Skip to main content

A Fine-Grained Access Control Framework for Data Sharing in IoT Based on IPFS and Cross-Blockchain Technology

  • Conference paper
  • First Online:
Smart Computing and Communication (SmartCom 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13828))

Included in the following conference series:

  • 829 Accesses

Abstract

Internet of Things (IoT) data from different trust domains is usually shared to assist in providing more services, where privacy sensitive information of shared data will be leaked or accessed without authorization. The traditional centralized access control method is difficult to adapt to the current dynamic and distributed large-scale IoT environment, and there is a risk of the single point of failure. To address these challenges, we propose a fine-grained access control framework for shared data based on cross-blockchain technology and Interplanetary File System (IPFS). In this framework, we firstly introduce a cross-blockchain module to realize cross-domain data sharing and solve the problem of data isolation between different data domains in IoT. Then IPFS is used to store the shared data, avoiding the risk of centralized storage. Combining symmetric encryption algorithm with ciphertext policy attribute based encryption (CP-ABE) algorithm, the fine-grained access control of shared data is guaranteed. In addition, the blockchain is applied to store the decryption key and the storage address of the original data, which records the authorization operation of access transactions and audits the access behavior of users. Experimental results show that the proposed scheme can provide higher performance compared to centralized access control methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gai, K., Choo, K.K.R., et al.: Privacy-preserving content-oriented wireless communication in internet-of-things. IEEE IoT J. 5(4), 3059–3067 (2018)

    Google Scholar 

  2. Qiu, M., Chen, Z., et al.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Syst. J. 11(2), 813–822 (2014)

    Article  Google Scholar 

  3. Li, J., Ming, Z., et al.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Arch. 57(9), 840–849 (2011)

    Article  Google Scholar 

  4. Fan, K., Tian, Q., Wang, J., et al.: Privacy protection based access control scheme in cloud-based services. China Commun. 14(1), 61–71 (2017)

    Article  Google Scholar 

  5. Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimedia Comput. Commun. Appl. (2016)

    Google Scholar 

  6. Qiu, H., Dong, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE IoT J. 8(13), 10327–10335 (2020)

    Google Scholar 

  7. Zhu, L., Wu, Y., Gai, K., et al.: Controllable and trustworthy blockchain-based cloud data management. Future Gener. Comput. Syst. 91, 527–535 (2019)

    Article  Google Scholar 

  8. Gai, K., Wu, Y., Zhu, L., et al.: Differential privacy-based blockchain for industrial internet-of-things. IEEE TII 16(6), 4156–4165 (2019)

    Google Scholar 

  9. Borkowski, M., Frauenthaler, P., Sigwart, M., et al.: Cross-blockchain technologies: review, state of the art, and outlook. White paper (2019)

    Google Scholar 

  10. Liu, X., Liu, J., Zhu, S., et al.: Privacy risk analysis and mitigation of analytics libraries in the android ecosystem. IEEE TMC 19(5), 1184–1199 (2019)

    Google Scholar 

  11. Li, L., Liu, J., Cheng, L., et al.: CreditCoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE TITS 19(7), 2204–2220 (2018)

    MathSciNet  Google Scholar 

  12. IPFS Homepage. http://ipfs.tech/. Accessed 29 Oct 2022

  13. Wang, W., Song, J., Xu, G., et al.: ContractWard: automated vulnerability detection models for Ethereum smart contracts. IEEE TNSE 8(2), 1133–1144 (2020)

    Google Scholar 

  14. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007)

    Google Scholar 

  15. Qiu, M., Gai, K., Xiong, Z.: Privacy-preserving wireless communications using bipartite matching in social big data. Future Gener. Comput. Syst. 87, 772–781 (2018)

    Article  Google Scholar 

  16. Zyskind, G., Nathan, O.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE Security and Privacy Workshops, pp. 180–184 (2015)

    Google Scholar 

  17. Wang, W., Shang, Y., He, Y., et al.: BotMark: automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf. Sci. 511, 284–296 (2020)

    Article  Google Scholar 

  18. Rahulamathavan, Y., Phan, R.C.W., Rajarajan, M., et al.: Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In: IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6 (2017)

    Google Scholar 

  19. Han, D., Zhu, Y., Li, D., et al.: A blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE TII 18(5), 3530–3540 (2021)

    Google Scholar 

  20. Li, T., Wang, H., He, D., et al.: Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE IoT J 9, 15138–15149 (2022)

    Google Scholar 

  21. Ren, W., Sun, Y., Luo, H., et al.: SILedger: a blockchain and ABE-based access control for applications in SDN-IoT networks. IEEE TNSM 18(4), 4406–4419 (2021)

    Google Scholar 

  22. Yu, G., Zha, X., Wang, X., et al.: Enabling attribute revocation for fine-grained access control in blockchain-IoT systems. IEEE T. Eng. Manag. 67(4), 1213–1230 (2020)

    Article  Google Scholar 

  23. Yi, L., Sun, Y., et al.: CCUBI: a cross-chain based premium competition scheme with privacy preservation for usage-based insurance. Int. J. Intell. Syst. 37, 11522–11546 (2022)

    Article  Google Scholar 

  24. Gai, K., She, Y., Zhu, L., et al.: A blockchain-based access control scheme for zero trust cross-organizational data sharing. ACM TOIT (2022)

    Google Scholar 

  25. WeCross Homepage. https://wecross.readthedocs.io/zh_CN/latest/. Accessed 29 Oct 2022

Download references

Acknowledgments

This work was supported by the National Key R &D Program of China under Grant 2020YFB1005604, the National Natural Science Foundation of China under Grant No.61902021 and No.62272031, the Beijing Natural Science Foundation under Grant No.4212008, the Open Foundation of Information Security Evaluation Center of Civil Aviation, Civil Aviation University of China under Grant No. ISECCA-202101.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Duan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cui, J., Duan, L., Li, M., Wang, W. (2023). A Fine-Grained Access Control Framework for Data Sharing in IoT Based on IPFS and Cross-Blockchain Technology. In: Qiu, M., Lu, Z., Zhang, C. (eds) Smart Computing and Communication. SmartCom 2022. Lecture Notes in Computer Science, vol 13828. Springer, Cham. https://doi.org/10.1007/978-3-031-28124-2_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28124-2_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28123-5

  • Online ISBN: 978-3-031-28124-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics