Abstract
Internet of Things (IoT) data from different trust domains is usually shared to assist in providing more services, where privacy sensitive information of shared data will be leaked or accessed without authorization. The traditional centralized access control method is difficult to adapt to the current dynamic and distributed large-scale IoT environment, and there is a risk of the single point of failure. To address these challenges, we propose a fine-grained access control framework for shared data based on cross-blockchain technology and Interplanetary File System (IPFS). In this framework, we firstly introduce a cross-blockchain module to realize cross-domain data sharing and solve the problem of data isolation between different data domains in IoT. Then IPFS is used to store the shared data, avoiding the risk of centralized storage. Combining symmetric encryption algorithm with ciphertext policy attribute based encryption (CP-ABE) algorithm, the fine-grained access control of shared data is guaranteed. In addition, the blockchain is applied to store the decryption key and the storage address of the original data, which records the authorization operation of access transactions and audits the access behavior of users. Experimental results show that the proposed scheme can provide higher performance compared to centralized access control methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gai, K., Choo, K.K.R., et al.: Privacy-preserving content-oriented wireless communication in internet-of-things. IEEE IoT J. 5(4), 3059–3067 (2018)
Qiu, M., Chen, Z., et al.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Syst. J. 11(2), 813–822 (2014)
Li, J., Ming, Z., et al.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Arch. 57(9), 840–849 (2011)
Fan, K., Tian, Q., Wang, J., et al.: Privacy protection based access control scheme in cloud-based services. China Commun. 14(1), 61–71 (2017)
Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimedia Comput. Commun. Appl. (2016)
Qiu, H., Dong, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE IoT J. 8(13), 10327–10335 (2020)
Zhu, L., Wu, Y., Gai, K., et al.: Controllable and trustworthy blockchain-based cloud data management. Future Gener. Comput. Syst. 91, 527–535 (2019)
Gai, K., Wu, Y., Zhu, L., et al.: Differential privacy-based blockchain for industrial internet-of-things. IEEE TII 16(6), 4156–4165 (2019)
Borkowski, M., Frauenthaler, P., Sigwart, M., et al.: Cross-blockchain technologies: review, state of the art, and outlook. White paper (2019)
Liu, X., Liu, J., Zhu, S., et al.: Privacy risk analysis and mitigation of analytics libraries in the android ecosystem. IEEE TMC 19(5), 1184–1199 (2019)
Li, L., Liu, J., Cheng, L., et al.: CreditCoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE TITS 19(7), 2204–2220 (2018)
IPFS Homepage. http://ipfs.tech/. Accessed 29 Oct 2022
Wang, W., Song, J., Xu, G., et al.: ContractWard: automated vulnerability detection models for Ethereum smart contracts. IEEE TNSE 8(2), 1133–1144 (2020)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007)
Qiu, M., Gai, K., Xiong, Z.: Privacy-preserving wireless communications using bipartite matching in social big data. Future Gener. Comput. Syst. 87, 772–781 (2018)
Zyskind, G., Nathan, O.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE Security and Privacy Workshops, pp. 180–184 (2015)
Wang, W., Shang, Y., He, Y., et al.: BotMark: automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf. Sci. 511, 284–296 (2020)
Rahulamathavan, Y., Phan, R.C.W., Rajarajan, M., et al.: Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In: IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6 (2017)
Han, D., Zhu, Y., Li, D., et al.: A blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE TII 18(5), 3530–3540 (2021)
Li, T., Wang, H., He, D., et al.: Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE IoT J 9, 15138–15149 (2022)
Ren, W., Sun, Y., Luo, H., et al.: SILedger: a blockchain and ABE-based access control for applications in SDN-IoT networks. IEEE TNSM 18(4), 4406–4419 (2021)
Yu, G., Zha, X., Wang, X., et al.: Enabling attribute revocation for fine-grained access control in blockchain-IoT systems. IEEE T. Eng. Manag. 67(4), 1213–1230 (2020)
Yi, L., Sun, Y., et al.: CCUBI: a cross-chain based premium competition scheme with privacy preservation for usage-based insurance. Int. J. Intell. Syst. 37, 11522–11546 (2022)
Gai, K., She, Y., Zhu, L., et al.: A blockchain-based access control scheme for zero trust cross-organizational data sharing. ACM TOIT (2022)
WeCross Homepage. https://wecross.readthedocs.io/zh_CN/latest/. Accessed 29 Oct 2022
Acknowledgments
This work was supported by the National Key R &D Program of China under Grant 2020YFB1005604, the National Natural Science Foundation of China under Grant No.61902021 and No.62272031, the Beijing Natural Science Foundation under Grant No.4212008, the Open Foundation of Information Security Evaluation Center of Civil Aviation, Civil Aviation University of China under Grant No. ISECCA-202101.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Cui, J., Duan, L., Li, M., Wang, W. (2023). A Fine-Grained Access Control Framework for Data Sharing in IoT Based on IPFS and Cross-Blockchain Technology. In: Qiu, M., Lu, Z., Zhang, C. (eds) Smart Computing and Communication. SmartCom 2022. Lecture Notes in Computer Science, vol 13828. Springer, Cham. https://doi.org/10.1007/978-3-031-28124-2_41
Download citation
DOI: https://doi.org/10.1007/978-3-031-28124-2_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28123-5
Online ISBN: 978-3-031-28124-2
eBook Packages: Computer ScienceComputer Science (R0)