skip to main content
10.1145/3360774.3360794acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobiquitousConference Proceedingsconference-collections
research-article
Public Access

PPCA: privacy-preserving conditional actions for IoT environments using smart contracts

Published: 03 February 2020 Publication History

Abstract

Automated tasks play an important role in both consumer and industrial IoT environments. In many scenarios, the IoT tasks are performed given certain conditions. To facilitate the tasks, it is necessary to delegate a third party to listen to events that trigger the conditions and issue commands to the IoT resources accordingly. However, without restriction, the third party may be over-privileged and able to control the resources unconditionally. We define the third party's permission to act under some conditions as a conditional action. We propose PPCA, a privacy-preserving service that allows users to create conditional actions in a decentralized platform using smart contracts. PPCA can guarantee strict privilege at the third party that holds conditional actions. By generalizing a variety of conditions into simple forms of conditional logic, the conditions can be verified in a privacy-preserving manner. We build a prototype of PPCA on Ethereum. The performance shows the feasibility of PPCA in IoT environments.

References

[1]
[n. d.]. https://ifttt.com/discover.
[2]
[n.d.]. https://github.com/solidblu1992/RingCTToken.
[3]
[n.d.]. https://zapier.com.
[4]
[n. d.]. https://flow.microsoft.com.
[5]
[n. d.]. https://slock.it.
[6]
Michael P Andersen, John Kolb, Kaifei Chen, Gabriel Fierro, David E Culler, and Raluca Ada Popa. 2017. Wave: A decentralized authorization system for iot via blockchain smart contracts. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2017-234 (2017).
[7]
Mic Bowman, Andrea Miele, Michael Steiner, and Bruno Vavala. 2018. Private data objects: an overview. arXiv preprint arXiv:1807.05686 (2018).
[8]
Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, and Dan Boneh. [n. d.]. Zether: Towards Privacy in a Smart Contract World.
[9]
Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, and Greg Maxwell. 2018. Bulletproofs: Short proofs for confidential transactions and more. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 315--334.
[10]
Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, and Dawn Song. 2018. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. CoRR abs/1804.05141 (2018). arXiv:1804.05141 http://arxiv.org/abs/1804.05141
[11]
Ali Dorri, Salil S Kanhere, Raja Jurdak, and Praveen Gauravaram. 2017. Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops). IEEE, 618--623.
[12]
Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S Matthew Weinberg, and Edward W Felten. 2018. Arbitrum: Scalable, private smart contracts. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1353--1370.
[13]
A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou. 2016. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In 2016 IEEE Symposium on Security and Privacy (SP). 839--858.
[14]
Tam Le and Matt W Mutka. 2018. CapChain: A Privacy Preserving Access Control Framework Based on Blockchain for Pervasive Environments. In 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, 57--64.
[15]
Greg Maxwell. 2015. Confidential transactions (2015). URL: https://github.com/ElementsProject/elementsproject.github.io/blob/master/confidential_values.md (2015).
[16]
Gregory Maxwell, Andrew Poelstra, Yannick Seurin, and Pieter Wuille. 2018. Simple schnorr multi-signatures with applications to bitcoin. Designs, Codes and Cryptography (2018), 1--26.
[17]
Sarah Meiklejohn and Rebekah Mercer. 2018. Möbius: Trustless tumbling for transaction privacy. Proceedings on Privacy Enhancing Technologies 2018, 2 (2018), 105--121.
[18]
Shen Noether, Adam Mackenzie, et al. 2016. Ring confidential transactions. Ledger 1 (2016), 1--18.
[19]
Aafaf Ouaddah, Anas Abou Elkalam, and Abdellah Ait Ouahman. 2016. FairAccess: a new Blockchain-based access control framework for the Internet of Things. Security and Communication Networks 9, 18 (2016), 5943--5964.
[20]
Otto Julio Ahlert Pinno, André Ricardo Abed Grégio, and Luis CE De Bona. 2017. Controlchain: Blockchain as a central enabler for access control authorizations in the iot. In GLOBECOM 2017-2017 IEEE Global Communications Conference. IEEE, 1--6.
[21]
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, and Elaine Shi. 2016. Town crier: An authenticated data feed for smart contracts. In Proceedings of the 2016 aCM sIGSAC conference on computer and communications security. ACM, 270--282.
[22]
Qian Zhou and Fan Ye. 2019. APEX: automatic precondition execution with isolation and atomicity in internet-of-things. In Proceedings of the International Conference on Internet of Things Design and Implementation. ACM, 25--36.
[23]
Guy Zyskind, Oz Nathan, and Alex Pentland. 2015. Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471 (2015).

Cited By

View all

Index Terms

  1. PPCA: privacy-preserving conditional actions for IoT environments using smart contracts

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
    November 2019
    545 pages
    ISBN:9781450372831
    DOI:10.1145/3360774
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 February 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IoT
    2. blockchain
    3. privacy
    4. smart contract

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    MobiQuitous
    MobiQuitous: Computing, Networking and Services
    November 12 - 14, 2019
    Texas, Houston, USA

    Acceptance Rates

    Overall Acceptance Rate 26 of 87 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 257
      Total Downloads
    • Downloads (Last 12 months)62
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media