Abstract
Access control face big challenges in IoT. Unfortunately, it is hard to implement current access control standards on smart object due to its constrained nature while the introduction of powerful and trusted third party to handle access control logic could harm user privacy. In this work we show how blockchain, the promising technology behind Bitcoin, can be very attractive to face those arising challenges. We therefore propose FairAccess as a new decentralized pseudonymous and privacy preserving authorization management framework that leverages the consistency of blockchain technology to manage access control on behalf of constrained devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
References
Vermesan, P., Friess, P., Guillemin, S., Gusmeroli, H., Sundmaeker, A., Bassi, I.S., Jubert, M., Mazura, M., Harrison, M.D.: Internet of things strategic research roadmap. In: Cluster of European Research Projects on the Internet of Things, CERP-IoT (2011)
SZABO, Nick: Formalizing and securing relationships on public networks. First Monday, 2(9) (1997)
Zhang, G., Tian, J.: An extended role based access control model for the Internet of Things. In: 2010 International Conference on Information Networking and Automation (ICINA), pp. V1-319–V1-323. IEEE, (2010)
Hernández-Ramos, J.L., Jara, A.J., Leandro, M., et al.: Dcapbac: embedding authorization logic into smart things through ecc optimizations. Int. J. Comput. Math. no ahead-of-print, 1–22 (2014)
Seitz, L., Selander, G., Gehrmann, C.: Authorization framework for the internet-of-things. In: 2013 IEEE 14th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6. IEEE (2013)
Hardt, D. (ed.): The OAuth 2.0 authorization framework. In: IETF, RFC6749, October 2012
Connect All IP-Based Smart Objects (CALIPSO)—FP7 EU Project [Online]. http://www.ict-calipso.eu/. Accessed 15 Oct 2014
Cirani, S., Picone, M., Gonizzi, P., Veltri, L., Ferrari, G.: Iot-oas: an OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens. J. 15(2), 1224–1234 (2015)
Sanjay, P., Sumabala, N., Paul, B., Pureswaran, V.: ADEPT: an IoT practitioner perspective, Draft copy for advance review. IBM (2015)
Zyskind, G., Nathan, O.: Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW), 2015 IEEE, pp. 180–184. IEEE (2015). Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ouaddah, A., Elkalam, A.A., Ouahman, A.A. (2017). Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT. In: Rocha, Á., Serrhini, M., Felgueiras, C. (eds) Europe and MENA Cooperation Advances in Information and Communication Technologies. Advances in Intelligent Systems and Computing, vol 520. Springer, Cham. https://doi.org/10.1007/978-3-319-46568-5_53
Download citation
DOI: https://doi.org/10.1007/978-3-319-46568-5_53
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46567-8
Online ISBN: 978-3-319-46568-5
eBook Packages: EngineeringEngineering (R0)