Chinese Journal on Internet of Things ›› 2022, Vol. 6 ›› Issue (4): 169-182.doi: 10.11959/j.issn.2096-3750.2022.00304

• Theory and Technology • Previous Articles     Next Articles

Private data access control model based on block chain technology in the internet of things environment

Weijin JIANG1,2,3, Tiantian LUO2,4, Ying YANG1,3, En LI1,3, Wenying ZHOU1,3   

  1. 1 State Key Laboratory of Data Intelligence and Smart Society Laboratory(Cultivating) Base, Changsha 410205, China
    2 Key Laboratory of Hunan Province for New Retail Virtual Reality Technology, Changsha 410205, China
    3 School of Computer Science, Hunan University of Technology and Business, Changsha 410205, China
    4 School of Advanced Interdisciplinary Studies, Hunan University of Technology and Business, Changsha 410205, China
  • Revised:2022-10-17 Online:2022-12-30 Published:2022-12-01
  • Supported by:
    The National Natural Science Foundation of China(61772196);The National Natural Science Foundation of Hunan Province(2020JJ4249);The Hunan Provincial Innovation Foundation for Postgraduate(CX20221139);The Key Scientific Research Project of Hunan Provincial Department of Education(21A0374)

Abstract:

The traditional “centralized” access control technology can no longer guarantee the security of private data access control in the current internet of things environment.Based on the ABAC (attribute-based access control) model, a blockchain based access control framework for the internet of things and a private data access control model were proposed.Firstly, the basic framework and process of access control were described and analyzed in detail, and an auditable access control model was proposed to systematically manage the access control policies of private data through the requests, responses and access records stored in the blockchain network.Then, an auditable access control system based on blockchain technology was proposed, which can provide distributed, fine-grained and dynamic access control management in the internet of things, realize the effective management and auditable access to data, and adopt the access control method based on smart contract to realize the transparent, traceable and automatic access control over the internet of things resources.Finally, simulation experiments and performance tests verify the effectiveness and security of the access control model and system.

Key words: blockchain, IoT, access control, smart contract, data security

CLC Number: 

No Suggested Reading articles found!