Nothing Special   »   [go: up one dir, main page]

Skip to main content

Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT

  • Conference paper
  • First Online:
Europe and MENA Cooperation Advances in Information and Communication Technologies

Abstract

Access control face big challenges in IoT. Unfortunately, it is hard to implement current access control standards on smart object due to its constrained nature while the introduction of powerful and trusted third party to handle access control logic could harm user privacy. In this work we show how blockchain, the promising technology behind Bitcoin, can be very attractive to face those arising challenges. We therefore propose FairAccess as a new decentralized pseudonymous and privacy preserving authorization management framework that leverages the consistency of blockchain technology to manage access control on behalf of constrained devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://www.storj.io.

  2. 2.

    http://www.onename.com/.

References

  1. Vermesan, P., Friess, P., Guillemin, S., Gusmeroli, H., Sundmaeker, A., Bassi, I.S., Jubert, M., Mazura, M., Harrison, M.D.: Internet of things strategic research roadmap. In: Cluster of European Research Projects on the Internet of Things, CERP-IoT (2011)

    Google Scholar 

  2. SZABO, Nick: Formalizing and securing relationships on public networks. First Monday, 2(9) (1997)

    Google Scholar 

  3. Zhang, G., Tian, J.: An extended role based access control model for the Internet of Things. In: 2010 International Conference on Information Networking and Automation (ICINA), pp. V1-319–V1-323. IEEE, (2010)

    Google Scholar 

  4. Hernández-Ramos, J.L., Jara, A.J., Leandro, M., et al.: Dcapbac: embedding authorization logic into smart things through ecc optimizations. Int. J. Comput. Math. no ahead-of-print, 1–22 (2014)

    Google Scholar 

  5. Seitz, L., Selander, G., Gehrmann, C.: Authorization framework for the internet-of-things. In: 2013 IEEE 14th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6. IEEE (2013)

    Google Scholar 

  6. Hardt, D. (ed.): The OAuth 2.0 authorization framework. In: IETF, RFC6749, October 2012

    Google Scholar 

  7. Connect All IP-Based Smart Objects (CALIPSO)—FP7 EU Project [Online]. http://www.ict-calipso.eu/. Accessed 15 Oct 2014

  8. Cirani, S., Picone, M., Gonizzi, P., Veltri, L., Ferrari, G.: Iot-oas: an OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens. J. 15(2), 1224–1234 (2015)

    Article  Google Scholar 

  9. Sanjay, P., Sumabala, N., Paul, B., Pureswaran, V.: ADEPT: an IoT practitioner perspective, Draft copy for advance review. IBM (2015)

    Google Scholar 

  10. Zyskind, G., Nathan, O.: Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW), 2015 IEEE, pp. 180–184. IEEE (2015). Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aafaf Ouaddah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ouaddah, A., Elkalam, A.A., Ouahman, A.A. (2017). Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT. In: Rocha, Á., Serrhini, M., Felgueiras, C. (eds) Europe and MENA Cooperation Advances in Information and Communication Technologies. Advances in Intelligent Systems and Computing, vol 520. Springer, Cham. https://doi.org/10.1007/978-3-319-46568-5_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46568-5_53

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46567-8

  • Online ISBN: 978-3-319-46568-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics