Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Blockchain-based access control for dynamic device management in microgrid

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Microgrid is a self-sufficient grid system that covers one or more kinds of distributed energy, where a variety of terminal devices collect, transmit and store electricity data based on fog-based network infrastructure. Due to security and privacy concerns, efficient and secure access control over terminal devices in microgrid is the primary way to prevent unauthorized access and data breach. Therefore, a number of solutions of device management are proposed. However, they are usually prone to single point of failure, decision-centralized, over-manual intervened. To address the problem, we introduce a blockchain-based fast and dynamic access control (FDAC) system for device management in fog-assisted microgrid. In particular, we adopt an attribute-based access control formula to model a flexible, dynamic and fast fine-grained access control system. FDAC deploys four smart contracts that dynamically manages devices, which includes user authentication, subject/object attributes, access policy, decision-making and credit assessment of user behavior. In addition, FDAC employs a Cuckoo filter to speed up policy search in smart contracts and proposes new credit verification algorithm to improve credit rewards and punishments. To clarify practical performance, we build a private blockchain platform to simulate FDAC. Compared to classic traversal approaches for policy search, FDAC maintains higher accuracy and lower time delay.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani M (2017) Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wirel Commun 24(3):10–16

    Article  Google Scholar 

  2. Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: Enablers, architecture, and business models. IEEE J Sel Areas Commun 34(3):510–527

    Article  Google Scholar 

  3. D’Orazio CJ, Choo KKR, Yang LT (2016) Data exfiltration from internet of things devices: ios devices as case studies. IEEE Internet of Things J 4(2):524–535

    Article  Google Scholar 

  4. https://www.sans.org/industrial-control-systems-security/

  5. Underwood S (2016) Blockchain beyond bitcoin. Commun ACM 59(11):15–17

    Article  Google Scholar 

  6. Osborn S, Sandhu R, Munawer Q (2000) Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security (TISSEC) 3(2):85–106

    Article  Google Scholar 

  7. Sandhu R (1998) Role-based access control. vol 46, Elsevier, pp 237–248

  8. Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40–48

    Article  Google Scholar 

  9. Yavari A, Panah AS, Georgakopoulos D, Jayaraman PP, van Schyndel R (2017) Scalable role-based data disclosure control for the internet of things. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), IEEE, pp 2226–2233

  10. Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things. Math Comput Model 58(5–6):1189–1205

    Article  Google Scholar 

  11. Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2013) Identity authentication and capability based access control (iacac) for the internet of things. J Cyber Sec Mobility 1(4):309–348

    Google Scholar 

  12. Hu VC, Ferraiolo D, Kuhn R, Friedman AR, Lang AJ, Cogdell MM, Schnitzer A, Sandlin K, Miller R, Scarfone K et al (2013) Guide to attribute based access control (abac) definition and considerations (draft). NIST Spec Publ 800(162):1–54

    Google Scholar 

  13. Ye N, Zhu Y, Wang Rc, Malekian R, Lin Qm (2014) An efficient authentication and access control scheme for perception layer of internet of things

  14. Bhatt S, Patwa F, Sandhu R (2017) Access control model for aws internet of things. In: International Conference on Network and System Security, Springer, pp 721–736

  15. Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for iot security and privacy: The case study of a smart home. In: 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops), IEEE, pp 618–623

  16. Zyskind G, Nathan O et al (2015) Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops, IEEE, pp 180–184

  17. Maesa DDF, Mori P, Ricci L (2017) Blockchain based access control. In: IFIP international conference on distributed applications and interoperable systems, Springer, pp 206–220

  18. Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594–1605

    Article  Google Scholar 

  19. Sifah EB, Xia Q, Agyekum KOBO, Amofa S, Gao J, Chen R, Xia H, Gee JC, Du X, Guizani M (2018) Chain-based big data access control infrastructure. J Supercomput 74(10):4945–4964

    Article  Google Scholar 

  20. Saini A, Zhu Q, Singh N, Xiang Y, Gao L, Zhang Y (2020) A smart-contract-based access control framework for cloud smart healthcare system. IEEE Internet Things J 8(7):5914–5925

    Article  Google Scholar 

  21. Zhang Y, Yutaka M, Sasabe M, Kasahara S (2020) Attribute-based access control for smart cities: A smart-contract-driven framework. IEEE Internet Things J 8(8):6372–6384

    Article  Google Scholar 

  22. Qashlan A, Nanda P, He X (2020) Security and privacy implementation in smart home: Attributes based access control and smart contracts. 2020 IEEE 19th International Conference on Trust. Security and Privacy in Computing and Communications (TrustCom), IEEE, pp 951–958

    Google Scholar 

  23. Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) Fairaccess: a new blockchain-based access control framework for the internet of things. Sec Com Netw 9(18):5943–5964

    Article  Google Scholar 

  24. Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: Using blockchain for medical data access and permission management. In: 2016 2nd international conference on open and big data (OBD), IEEE, pp 25–30

  25. Pinno OJA, Gregio ARA, De Bona LC (2017) Controlchain: Blockchain as a central enabler for access control authorizations in the iot. In: GLOBECOM 2017-2017 IEEE Global Communications Conference, IEEE, pp 1–6

  26. Ferdous MS, Margheri A, Paci F, Yang M, Sassone V (2017) Decentralised runtime monitoring for access control systems in cloud federations. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), IEEE, pp 2632–2633

  27. Novo O (2018) Blockchain meets iot: An architecture for scalable access management in iot. IEEE Internet Things J 5(2):1184–1195

    Article  Google Scholar 

  28. Xu R, Chen Y, Blasch E, Chen G (2018) Blendcac: A smart contract enabled decentralized capability-based access control mechanism for the iot. Computers 7(3):39

    Article  Google Scholar 

  29. Song L, Li M, Zhu Z, Yuan P, He Y (2020) Attribute-based access control using smart contracts for the internet of things. Proc Comp Sci 174:231–242

    Article  Google Scholar 

  30. Zhang Y, Li B, Liu B, Wu J, Wang Y, Yang X (2020) An attribute-based collaborative access control scheme using blockchain for iot devices. Electronics 9(2):285

    Article  Google Scholar 

  31. Rouhani S, Belchior R, Cruz RS, Deters R (2021) Distributed attribute-based access control system using permissioned blockchain. World Wide Web 24(5):1617–1644

    Article  Google Scholar 

  32. Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review p 21260

  33. Introduction to smart contracts, https://solidity.readthedocs.io/en/v0.5.6/introduction-to-smart-contracts.html/, [online]

  34. Yang XS, Deb S (2010) Engineering optimisation by cuckoo search. Int J Math Model Numer Optim 1(4):330–343

  35. Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Cryptographers track at the RSA conference, Springer, pp 376–392

  36. geth-go implementaion of ethereum protocol, https://github.com/ethereum/go-ethereum

  37. remix- ide for smart contract deployment provided by ethereum, https://remix.ethereum.org/

  38. web3 javascript api to interact with ethreum nodes, https://github.com/ethereum/wiki/wiki/javascript-api

  39. Fan B, Andersen DG, Kaminsky M, Mitzenmacher MD (2014) Cuckoo filter: Practically better than bloom. In: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, pp 75–88

Download references

Funding

This work was supported by National Natural Science Foundation of China (61802248, 61972094, 62032005, 62102089), the “Chenguang Program” supported by Shanghai Municipal Education Commission (No.18CG62), Program of Shanghai Academic Research Leader (No.21XD1421500), the Fundamental Research Funds for the Central Universities (2042021kf1030).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianting Ning.

Ethics declarations

Conflict of interest

The authors declare that they do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, K., Yu, J., Lin, C. et al. Blockchain-based access control for dynamic device management in microgrid. Peer-to-Peer Netw. Appl. 15, 1653–1668 (2022). https://doi.org/10.1007/s12083-022-01316-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01316-5

Keywords

Navigation