Abstract
The application scenarios of edge-cloud collaboration are very wide. In order to ensure the operational security of resource sharing among intelligent terminals in edge-cloud collaboration scenarios, and prevent unauthorized entities from accessing sensitive data, a blockchain-based access control protocol for secure resource sharing is proposed. For the characteristics of edge-cloud collaborative application scenarios, the attribute authentication, secure storage, intra-domain access control, inter-domain access control and dynamic update of access permissions are studied in this paper. The proposed protocol has the following advantages. (1) Privacy protection: in the edge-cloud collaborative application scenario, the privacy of mobile terminals is easily leaked. The access control technology with hidden attributes is adopted, which can not only achieve the purpose of access control, but also ensure that the identity and attribute information of terminals are not leaked; (2) cross-domain access control: edge-cloud collaborative application scenarios, resource sharing among terminals may span multiple different security domains, and the proposed protocol supports cross-domain access control; (3) dynamic access control: some mobile terminals may frequently join or exit some application scenarios, the access permissions of these terminals can be dynamically updated using blockchain in this protocol; (4) fine-grained access control: the permissions for access resources are set by the combination of attribute permissions of the terminals. The terminal can access a variety of resources by setting different combinations of its attribute permissions. The performance analysis shows that compared with the cited literatures, the proposed protocol has advantages in terms of computational time, computational complexity and communication overhead.
Similar content being viewed by others
References
Chang J, Ni J, Xiao J et al (2021) SynergyChain: a multichain-based data sharing framework with hierarchical access control. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2021.3061687
Gao S, Piao G, Zhu J et al (2020) Trustaccess: a trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain. IEEE Trans Veh Technol 69(6):5784–5798. https://doi.org/10.1109/TVT.2020.2967099
Guo L, Yang X, Yau WC (2021) TABE-DAC: efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain. IEEE Access 9:8479–8490. https://doi.org/10.1109/ACCESS.2021.3049549
Gupta M, Awaysheh FM, Benson J et al (2020) An attribute-based access control for cloud enabled industrial smart vehicles. IEEE Trans Ind Inform 17(6):4288–4297. https://doi.org/10.1109/TII.2020.3022759
Huang K, Wang X, Lin Z (2021) Practical multiauthority attribute-based access control for edge-cloud-aided internet of things. Secur Commun Netw. https://doi.org/10.1155/2021/8872699
Huang Q, Yue W, Yang Y et al (2021) P2gt: fine-grained genomic data access control with privacy-preserving testing in cloud computing. IEEE/ACM Trans Comput Biol Bioinform. https://doi.org/10.1109/TCBB.2021.3063388
Kumar R, Tripathi R (2021) Scalable and secure access control policy for healthcare system using blockchain and enhanced Bell–LaPadula model. J Ambient Intell Humaniz Comput 12(2):2321–2338. https://doi.org/10.1007/s12652-020-02346-8
Li Y, Yao S, Zhang R et al (2021) Analyzing host security using D-S evidence theory and multisource information fusion. Int J Intell Syst 36(2):1053–1068. https://doi.org/10.1002/int.22330
Li Y, Wang X, Shi Z et al (2022) Boosting training for pdf malware classifier via active learning. Int J Intell Syst 37(4):2803–2821. https://doi.org/10.1002/int.22451
Lu X, Fu S, Jiang C et al (2021) A fine-grained IoT data access control scheme combining attribute-based encryption and blockchain. Secur Commun Netw. https://doi.org/10.1155/2021/5308206
Ma Y, Shen M, Zhao Y et al (2021) Opponent portrait for multiagent reinforcement learning in competitive environment. Int J Intell Syst 36(12):7461–7474. https://doi.org/10.1002/int.22594
Ostad-Ali-Askari K, Shayannejad M, Ghorbanizadeh-Kharazi H (2017) Artificial neural network for modeling nitrate pollution of groundwater in marginal area of Zayandeh-rood River, Isfahan, Iran. KSCE J Civ Eng 21(1):134–140. https://doi.org/10.1007/s12205-016-0572-8
Połap D (2019) Analysis of skin marks through the use of intelligent things. IEEE Access 7:149355–149363. https://doi.org/10.1109/ACCESS.2019.2947354
Połap D, Srivastava G, Yu K (2021) Agent architecture of an intelligent medical system based on federated learning and blockchain technology. J Inf Secur Appl 58(102):748. https://doi.org/10.1016/j.jisa.2021.102748
Rana S, Mishra D (2021) An authenticated access control framework for digital right management system. Multimedia Tools Appl 80(16):25255–25270. https://doi.org/10.1007/s11042-021-10813-3
Ren W, Sun Y, Luo H et al (2021) SILedger: a blockchain and ABE-based access control for applications in SDN-IoT networks. IEEE Trans Netw Serv Manag 18(4):4406–4419. https://doi.org/10.1109/TNSM.2021.3093002
Rouhani S, Belchior R, Cruz RS et al (2021) Distributed attribute-based access control system using permissioned blockchain. World Wide Web 24(5):1617–1644. https://doi.org/10.1007/s11280-021-00874-7
Sabitha S, Rajasree M (2021) Multi-level on-demand access control for flexible data sharing in cloud. Clust Comput 24(2):1455–1478. https://doi.org/10.1007/s10586-020-03195-y
Xu Z, Shen J, Liang F et al (2021) Fine-grained access control scheme based on improved proxy re-encryption in cloud. J Adv Comput Intell Intell Inform 25(2):170–176. https://doi.org/10.20965/jaciii.2021.p0170
Xue Y, Xue K, Gai N et al (2019) An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Trans Inf Forensics Secur 14(11):2927–2942. https://doi.org/10.1109/TIFS.2019.2911166
Yang W, Wang N, Guan Z et al (2022) A practical cross-device federated learning framework over 5g networks. IEEE Wirel Commun. https://doi.org/10.1109/MWC.005.2100435
Zhang N, Xue J, Ma Y et al (2021) Hybrid sequence-based android malware detection using natural language processing. Int J Intell Syst 36(10):5770–5784. https://doi.org/10.1002/int.22529
Zhang Q, Yong G, Ruifang W et al (2018) Inter-cluster asymmetric group key agreement. J Comput Res Dev 55(12):2651. https://doi.org/10.7544/issn1000-1239.2018.20170651
Zhang Q, Li Y, Wang R et al (2021) Data security sharing model based on privacy protection for blockchain-enabled industrial internet of things. Int J Intell Syst 36(1):94–111. https://doi.org/10.1002/int.22293
Zhang Q, Zhu L, Wang R et al (2021) Group key agreement protocol among terminals of the intelligent information system for mobile edge computing. Int J Intell Syst. https://doi.org/10.1002/int.22544
Zhang Q, Zhu L, Li Y et al (2022) A group key agreement protocol for intelligent internet of things system. Int J Intell Syst 37(1):699–722. https://doi.org/10.1002/int.22644
Zhang Y, Li B, Liu B et al (2020) An attribute-based collaborative access control scheme using blockchain for iot devices. Electronics 9(2):285. https://doi.org/10.3390/electronics9020285
Acknowledgements
This work was supported by Shandong Provincial Key Research and Development Program (2021CXGC010106), the National Natural Science Foundation of China under Grant (nos. 61876019, 62072037, U1936218, 61772477). In part by Fundamental Research Funds for Beijing Universities of Civil Engineering and Architecture (no. X20069), the key technologies R&D Program of Henan Province (nos. 212102210089, 212102210171, 212102210075).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sun, H., Tan, Ya., Zhu, L. et al. A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration. J Ambient Intell Human Comput 14, 13661–13672 (2023). https://doi.org/10.1007/s12652-022-04020-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-022-04020-7