Skip to main content
Log in

Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In order to solve the problem of data security and management between IoT edge nodes and massive heterogeneous devices, combined with the wide application of blockchain technology in distributed system data security management, a blockchain-based Internet of Things access control model (SC-ABAC) is proposed by combining smart contracts and attribute-based access control. The traditional consensus algorithm PoW (Proof of Work) and SC-ABAC access control management process are optimized. By quantitative analysis, the time to call contracts in the query process increases linearly, the time of the policy addition and judgment process is constant, and the energy consumption of the optimized consensus mechanism is smaller than that of the PoW unit. This model provides decentralized, fine-grained, and dynamic access control management in IoT environments, enabling distributed systems to reach consensus faster and ensure data consistency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

Not Applicable.

References

  1. Puliafito C, Mingozzi E, Anastasi G (2017) Fog computing for the internet of mobile things: issues and challenges. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP) (pp 1–6). IEEE. https://doi.org/10.1109/SMARTCOMP.2017.7947010

  2. Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646. https://doi.org/10.1109/JIOT.2016.2579198

    Article  Google Scholar 

  3. Yang Q, Lu R, Rong C, Challal Y, Laurent M, Wang S (2019) Guest editorial the convergence of blockchain and iot: opportunities, challenges and solutions. IEEE Internet Things J 6(3):4556–4560. https://doi.org/10.1109/JIOT.2019.2921235

    Article  Google Scholar 

  4. Hu VC, Kuhn DR, Ferraiolo DF et al (2015) Attribute-based access control [J]. Computer 48(2):85–88

    Article  Google Scholar 

  5. Dwivedi AD, Srivastava G, Dhar S, Singh R (2019) A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19(2):326. https://doi.org/10.3390/s19020326

    Article  Google Scholar 

  6. Lin C, He D, Kumar N, Huang X, Vijayakumar P, Choo KKR (2019) HomeChain: a blockchain-based secure mutual authentication system for smart homes. IEEE Internet Things J 7(2):818–829. https://doi.org/10.1109/JIOT.2019.2944400

    Article  Google Scholar 

  7. Ren Y, Leng Y, Cheng Y (2019) Secure data storage based on blockchain and coding in edge computing [J]. Math Biosci Eng 16(4):1874–1892. https://doi.org/10.3934/mbe.2019091

    Article  MathSciNet  Google Scholar 

  8. Tuli S, Mahmud R, Tuli S et al (2019) FogBus(2019): A blockchain-based lightweight framework for edge and fog computing [J]. J Syst Softw 154:22–36. https://doi.org/10.1016/j.jss.2019.04.050

    Article  Google Scholar 

  9. Ren Y, Zhu F, Sangaiah AK (2019) Identity management and access control based on blockchain under edge computing for the industrial internet of things. Appl Sci 9(10):2058. https://doi.org/10.3390/app9102058

    Article  Google Scholar 

  10. Omar YA, Goyal SB, Varadarajan V (2021) Apply blockchain technology for security of IoT devices. In: 2021 Emerging Trends in Industry 4.0 (ETI 4.0), 2021, pp. 1–6, https://doi.org/10.1109/ETI4.051663.2021.9619295

  11. Cheng GJ, Huang ZJ, Deng SG (2020) IoT data management based on blockchain and edge computing [J]. J Internet Things 4(02):1–9

    Google Scholar 

  12. Andaloussi Y, El Ouadghiri MD (2018) Access control in IoT environments: feasible scenarios. Procedia Comput Sci 130(2018):1031–1036. https://doi.org/10.1016/j.procs.2018.04.144

    Article  Google Scholar 

  13. Kumar R, Kumar P, Aljuhani A, Islam AKMN, Jolfaei A, Garg S (2022) Deep learning and smart contract-assisted secure data sharing for IoT-based intelligent agriculture. IEEE Intell Syst. https://doi.org/10.1109/MIS.2022.3201553

    Article  Google Scholar 

  14. Kumar P, Kumar R, Kumar A, Franklin AA, Garg S, Singh S (2022) Blockchain and deep learning for secure communication in digital twin empowered industrial IoT network. IEEE Trans Netw Sci Eng. https://doi.org/10.1109/TNSE.2022.3191601

    Article  Google Scholar 

  15. Nwosu AU, Goyal SB, Rajawat AS, Islam SMN, He J, Aslam M (2022) An innovative blockchain-based secured logistics management architecture: utilizing an RSA asymmetric encryption method. Mathematics 10(24):4670. https://doi.org/10.3390/math10244670

    Article  Google Scholar 

  16. Hieb J, Schreiver J, Graham J (2012) Using bloom filters to ensure access control and authentication requirements for SCADA field devices. In: Critical Infrastructure Protection VI: 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers 6 (pp 85-97). Springer Berlin Heidelberg

  17. Wang SY, Zou SH (2021) Blockchain and capability based access control mechanism in multi-domain IoT [J]. J Appl Sci Electron Inf Eng 39(01):55–69

    Google Scholar 

  18. Bedi P, Goyal SB, Kumar J, Kumar S (2021) Blockchain integrated framework for resolving privacy issues in smart city. In: Chakraborty C, Lin JCW, Alazab M (eds) Data-Driven Mining, Learning and Analytics for Secured Smart Cities. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-72139-8_6

  19. Zhang JG, Hu XH (2021) Research on improved access control mechanism of internet of things devices based on ethereum[J]. Comput Eng 47(4):32–39

    Google Scholar 

  20. Omar HOM, Goyal SB, Varadarajan V (2021) Application of sliding window deep learning for intrusion detection in fog computing. In: 2021 Emerging Trends in Industry 4.0 (ETI 4.0) (pp 1-6). IEEE. https://doi.org/10.1109/ETI4.051663.2021.9619421

  21. Rajawat AS, Bedi P, Goyal SB, Alharbi AR, Aljaedi A, Jamal SS, Shukla PK (2021) Fog big data analysis for IoT sensor application using fusion deep learning. Math Problems Eng 2021:1–16. https://doi.org/10.1155/2021/6876688

    Article  Google Scholar 

  22. Singh Rajawat A, Bedi P, Goyal SB, Shukla PK, Zaguia A, Jain A, Monirujjaman Khan M (2021) Reformist framework for improving human security for mobile robots in industry 4.0. Mobile Inf Syst 2021:1–10. https://doi.org/10.1155/2021/4744220

    Article  Google Scholar 

  23. Goyal SB, Bedi P, Kumar J et al (2021) Deep learning application for sensing available spectrum for cognitive radio: an ECRNN approach. Peer-to-Peer Netw Appl 14:3235–3249. https://doi.org/10.1007/s12083-021-01169-4

    Article  Google Scholar 

  24. Nwosu AU, Goyal SB, Bedi P (2021) Blockchain transforming cyber-attacks: healthcare industry. In: Innovations in Bio-Inspired Computing and Applications: Proceedings of the 11th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2020) held during December 16–18, 2020 11 (pp 258-266). Springer International Publishing. https://doi.org/10.1007/978-3-030-73603-3_24

  25. Goyal SB, Bedi P, Kumar J, Ankita (2022) Realtime accident detection and alarm generation system over IoT. In: Kumar R, Sharma R, Pattnaik PK (eds) Multimedia Technologies in the Internet of Things Environment, Volume 2. Studies in Big Data, vol 93. Springer, Singapore. https://doi.org/10.1007/978-981-16-3828-2_6

  26. Nyamtiga BW, Sicato JCS, Rathore S, Sung Y, Park JH (2019) HomeChain: a blockchain-based secure mutual authentication system for smart homes. Electronics 8(8):828. https://doi.org/10.3390/electronics8080828

    Article  Google Scholar 

  27. Ali G et al (2020) xDBAuth: blockchain based cross domain authentication and authorization framework for internet of things. IEEE Access 8:58800–58816. https://doi.org/10.1109/ACCESS.2020.2982542

    Article  Google Scholar 

  28. Nyame G, Qin Z, Obour Agyekum KOB, Sifah EB (2020) An ECDSA approach to access control in knowledge management systems using blockchain. Information 11(2):111. https://doi.org/10.3390/info11020111

    Article  Google Scholar 

Download references

Acknowledgements

Researchers appreciate the funding support provided by "Scientific research projects of Jilin Education Department in 2023. Project No.: JJKH20230022KJ

Funding

Scientific research projects of Jilin Education Department in 2023. Project No.: JJKH20230022KJ.

Author information

Authors and Affiliations

Authors

Contributions

CZ, SBG Conceptualization, Formal analysis, Methodology, Writing—original draft, Data curation, Investigation, Software, Validation; Visualization; SBG Supervision, Writing—review & editing; ASR and PS Resources, Project administration, Writing—review & editing- SBG;

Corresponding author

Correspondence to S. B. Goyal.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Ethical approval

The are no human and animal subjects in this article, and informed consent is not applicable.

Consent to participate

All authors consent to participate in this research work. This research work may not be of direct benefit to us. Our participation is completely voluntary.

Consent to publish

All authors give consent for the publication of the research paper in your esteemed journal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhonghua, C., Goyal, S.B. & Rajawat, A.S. Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. J Supercomput 80, 1396–1425 (2024). https://doi.org/10.1007/s11227-023-05517-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05517-4

Keywords

Navigation