基于区块链的物联网数据访问控制方案
Blockchain-Based IoT Data Access Control Scheme
摘要: 在万物互联的时代背景下,物联网飞速发展,无论从局部设备数量还是整体规模都呈现高速增长的趋势,随之而来的数据安全问题也日益凸显。属性基加密(ABE)是保护数据安全的核心技术之一。但是,将属性基加密方案应用到物联网环境中仍然面临着许多挑战。属性基加密基于双线性配对实现,这种基于线性配对实现的加密是是开销很高的操作,不适合资源受限的物联网设备。为了解决这个问题,本文提出了一种基于区块链的物联网数据访问控制方案,该方案借助智能合约技术,将属性基加密中开销高的双线性配对操作外包至区块链中执行,进行预解密,然后在本地验证区块链预解密的正确性,从而减轻了用户端的计算压力,解决了属性基加密应用于物联网环境开销高的问题,实现了轻量级的访问控制。安全分析结果表明,该方案在数据机密性、防篡改攻击和抵抗合谋攻击方面是可靠的。
Abstract: In the era of the Internet of Everything, the IoT has developed rapidly, showing a rapid growth trend in both the number of local devices and the overall scale, and the accompanying data security issues have become increasingly prominent. Attribute-based encryption (ABE) is one of the core technologies to protect data security. However, applying attribute-based encryption schemes to the Internet of Things environment still faces many challenges. Attribute-based encryption is implemented based on bilinear pairing, which is considered to be an expensive operation and is not suitable for resource-constrained IoT devices. In order to solve this problem, this paper proposes a blockchain-based IoT data access control scheme. Through smart contract technology, the bilinear pairing operation with high cost in attribute-based encryption is outsourced to the blockchain for execution, and predecryption is performed and then locally verifies the correctness of blockchain predecryption, thereby reducing the computational pressure on the user side, solving the problem of high cost of attribute-based encryption applied to the IoT environment, and realizing light-level access control. The security analysis results show that the scheme is reliable in terms of data confidentiality, anti-tampering attacks and resistance to collusion attacks.
文章引用:朱帅禎, 曹丽. 基于区块链的物联网数据访问控制方案[J]. 计算机科学与应用, 2022, 12(8): 1913-1921. https://doi.org/10.12677/CSA.2022.128192

参考文献

[1] Nakamoto, S. (2008) Bitcoin: A Peer-to-Peer Electronic Cash System.
https://bitcoin.org/bitcoin.pdf
[2] Zheng, Z., Xie, S., Dai, H., Chen, X. and Wang, H. (2017) An Overview of Blockchain Technology: Architecture, Consensus and Future Trends. 2017 IEEE International Congress on Big Data, Honolulu, 25-30 June 2017, 557-564. [Google Scholar] [CrossRef
[3] Wang, Q., Zhu, X.Q., Ni, Y.Y., Gu, L. and Zhu, H.B. (2010) Blockchain for the IoT and Industrial IoT: A Review. Internet of Things, 10, Article No. 100081. [Google Scholar] [CrossRef
[4] Sharma, A., Schuhknecht, F.M., Agrawal, D. and Dittrich, J. (2019) Blurring the Lines between Blockchains and Database Systems: The Case of Hyperledger Fabric. Proceedings of the 2019 International Conference on Management of Data (SIGMOD’19), 105-122. [Google Scholar] [CrossRef
[5] Androulaki, E., Barger, A., Bortnikov, V., et al. (2018) Hy-perledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proceedings of the Thirteenth EuroSys Conference (EuroSys’18), 1-15. [Google Scholar] [CrossRef
[6] Zyskind, G., Nathan, O., et al. (2015) Decentralizing Privacy: Us-ing Blockchain to Protect Personal Data. 2015 IEEE Security and Privacy Workshops, San Jose, 21-22 May 2015, 180-184. [Google Scholar] [CrossRef
[7] Shafagh, H., Burkhalter, L., Hithnawi, A. and Duquennoy, S. (2017) Towards Blockchain-Based Auditable Storage and Sharing of IoT Data. 2017 on Cloud Computing Security Workshop, 45-50. [Google Scholar] [CrossRef
[8] Ouaddah, A., Elkalam, A.A. and Ouahman, A.A. (2017) FairAc-cess: A New Blockchain-Based Access Control Framework for the Internet of Things. Security and Communication Networks, 9, 5943-5964. [Google Scholar] [CrossRef
[9] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X. and Wan, J. (2019) Smart Con-tract-Based Access Control for the Internet of Things. IEEE Internet of Things Journal, 6, 1594-1605. [Google Scholar] [CrossRef
[10] Liu, H., Han, D. and Li, D. (2020) Fabric-iot: A Block-chain-Based Access Control System in IoT. IEEE Access, 8, 18207-18218. [Google Scholar] [CrossRef
[11] Ding, S., Cao, J., Li, C., Fan, K. and Li, H. (2019) A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access, 7, 38431-38441. [Google Scholar] [CrossRef
[12] Sahai, A. and Waters, B. (2005) Fuzzy Identity-Based En-cryption. In: Cramer, R., Ed., Advances in Cryptology—EUROCRYPT 2005, Vol. 3494, Springer, Berlin, Heidelberg, 457-473. [Google Scholar] [CrossRef
[13] Bethencourt, J., Sahai, A. and Waters, B. (2007) Cipher-text-Policy Attribute-Based Encryption. 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, 20-23 May 2007, 321-334. [Google Scholar] [CrossRef