scholarly journals Blockchain Platforms and Access Control Classification for IoT Systems

Symmetry ◽  
2020 ◽  
Vol 12 (10) ◽  
pp. 1663
Author(s):  
Adam Ibrahim Abdi ◽  
Fathy Elbouraey Eassa ◽  
Kamal Jambi ◽  
Khalid Almarhabi ◽  
Abdullah Saad AL-Malaise AL-Ghamdi

The Internet of Things paradigm is growing rapidly. In fact, controlling this massive growth of IoT globally raises new security and privacy issues. The traditional access control mechanisms provide security to IoT systems such as DAC (discretionary access control) and mandatory access control (MAC). However, these mechanisms are based on central authority management, which raises some issues such as absence of scalability, single point of failure, and lack of privacy. Recently, the decentralized and immutable nature of blockchain technology integrated with access control can help to overcome privacy and security issues in the IoT. This paper presents a review of different access control mechanisms in IoT systems. We present a comparison table of reviewed access control mechanisms. The mechanisms’ scalability, distribution, security, user-centric, privacy and policy enforcing are compared. In addition, we provide access control classifications. Finally, we highlight challenges and future research directions in developing decentralized access control mechanisms for IoT systems.

Author(s):  
Ashok Kumar Yadav

Unprecedented advancement in wireless technology, storage, and computing power of portable devices with the gigabyte speed of internet connectivity enables the possibility of communication among machine to machine. IoT has a different way to connect many nodes simultaneously to store, access, and share the information to improve the quality of life by the elimination of the involvement of human. Irrespective of unlimited benefit, IoT has so many issues that arise to eclipse IoT in reality because of its centralized model. Scalability, reliability, privacy, and security challenges are rising because of the huge numbers of IoT nodes, centralized architecture, and complex networks. Centralized architecture may lead to problems like a single point of failure, single way traffic, huge infrastructure cost, privacy, security, and single source of trust. Therefore, to overcome the issues of the centralized infrastructure of the IoT, the authors diverted to decentralized infrastructure. It may be the best decision in terms of performance, reliability, security, privacy, and trust. Blockchain is an influential latest decentralization technology to decentralize computation, process management, and trust. A combination of blockchain with IoT may have the potential to solve scalability, reliability, privacy, and security issues of IoT. This chapter has an overview of some important consensus algorithms, IoT challenges, integration of the blockchain with IoT, its challenges, and future research issues of a combination of blockchain and IoT are also discussed.


2021 ◽  
Vol 7 ◽  
pp. e455
Author(s):  
Mohammed Amine Bouras ◽  
Boming Xia ◽  
Adnan Omer Abuassba ◽  
Huansheng Ning ◽  
Qinghua Lu

Access control is a critical aspect for improving the privacy and security of IoT systems. A consortium is a public or private association or a group of two or more institutes, businesses, and companies that collaborate to achieve common goals or form a resource pool to enable the sharing economy aspect. However, most access control methods are based on centralized solutions, which may lead to problems like data leakage and single-point failure. Blockchain technology has its intrinsic feature of distribution, which can be used to tackle the centralized problem of traditional access control schemes. Nevertheless, blockchain itself comes with certain limitations like the lack of scalability and poor performance. To bridge the gap of these problems, here we present a decentralized capability-based access control architecture designed for IoT consortium networks named IoT-CCAC. A blockchain-based database is utilized in our solution for better performance since it exhibits favorable features of both blockchain and conventional databases. The performance of IoT-CCAC is evaluated to demonstrate the superiority of our proposed architecture. IoT-CCAC is a secure, salable, effective solution that meets the enterprise and business’s needs and adaptable for different IoT interoperability scenarios.


Author(s):  
Sourav Banerjee ◽  
Debashis Das ◽  
Manju Biswas ◽  
Utpal Biswas

Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Even though it's based on secure technology, a blockchain needs protection as well. The risks of exploits, targeted attacks, or unauthorized access can be mitigated by the instant incident response and system recovery. Blockchain technology relies on a ledger to keep track of all financial transactions. Ordinarily, this kind of master ledger would be a glaring point of vulnerability. Another tenet of security is the chain itself. Configuration flaws, as well as insecure data storage and transfers, may cause leaks of sensitive information. This is even more dangerous when there are centralized components within the platform. In this chapter, the authors will demonstrate where the disadvantages of security and privacy in blockchain are currently and discuss how blockchain technology can improve these disadvantages and outlines the requirements for future solution.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Xiaofeng Lu ◽  
Songbing Fu ◽  
Cheng Jiang ◽  
Pietro Lio

IoT technology has been widely valued and applied, and the resulting massive IoT data brings many challenges to the traditional centralized data management, such as performance, privacy, and security challenges. This paper proposes an IoT data access control scheme that combines attribute-based encryption (ABE) and blockchain technology. Symmetric encryption and ABE algorithms are utilized to realize fine-grained access control and ensure the security and openness of IoT data. Moreover, blockchain technology is combined with distributed storage to solve the storage bottleneck of blockchain systems. Only the hash values of the data, the hash values of the ciphertext location, the access control policy, and other important information are stored on the blockchain. In this scheme, smart contract is used to implement access control. The results of experiments demonstrate that the proposed scheme can effectively protect the security and privacy of IoT data and realize the secure sharing of data.


Author(s):  
Sourav Banerjee ◽  
Debashis Das ◽  
Manju Biswas ◽  
Utpal Biswas

Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Even though it's based on secure technology, a blockchain needs protection as well. The risks of exploits, targeted attacks, or unauthorized access can be mitigated by the instant incident response and system recovery. Blockchain technology relies on a ledger to keep track of all financial transactions. Ordinarily, this kind of master ledger would be a glaring point of vulnerability. Another tenet of security is the chain itself. Configuration flaws, as well as insecure data storage and transfers, may cause leaks of sensitive information. This is even more dangerous when there are centralized components within the platform. In this chapter, the authors will demonstrate where the disadvantages of security and privacy in blockchain are currently and discuss how blockchain technology can improve these disadvantages and outlines the requirements for future solution.


Author(s):  
Sushruta Mishra ◽  
Soumya Sahoo ◽  
Brojo Kishore Mishra

In the IoTs era, the short-range mobile transceivers will be implanted in a variety of daily requirements. In this chapter, a detail survey in several security and privacy concerns related to internet of things (IoTs) by defining some open challenges are discussed. The privacy and security implications of such an evolution should be carefully considered to the promising technology. The protection of data and privacy of users has been identified as one of the key challenges in the IoT. In this chapter, the authors present internet of things with architecture and design goals. They survey security and privacy concerns at different layers in IoTs. In addition, they identify several open issues related to the security and privacy that need to be addressed by research community to make a secure and trusted platform for the delivery of future internet of things. The authors also discuss applications of IoTs in real life. A novel approach based on cognitive IoT is presented, and a detailed study is undertaken. In the future, research on the IoTs will remain a hot issue.


Author(s):  
Ryno Adlam ◽  
Bertram Haskins

The centralised architecture employed by electronic health records (EHRs) may constitute a single point of failure. From the perspective of availability, an alternative cloud-based EHR infrastructure is effective and efficient. However, this increased availability has created challenges related to the security and privacy of patients’ medical records. The sensitive nature of EHRs attracts the attention of cyber-criminals. There has been a rise in the number of data breaches related to EHRs. The infrastructure used by EHRs does not assure the privacy and security of patients’ medical records. Features of blockchain platforms, such as decentralisation, immutability, auditability, and transparency, may provide a viable means of augmenting or improving services related to the security of EHRs. This study presents a series of experimental data flow configurations to test the application of blockchain technology to aspects of EHRs. The insights gained from these experiments are founded on a theoretical base to provide recommendations for applying blockchain technology to services related to the security of EHR infrastructure. These recommendations may be employed by developers when redesigning existing EHR systems or deploying new EHR systems.


10.29007/jlq6 ◽  
2019 ◽  
Author(s):  
Thabang Mofokeng

The technology devices introduced in recent years are not only vulnerable to Internet risks but are also unable to elevate the growth of B2C e-commerce. These concerns are particularly relevant today, as the world transitions into the Fourth Industrial Revolution. To date, existing research has largely focused on obstacles to customer loyalty. Studies have tested e-commerce models guided by the establishment of trusting, satisfied and loyal consumers in various international contexts. In South Africa, however, as an emerging market, there has been limited research on the success factors of online shopping.This study examines the influence of security and privacy on trust, seen as a moderator of customer satisfaction, which in turn, has an effect on loyalty towards websites. Based on an exhaustive review of literature, a conceptual model is proposed on the relationships between security and privacy on the one hand, and customer trust, satisfaction and loyalty on the other. A total of 250 structured, self-administered questionnaires was distributed to a purposively selected sample of respondents using face-to-face surveys in Johannesburg, South Africa. A multivariate data analysis technique was used to draw inferences from the data. With an 80.1% response rate, the findings showed that privacy and security do influence customer trust; security strongly influences customer trust and weakly influences satisfaction. In South Africa, customer loyalty towards websites is strongly determined by satisfaction and weakly determined by trust. Trust significantly moderates the effect of customer satisfaction on loyalty. The study implications and limitations are presented and future research directions are suggested.


2021 ◽  
Vol 54 (3) ◽  
pp. 1-35
Author(s):  
Boubakr Nour ◽  
Hakima Khelifi ◽  
Rasheed Hussain ◽  
Spyridon Mastorakis ◽  
Hassine Moungla

Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC . Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


Sign in / Sign up

Export Citation Format

Share Document