Loading [MathJax]/extensions/MathZoom.js
Enabling Attribute Revocation for Fine-Grained Access Control in Blockchain-IoT Systems | IEEE Journals & Magazine | IEEE Xplore

Enabling Attribute Revocation for Fine-Grained Access Control in Blockchain-IoT Systems


Abstract:

The attribute-based encryption (ABE) has drawn a lot of attention for fine-grained access control in blockchains, especially in blockchain-enabled tampering-resistant Int...Show More
Topic: Blockchain Ecosystem: Technological and Management Challenges and Opportunities

Abstract:

The attribute-based encryption (ABE) has drawn a lot of attention for fine-grained access control in blockchains, especially in blockchain-enabled tampering-resistant Internet-of-Things (IoT) systems. However, its adoption has been severely hindered by the incompatibility between the immutability of typical blockchains and the attribute updates/revocations of ABE. In this article, we propose a new blockchain-based IoT system, which is compatible with the ABE technique, and fine-grained access control is implemented with the attribute update enabled by integrating Chameleon Hash algorithms into the blockchains. We design and implement a new verification scheme over a multilayer blockchain architecture to guarantee the tamper resistance against malicious and abusive tampering. The system can provide an update-oriented access control, where historical on-chain data can only be accessible to new members and inaccessible to the revoked members. This is distinctively different from existing solutions, which are threatened by data leakage toward the revoked members. We also provide analysis and simulations showing that our system outperforms other solutions in terms of overhead, searching complexity, security, and compatibility.
Topic: Blockchain Ecosystem: Technological and Management Challenges and Opportunities
Published in: IEEE Transactions on Engineering Management ( Volume: 67, Issue: 4, November 2020)
Page(s): 1213 - 1230
Date of Publication: 10 February 2020

ISSN Information:

Funding Agency:

References is not available for this document.

I. Introduction

The Internet of Things (IoT) technology is reshaping manufacturing and industrial processes [1]. Massive data from smart machines can reduce cost, benefit production, and assist in deriving accurate business decisions and have attracted increasing attention. The massive data need to be accessible by specific groups of users among many different entities. Fine-grained access control is important, especially with the fast development of the IoT and the increasing number of devices and users [2], [3]. Existing solutions tend to rely on the cloud service to maintain data storage for access control services [4]. However, there exist the following critical issues.

Amazon Cloud Service, Microsoft Azure, and Alicloud suffered from the service outage from 2017 to 2019, leading to the huge losses of data service for customers [5]–[7].

The public cloud, the private cloud, and the hybrid cloud hardly tolerate the Byzantine Failure  [8]. The Byzantine Failure takes malicious nodes into account, which is the most complicated failure mode in a distributed system [9].

The cloud services lack trustworthy tamper resistance for data storage and access control [10].

Select All
1.
K. R. Choo, S. Gritzalis and J. H. Park, "Cryptographic solutions for industrial Internet-of-things: Research challenges and opportunities", IEEE Trans. Ind. Inform., vol. 14, no. 8, pp. 3567-3569, Aug. 2018.
2.
K. L. Lueth, "State of the IoT 2018: Number of IoT devices now at 7B—Market accelerating", 2018, [online] Available: https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of- iot-devices-now-7b/.
3.
I. Ali, S. Sabir and Z. Ullah, "Internet of things security device authentication and access control: A review", 2019, [online] Available: http://arxiv.org/abs/1901.07309.
4.
"Cloud computing trends: 2019 state of the cloud survey", 2019, [online] Available: https://blogs.flexera.com/cloud/cloud-industry-insights/cloud-computing -trends-2019-state-of-the-cloud-survey/.
5.
"Summary of the Amazon S3 service disruption in the Northern Virginia (US-EAST-1) region", 2017, [online] Available: https://aws.amazon.com/message/41926/.
6.
S. Moss, "Microsoft Azure suffers outage after cooling issue", 2018, [online] Available: https://https://www.datacenterdynamics.com/news/microsoft-azure-suffers -outage-after-cooling-issue/.
7.
F. Yingwei, "Alibaba cloud reports IO hang error in north china", 2019, [online] Available: https://equalocean.com/technology/20190303-alibaba-cloud-reports-io-han g-error-in-north-china.
8.
R. Jhawar and V. Piuri, "Fault tolerance management in IAAS clouds", Proc. IEEE 1st AESS Eur. Conf. Satell. Telecommun., pp. 1-6, Oct. 2012.
9.
L. Lamport, R. Shostak and M. Pease, "The byzantine generals problem", ACM Trans. Program. Lang. Syst., vol. 4, no. 3, pp. 382-401, Jul. 1982.
10.
M. Ma, G. Shi and F. Li, "Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario", IEEE Access, vol. 7, pp. 34045-34059, 2019.
11.
A. Ouaddah, A. A. Elkalam and A. A. Ouahman, "Towards a novel privacy-preserving access control model based on blockchain technology in IoT" in Europe and MENA Cooperation Advances in Information and Communication Technologies, New York, NY, USA:Springer, pp. 523-533, 2017.
12.
O. Novo, "Blockchain meets IoT: An architecture for scalable access management in IoT", IEEE Internet Things J., vol. 5, no. 2, pp. 1184-1195, Apr. 2018.
13.
R. Li, T. Song, B. Mei, H. Li, X. Cheng and L. Sun, "Blockchain for large-scale Internet of things data storage and protection", IEEE Trans. Services Comput., vol. 12, no. 5, pp. 762-771, Sep./Oct. 2019.
14.
X. Wang et al., "Survey on blockchain for Internet of things", Comput. Commun., vol. 136, pp. 10-29, 2019.
15.
S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system", 2008, [online] Available: http://bitcoin.org/bitcoin.pdf.
16.
G. Wood et al., "Ethereum: A secure decentralised generalised transaction ledger", Ethereum Project Yellow Paper, vol. 151, pp. 1-32, 2014.
17.
Q. Lin, H. Yan, Z. Huang, W. Chen, J. Shen and Y. Tang, "An ID-based linearly homomorphic signature scheme and its application in blockchain", IEEE Access, vol. 6, pp. 20632-20640, 2018.
18.
I. Miers, C. Garman, M. Green and A. D. Rubin, "Zerocoin: Anonymous distributed e-cash from bitcoin", Proc. IEEE Symp. Secur. Privacy, pp. 397-411, May 2013.
19.
D. Yang, J. Gavigan and Z. Wilcox-OHearn, "Survey of confidentiality and privacy preserving technologies for blockchains", Nov. 2016.
20.
"Transaction confidentiality", 2016, [online] Available: https://openblockchain.readthedocs.io/en/latest.
21.
S. Wang, Y. Zhang and Y. Zhang, "A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems", IEEE Access, vol. 6, pp. 38437-38450, 2018.
22.
Y. Rahulamathavan, R. C.-W. Phan, M. Rajarajan, S. Misra and A. Kondoz, "Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption", Proc. IEEE Int. Conf. Adv. Netw. Telecommun. Syst., pp. 1-6, Dec. 2017.
23.
Z. C. Q. Wen, Y. Guo and D. Wu, "A blockchain-based data sharing scheme in the supply chain by IIoT", Proc. Int. Conf. Ind. Cyber-Phys. Syst., pp. 683-688, 2019.
24.
B. Anggorojati, P. N. Mahalle, N. R. Prasad and R. Prasad, "Capability-based access control delegation model on the federated IoT network", Proc. 15th Int. Symp. Wireless Pers. Multimedia Commun., pp. 604-608, Sep. 2012.
25.
L. Yeh, P. Chiang, Y. Tsai and J. Huang, "Cloud-based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revocation", IEEE Trans. Cloud Comput., vol. 6, no. 2, pp. 532-544, Apr. 2018.
26.
Y. Chen, W. Sun, N. Zhang, Q. Zheng, W. Lou and Y. T. Hou, "Towards efficient fine-grained access control and trustworthy data processing for remote monitoring services in IoT", IEEE Trans. Inf. Forensics Secur., vol. 14, no. 7, pp. 1830-1842, Jul. 2019.
27.
S. Roy, A. K. Das, S. Chatterjee, N. Kumar, S. Chattopadhyay and J. J. P. C. Rodrigues, "Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications", IEEE Trans. Ind. Inform., vol. 15, no. 1, pp. 457-468, Jan. 2019.
28.
G. Fedrecheski, L. C. C. De Biase, P. C. Calcina-Ccori and M. K. Zuffo, "Attribute-based access control for the swarm with distributed policy management", IEEE Trans. Consum. Electron., vol. 65, no. 1, pp. 90-98, Feb. 2019.
29.
R. Li, H. Asaeda and J. Li, "A distributed publisher-driven secure data sharing scheme for information-centric IoT", IEEE Internet Things J., vol. 4, no. 3, pp. 791-803, Jun. 2017.
30.
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proc. IEEE Symp. Secur. Privacy, pp. 321-334, May 2007.
Contact IEEE to Subscribe

References

References is not available for this document.