerabilities. As a promising technology, blockchain provides novel approaches for designing new access control models. In this regard, we propose a blockchain-based security access control (BBSAC) model. On the basis of ABAC, the model uses blockchain technology to realize the decentralization, automation and fine-grained access control of Internet devices. At the same time, the trust value is used as an additional attribute to evaluate the reputation of different users, and the trust value is updated after each interaction to assign different access rights to different users, thereby realizing dynamic rights management. Theoretical analysis and experimental simulation results show that the model can maintain high throughput under a large number of requests while ensuring fine-grained and dynamic access control.
More
Translated text
Key words
IoT,ABAC,blockchain,access control,automation
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined