Threshold-Based Access Control for Smart Contracts using IDoT Property in IoT Environment

AUTHORS

You-jin Song,Dept. Information Management, Dongguk University at Gyeongju, Campus, Korea
Jae-Kyu Lee,Dept. Techno-Management Cooperation Course, Dongguk University at Gyeongju, Campus, Korea

ABSTRACT

The Internet of Things (IoT) system has a physical limitation of the device and a limitation of storing and computing the collected data in one cloud. In order to solve the limitations of such a centralized system, prior researches integrating the IoT and blockchain technology are being actively conducted. In order to implement data sharing services, system efficiency and user privacy are indispensable. To enable data sharing, these limitations must be overcome. This paper flexibly and robustly configures user’s access control through DACT using context attribute of Identity of Things (IDoT). In addition, the edge-type system configuration reduces the traffic overload caused by one cloud and combines the efficiency of the system. The system proposed in this paper can build a platform that can safely share users’ energy consumption data in the energy data sharing system.

 

KEYWORDS

Internet of things, Tangle-Based blockchain, Edge, Data privacy, IDoT, Dynamic Access Control Table (DACT)

REFERENCES

[1]     David W. Cearley, Brian Burke, Samantha Searle, and Mike J. Walker, “Top 10 strategic technology trends for 2018,” Gartner, (2017)
[2]     Statis Research Department, “Internet of Things - number of connected devices worldwide 2015-2025,” https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/, (2016)
[3]     Tragos Elias, Pöhls Henrich, Staudemeyer Ralf, Slamanig Daniel, Kapovits Adam, Suppan Santiago, Fragkiadakis Alexandros, Baldini Gianmarco, Neisse Ricardo, Langendoerfer Peter, Dyka Zoya, and Wittke Christian “Building the Hyperconnected Society,” River Publishers, (2015)
[4]     Alex Jinsung Choi, “Internet of things: Evolution towards a HyperConnected Society,” IEEE Asian Solid-State Circuits Conference, (2014) DOI: 10.1109/ASSCC.2014.7008846, (CrossRef)(Google Scholar)
[5]     Hao Yin, Dongchao Guo, Kai Wang, Zexun Jiang, Yongqiang Lyu, and Ju Xing, “Hyperconnected network: A Decentralized Trusted Computing and Networking Paradigm,” IEEE, (2018)
[6]     Wikipedia, “Hyper connectivity,” https://en.wikipedia.org/wiki/Hyperconnectivity, (2019)
[7]     Kim Kwang-seok, Kwon Bo-ram, and Choi Yeon-kyung, “The fourth industrial revolution and hyper-connected society, changing future industry,” KPMG Samjung, (2017)
[8]     Wikipedia, “Mirai malware,” https://en.wikipedia.org/wiki/Mirai_(malware), (2019)
[9]     IBM, “Watson IoT and Blockchain Disruptor and game changer,” (2016)
[10]  Hugh Ujhazy and Simon Piff, “Blockchain Implications for Internet of Things,” IDC, (2017)
[11]  Emanuel Ferreira Jesus, Vanessa R. L. Chicarino, Célio V. N. de Albuquerque, and Antônio A. de A. Rocha, “A survey of how to use blockchain to secure Internet of things and the stalker attack,” Hindawi, Security and communication Networks, (2018) DOI: 10.1155/2018/9675050(CrossRef)(Google Scholar)
[12]  F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the Internet of things,” Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pp.13-16, (2012) DOI: 10.1145/2342509.2342513(CrossRef)(Google Scholar)
[13]  A. V. Dastjerdi and R. Buyya, “Fog Computing: Helping the Internet of Things Realize Its Potential,” in Computer, vol.49, no.8, pp.112-116, (2016) DOI: 10.1145/2342509.2342513(CrossRef)(Google Scholar)
[14]  M. W. Condry and C. B. Nelson, “Using smart edge IoT devices for safer, rapid response with industry IoT control operations,” Proceedings of the IEEE, vol.104, no.5, pp.938-946, (2016) DOI: 10.1109/JPROC.2015.2513672(CrossRef)(Google Scholar)
[15]  Y. Cao, S. Chen, P. Hou, and D. Brown, “FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation,” Proceedings of the IEEE International Conference on Networking, Architecture and Storage (NAS), pp.2-11., (2015) DOI: 10.1109/NAS.2015.7255196(CrossRef)(Google Scholar)
[16]  V. Stantchev, A. Barnawi, and S. Ghulam, “Smart Items, Fog and Cloud Computing as Enablers of Servitization in Healthcare,” International Journal of Sensors & Transducers, vol.185, no.2, pp.121-128, (2015)
[17]  J. Li, J. Jin, D. Yuan, M. Palaniswami, and K. Moessner, “EHOPES: Data-centered Fog platform for smart living,” Proceedings of the EHOPES: Data-centered Fog platform for smart living, In Telecommunication Networks and Applications Conference (ITNAC), pp.308-313, (2015) DOI: 10.1109/ATNAC.2015.7366831(CrossRef)(Google Scholar)
[18]  R. B. Baghli, E. Najm, and B. Traverson, “Towards a Multi-Leveled architecture for the Internet of things,” Proceedings of the Enterprise Distributed Object Computing Workshop (EDOCW), 2016 IEEE 20th International, pp.1-6, (2016) DOI: 10.1109/EDOCW.2016.7584391(CrossRef)(Google Scholar)
[19]  Dominique Guinard, Vlad Trifa, Friedemann Mattern, and Erik Wilde, “From the Internet of things to the web of things: Resource-oriented architecture and best practices,” International Journal of Architecting the Internet of Things, pp.97-129, (2011) DOI: 10.1007/978-3-642-19157-2_5(CrossRef)(Google Scholar)
[20]  Luigi Atzori, Antonio Iera, and Giacomo Morabito, “The internet of things: A survey,” International Journal of Computer networks, vol.54, no.15, pp.2787-2805, (2010) DOI: 10.1016/j.comnet.2010.05.010 (CrossRef)(Google Scholar)
[21]  D. Linthicum, “Responsive data architecture for the Internet of things,” International Journal of Computer., vol.49, no.10, pp.72-75, (2016) DOI: 10.1109/MC.2016.302(CrossRef)(Google Scholar)
[22]  H. Anumala and S. M. Busetty, “Distributed device health platform using Internet of things devices,” Proceedings of the 2015 IEEE International Conference on Data Science and Data Intensive Systems(DSDIS), pp.525-531, (2015) DOI: 10.1109/DSDIS.2015.110(CrossRef)(Google Scholar)
[23]  Reyna Ana, Martín Cristian, Chen Jaime, Soler Enrique, and Díaz Manuel, “On blockchain and its integration with IoT. Challenges and opportunities,” Future Generation Computer Systems, vol.88, pp.173-190., (2018) DOI: 10.1016/j.future.2018.05.046(CrossRef)(Google Scholar)
[24]  Kwok-Yan Lam, and Chi-Hung Chi, “Identity in the Internet-of-Things (IoT): New Challenges and Opportunities,” Information and Communications Security, ICICS 2016, Lecture Notes in Computer Science, vol.9977, (2016) DOI: 10.1007/978-3-319-50011-9_2 (CrossRef)(Google Scholar)
[25]  NICOLA BAROZZI, “17 blockchain disruptive use cases,” http://www.nicolabarozzi.com/blockchain/-8/11/2016-17-blockchain-disruptive-use-cases, Accessed: 2018-02-01., (2016)
[26]  K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the internet of things,” IEEE Access, vol.4, pp.2292-2303, (2016) DOI: 10.1109/ACCESS.2016.2566339(CrossRef)(Google Scholar)
[27]  M. Aazam and E.-N. Huh, “Fog computing and smart gateway based communication for cloud of things,” 2014 International Conference on Future Internet of Things and Cloud, Barcelona, pp.464-470, (2014)

CITATION

  • APA:
    Song,Y.& Lee,J.K.(2020). Threshold-Based Access Control for Smart Contracts using IDoT Property in IoT Environment. International Journal of Smart Home, 14(1), 9-16. 10.21742/IJSH.2020.14.1.02
  • Harvard:
    Song,Y., Lee,J.K.(2020). "Threshold-Based Access Control for Smart Contracts using IDoT Property in IoT Environment". International Journal of Smart Home, 14(1), pp.9-16. doi:10.21742/IJSH.2020.14.1.02
  • IEEE:
    [1] Y.Song, J.K.Lee, "Threshold-Based Access Control for Smart Contracts using IDoT Property in IoT Environment". International Journal of Smart Home, vol.14, no.1, pp.9-16, Apr. 2020
  • MLA:
    Song You-jin and Lee Jae-Kyu. "Threshold-Based Access Control for Smart Contracts using IDoT Property in IoT Environment". International Journal of Smart Home, vol.14, no.1, Apr. 2020, pp.9-16, doi:10.21742/IJSH.2020.14.1.02

ISSUE INFO

  • Volume 14, No. 1, 2020
  • ISSN(p):1975-4094
  • ISSN(e):2383-725X
  • Published:Apr. 2020

DOWNLOAD