Skip to main content

Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 520)

Abstract

Access control face big challenges in IoT. Unfortunately, it is hard to implement current access control standards on smart object due to its constrained nature while the introduction of powerful and trusted third party to handle access control logic could harm user privacy. In this work we show how blockchain, the promising technology behind Bitcoin, can be very attractive to face those arising challenges. We therefore propose FairAccess as a new decentralized pseudonymous and privacy preserving authorization management framework that leverages the consistency of blockchain technology to manage access control on behalf of constrained devices.

Keywords

  • Internet of things
  • Security
  • Privacy
  • Access control
  • Blockchain
  • Bitcoin
  • Cryptocurrency

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.storj.io.

  2. 2.

    http://www.onename.com/.

References

  1. Vermesan, P., Friess, P., Guillemin, S., Gusmeroli, H., Sundmaeker, A., Bassi, I.S., Jubert, M., Mazura, M., Harrison, M.D.: Internet of things strategic research roadmap. In: Cluster of European Research Projects on the Internet of Things, CERP-IoT (2011)

    Google Scholar 

  2. SZABO, Nick: Formalizing and securing relationships on public networks. First Monday, 2(9) (1997)

    Google Scholar 

  3. Zhang, G., Tian, J.: An extended role based access control model for the Internet of Things. In: 2010 International Conference on Information Networking and Automation (ICINA), pp. V1-319–V1-323. IEEE, (2010)

    Google Scholar 

  4. Hernández-Ramos, J.L., Jara, A.J., Leandro, M., et al.: Dcapbac: embedding authorization logic into smart things through ecc optimizations. Int. J. Comput. Math. no ahead-of-print, 1–22 (2014)

    Google Scholar 

  5. Seitz, L., Selander, G., Gehrmann, C.: Authorization framework for the internet-of-things. In: 2013 IEEE 14th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6. IEEE (2013)

    Google Scholar 

  6. Hardt, D. (ed.): The OAuth 2.0 authorization framework. In: IETF, RFC6749, October 2012

    Google Scholar 

  7. Connect All IP-Based Smart Objects (CALIPSO)—FP7 EU Project [Online]. http://www.ict-calipso.eu/. Accessed 15 Oct 2014

  8. Cirani, S., Picone, M., Gonizzi, P., Veltri, L., Ferrari, G.: Iot-oas: an OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens. J. 15(2), 1224–1234 (2015)

    CrossRef  Google Scholar 

  9. Sanjay, P., Sumabala, N., Paul, B., Pureswaran, V.: ADEPT: an IoT practitioner perspective, Draft copy for advance review. IBM (2015)

    Google Scholar 

  10. Zyskind, G., Nathan, O.: Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW), 2015 IEEE, pp. 180–184. IEEE (2015). Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aafaf Ouaddah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ouaddah, A., Elkalam, A.A., Ouahman, A.A. (2017). Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT. In: Rocha, Á., Serrhini, M., Felgueiras, C. (eds) Europe and MENA Cooperation Advances in Information and Communication Technologies. Advances in Intelligent Systems and Computing, vol 520. Springer, Cham. https://doi.org/10.1007/978-3-319-46568-5_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46568-5_53

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46567-8

  • Online ISBN: 978-3-319-46568-5

  • eBook Packages: EngineeringEngineering (R0)