Affiliation:
1. School of Computer Science, Hunan University of Technology and Business, Changsha 410205, China
2. School of Computer Science and Engineering, Hunan University of Information Technology, Changsha 410151, China
3. Tan Zhou Academy, Xiangtan Institute of Technology, Xiangtan 411100, China
Abstract
With the application and popularization of the Internet of Things (IoT), while the IoT devices bring us intelligence and convenience, the privacy protection issue has gradually attracted people’s attention. Access control technology is one of the important methods to protect privacy. However, the existing IoT access control technologies have extensive problems such as coarse-grainedness, weak auditability, lack of access process control, and excessive privileges, which make the security and privacy of our IoT devices face great threats. Based on this, a blockchain-based and encrypted currency-based access control model CcBAC supported by Trusted Execution Environment (TEE) technology is proposed, which can provide fine-graininess, strong auditability, and access procedure control for the Internet of Things. In this study, the technical principle, characteristics, and research status of the control model are introduced, and the framework of the CcBAC model is expounded in detail and formally defined. Moreover, the functions in the model are described in detail, and a specific access control process in general scenarios is presented for the model. Finally, the practicability of this model is verified through theoretical analysis and experimental evaluation, which proves that this model not only enables resource owners to fully control the access to their resources, but also takes into account the fine-graininess and auditable access control.
Funder
National Natural Science Foundation of China
Natural Science Foundation of Hunan Province of China
Education Department of Hunan Province of China
Subject
Process Chemistry and Technology,Chemical Engineering (miscellaneous),Bioengineering
Reference40 articles.
1. A survey on security and privacy issues in edge-computing-assisted internet of things;Alwarafy;IEEE Internet Things J.,2020
2. Survey of IoT security research: Threats, detection and defense;Yang;J. Commun.,2021
3. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices;Meneghello;IEEE Internet Things J.,2019
4. IoT Security Knowledge Reasoning Method of Multi-Source Data Fusion;Shuqin;J. Comput. Res. Dev.,2022
5. Survey on Internet of Things Access Control Security;Liu;J. Comput. Res. Dev.,2022
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献