Submitted Successfully!
To reward your contribution, here is a gift for you: A free trial for our video production service.
Thank you for your contribution! You can also upload a video entry or images related to this topic.
Version Summary Created by Modification Content Size Created at Operation
1 -- 1843 2023-08-22 16:09:20 |
2 layout Meta information modification 1843 2023-08-24 02:51:10 |

Video Upload Options

Do you have a full video?

Confirm

Are you sure to Delete?
Cite
If you have any further questions, please contact Encyclopedia Editorial Office.
Pancari, S.; Rashid, A.; Zheng, J.; Patel, S.; Wang, Y.; Fu, J. Attribute-Based Access Control in Smart Home IoT Environments. Encyclopedia. Available online: https://encyclopedia.pub/entry/48332 (accessed on 24 July 2024).
Pancari S, Rashid A, Zheng J, Patel S, Wang Y, Fu J. Attribute-Based Access Control in Smart Home IoT Environments. Encyclopedia. Available at: https://encyclopedia.pub/entry/48332. Accessed July 24, 2024.
Pancari, Stefan, Anik Rashid, Jason Zheng, Shirali Patel, Yi Wang, Jian Fu. "Attribute-Based Access Control in Smart Home IoT Environments" Encyclopedia, https://encyclopedia.pub/entry/48332 (accessed July 24, 2024).
Pancari, S., Rashid, A., Zheng, J., Patel, S., Wang, Y., & Fu, J. (2023, August 22). Attribute-Based Access Control in Smart Home IoT Environments. In Encyclopedia. https://encyclopedia.pub/entry/48332
Pancari, Stefan, et al. "Attribute-Based Access Control in Smart Home IoT Environments." Encyclopedia. Web. 22 August, 2023.
Attribute-Based Access Control in Smart Home IoT Environments
Edit

Technological advancements have allowed for the integration of the internet of things (IoT) with home and residential buildings, presenting an advanced method of increasing the usability, security, and quality of life of the user. This is called a smart home network, which is a home equipped with various devices, such as lighting, heating, and monitoring systems that smartphones or computers on the network can control.

blockchain Ethereum Hyperledger Fabric IoT

1. Introduction

Technological advancements have allowed for the integration of the internet of things (IoT) with home and residential buildings, presenting an advanced method of increasing the usability, security, and quality of life of the user [1]. This is called a smart home network, which is a home equipped with various devices, such as lighting, heating, and monitoring systems that smartphones or computers on the network can control [2]. There are an abundance of advantages that a smart home system provides for the user; however, with all advances in technology, there are a concerns regarding balancing data security and the privacy of the user on the network [2].
To address these security concerns, a centralized structure can be used, but this comes with a risk of being vulnerable to cyberattacks. For this reason, access-control methods can prevent unauthorized users from accessing network resources and data. One simple technique for implementing access control [3][4] is to use a central authority, with a central server [2]. However, this approach also presents a major system vulnerability. The entire network is compromised if the central server fails due to natural factors or cyber-attacks [1][5].
A distributed access-control network is used to overcome the shortcomings of a more traditional centralized network. This replaces the single server with multiple nodes to carry out the access-control system [2][6]. This method is more capable of withstanding cyber-attacks, as well as preventing unauthorized users from gaining access to network resources. One system that can provide this distributed access-control network is the integration of blockchain technology. This technique has opened up a wide variety of possibilities for securing all types of networks, especially in a smart home environment.
Due to its decentralized modular architecture, blockchain technology is a system used for storing data that is far more challenging to hack or alter [7]. A blockchain is a linked data structure that sequentially combines blocks of data and information. The system records the blocks in an encrypted form, as a distributed ledger that cannot be changed or tampered with [8]. Smart contracts [9] are used as a part of the blockchain, and are unique addresses to which end users can address transactions. As a part of smart contracts, transactions that interact with assets are defined [10]. A blockchain uses a distributed networking system of machines that replicate and create a chain of data. This chain of data is considered a ledger, with each of these forming the basis of a block. Smart contracts allow users to interact with ledgers [5][11].
A blockchain is made up of different blocks, each containing transactional information. Multiple blocks can be connected to form a chain, hence the name blockchain. When these blocks are chained together, it makes it challenging to alter data on one specific block, increasing the security of the system [5]. Each block contains information from the previous block, reinforcing the integrity of the data and of the overall blockchain system [12]. Additionally, each block is propagated within the network, allowing each machine to view the chain and all of its data, allowing for multiple verifications to take place [5]. This further ensures the authenticity of data and the integrity of the blockchain. The most common example of a blockchain in use would be in cryptocurrencies, such as Bitcoin and Ethereum [5].
Two of the most widely used open-sourced blockchain platforms are Ethereum and Hyperledger Fabric [13]. They provide a secure method of implementing a decentralized network in a transparent and programmable way.
Ethereum is a popular blockchain platform used to build public and private blockchain networks. Through an analysis of the performance of this platform, regarding the security response time and the accuracy of the overall system, Ethereum can be compared to other centralized networks [14]. Studies show that the proposed network architecture outperforms the traditional centralized architecture by having a better accuracy and lower response time [15]. Blockchain-based architecture allows for a minimization of the breaches in confidentiality and integrity, and authentication issues in the heterogeneous IoT and centralized gateways, that are present in many security systems. There are possible security issues with the Ethereum blockchain; however, they can be avoided through the consideration of these vulnerabilities during the development of a smart contract [14].
Hyperledger Fabric is a popular blockchain implementation tool that is hosted by the Linux Foundation [5]. It has a modular architecture that is beneficial for customizing private networks. For example, it supports the use of consensus, membership, and database blockchain layers [2][16][17], which allows for a wide range of possibilities, especially for access-control security techniques [18]. In fact, it is possible to build security measures based on member’s attributes using Hyperledger Fabric, which is why it is a popular choice for attribute-based access control (ABAC) [5][16][19]. However, it is not possible to implement a flexible or changing ABAC mechanism, because the parameters and permissions must be predefined on the network [17][20].
Smart contracts allow an automated program to be deployed on a blockchain network, in the form of encoded logic [5]. Developers use basic languages, such as node.js and Java, instead of those like Solidity, to code smart contracts. As a result, developers do not waste time learning a new language, and can create, update, and query device information from the ledger, by submitting transactions to the smart contract [21]. Access control is achieved using smart contracts, especially on an Ethereum platform [2][14].
A blockchain typically adopts a peer-to-peer trading system when it comes to buying and selling cryptocurrencies directly with one another. This makes a blockchain a considerably more secure system compared to centralized networks. Centralized security structures render systems more vulnerable, because the integrity, certification, and availability are compromised. Security threats and vulnerabilities increase with the spread of an IoT system structure: data forgery, tampering access to unauthorized devices, and incorrect device controls. The decentralized structure of a blockchain uses digital ledgers to record transactions and store data across the peer-to-peer network.

2. Attribute-Based Access Control in Smart Home IoT Environments

Data security and privacy in IoT devices connected in a smart home environment comprise one of the highest priorities of the system. These IoT devices alone are constantly being exposed to various attacks, and lack the features to defend themselves accordingly. For this reason, many works have been carried out to address this issue, proposing different access-control methods to ensure the security and privacy of devices connected to the network. In this section, some related works will be discussed, to introduce previous implementations of access-control methods, along with the blockchain platform used [22]. Table 1 serves to summarize the findings of this section, by listing the access-control method presented by the authors, and the blockchain implementation platform used, as well as the advantages and limitations of the access-control method used in their work [23].
Kumar et al. [6] built a blockchain-based healthcare network that uses an enhanced Bell–LaPadula model to classify different peers and transactions on the network, with different security levels. This enhancement to the Bell–LaPadula model used discretionary access control (DAC) and mandatory access control (MAC) [6]. DAC manages the established MAC permissions, to provide more flexibility in changing the access-control policies at any time. This model was constructed on the Hyperledger Fabric platform, with 35 peers on the network. The goal was to reduce the scalability issues in the blockchain network, which was successfully accomplished. However, this system is complicated by the use of the MAC, DAC, and Bell–LaPadula models [6] to implement access control. Each of these models has its own limitations, which are mitigated through the integration of other models into the system. However, this makes the system complicated to implement and maintain.
In the system presented by Cruz et al. [24], a role-based access-control (RBAC) framework was built, using smart contracts deployed on an Ethereum blockchain platform [25]. All user–role identifications and assignments are contained in the smart contract, which is then deployed on the blockchain. The system provides a secure and efficient way to define the user–role assignments, and verify the user’s role. Personalization and approval are automatically included in the system, as well [24]. However, due to the nature of RBAC, the role of each user must be predefined before the implementation of this type of access control [26]. In addition, this system is only useful in an organization or a company, where everyone’s individual roles are clearly defined. Even then, it can be a challenge, and can still pose difficulties when roles undergo changes within the company or network.
In a work carried out by Qashlan et al. [27], they proposed the extension of their earlier work [27], in which they presented a lightweight Ethereum blockchain-based multi-tier edge-smart home architecture. Every home in the framework has its own blockchain miners, along with smart contracts being used to ensure the automated enforcement of rules and policies to regulate the IoT devices [27]. This enforcement on the framework uses the attribute-based control (ABAC) approach to enforce rules. The extension of this work proposed the incorporation of cloud servers to increase the storage and analysis of IoT smart home device data [2]. The shortcoming of this experiment was the lack of testing to find the balance between the accuracy and the privacy of the data being transferred. The increase in privacy added more noise, which threatened the readability and accuracy of the data [27]. The model allows for dynamic and fine-grained access control, based on attributes, such as the user identity, device type, location, and other contextual information. ABAC can handle complex, dynamic, and heterogenous environments, for which traditional access-control models may not suffice.
Table 1. Access-control methods using Hyperledger Fabric and Ethereum for blockchain implementations, and their advantages and limitations.
Method Advantages Limitations Blockchain Implementation Platforms
Discretionary Access Control (DAC)
[6]
Used to build a more flexible access-control policy;
dynamically change the policy at any time for different subjects and clearance levels
Needs to work with other methods to have a fully functional model Hyperledger Fabric
Mandatory Access Control (MAC)
[6]
Enforces control over peers and resources for better security;
suitable if you require a mechanism where the permissions are non-transferable
Lacks the flexibility of other models Hyperledger Fabric
Role-Based Access Control (RBAC)
[24]
Well-suited framework for organizations;
versatile framework;
can be implemented with smart contracts, to make a more reliable access-control method
Not inherently trans-organizational;
without verifying roles, this method is insecure and unreliable
Ethereum
Attribute-Based Access Control (ABAC)
[27]
Is more suited for scenarios where the number of roles is increasing;
users directly apply the subjects’ attributes, resources, and environmental properties;
reduces the number of rule/role updates required
Requires access to a description of the field attributes and the definition of the attributes across many fields Ethereum
Attribute-Based Access Control (ABAC)
[27]
Modular network structure;
supports component pluggability for consensus, membership, and database layers
Not suitable for flexible or dynamic applications;
permissions must be defined in advance
Hyperledger Fabric

References

  1. Khan, S.; Khan, M.A.; Salah, K. IoT Security: Review, Blockchain Solutions, and Open Challenges, Future Gener. Comput. Syst. 2018, 82, 395–411.
  2. Rouhani, S.; Belchior, R.; Cruz, R.S.; Deters, R. Distributed attribute-based access control system using permissioned blockchain. World Wide Web 2021, 24, 1617–1644.
  3. Rouhani, S.; Deters, R. Blockchain Based Access Control Systems: State of the Art and Challenges. In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, New York, NY, USA, 14–17 October 2019.
  4. Hussein, D.; Bertin, E.; Frey, V. A Community-Driven Access Control Approach in Distributed IoT Environments. IEEE Commun. Mag. 2017, 55, 146–153.
  5. Wang, H.-D. A Blockchain-Based Data Trust to Support Researcher Networks; University of Saskatchewan: Saskatoon, SK, Canada, 2021.
  6. Kumar; Randhir; Tripathi, R. Scalable and Secure Access Control Policy for Healthcare System Using Blockchain and Enhanced Bell–Lapadula Model. J. Ambient. Intell. Humaniz. Comput. 2020, 12, 2321–2338.
  7. Feng, Q.; He, D.; Zeadally, S.; Khan, M.K.; Kumar, N. A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 2019, 126, 45–58.
  8. Qashlan, A.; Nanda, P.; He, X. Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2019–1 January 2020.
  9. Buterin, V. A next-generation smart contract and decentralized application platform. White Pap. 2014, 3, 1–36.
  10. Ferdous, M.S.; Margheri, A.; Paci, F.; Yang, M.; Sassone, V. Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017.
  11. Rouhani, S.; Deters, R. Security, Performance, and Applications of Smart Contracts: A Systematic Survey. IEEE Access 2019, 7, 50759–50779.
  12. Queiroz, M.M.; Telles, R.; Bonilla, S.H. Blockchain and supply chain management integration: A systematic review of the literature. Supply Chain Manag. Int. J. 2020, 25, 241–254.
  13. Mohammed, A.H.; Abdulateef, A.A.; Abdulateef, I.A. Hyperledger, Ethereum and Blockchain Technology: A Short Overview. In Proceedings of the 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), New York, NY, USA, 11–13 June 2021.
  14. Yutaka, M.; Zhang, Y.; Sasabe, M.; Kasahara, S. Using ethereum blockchain for distributed attribute-based access control in the internet of things. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), New York, NY, USA, 9–13 December 2019.
  15. Ding, S.; Cao, J.; Li, C.; Fan, K.; Li, H. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access 2019, 7, 38431–38441.
  16. Zhang, Y.; Kasahara, S.; Shen, Y.; Jiang, X.; Wan, J. Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J. 2018, 6, 1594–1605.
  17. Wang, S.; Zhang, Y.; Zhang, Y. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 2018, 6, 38437–38450.
  18. Hu, V.C.; Kuhn, D.R.; Ferraiolo, D.F.; Voas, J. Attribute-based access control. Computer 2015, 48, 85–88.
  19. Hu, V.C.; Ferraiolo, D.; Kuhn, R.; Friedman, A.R.; Lang, A.J.; Cogdell, M.M.; Schnitzer, A.; Sandlin, K.; Miller, R.; Scarfone, K. Guide to attribute based access control (abac) definition and considerations (draft). NIST Spec. Publ. 2013, 800, 1–54.
  20. Moniruzzaman; Khezr, S.; Yassine, A.; Benlamri, R. Blockchain for smart homes: Review of current trends and research challenges. Comput. Electr. Eng. 2020, 83, 106585.
  21. Mao, J.; Lin, Q.; Bian, J. Application of learning algorithms in smart home IoT system security. Math. Found. Comput. 2018, 1, 63–76.
  22. Xu, R.; Chen, Y.; Blasch, E. Decentralized access control for IoT based on blockchain and smart contract. In Modeling and Design of Secure Internet of Things; Wiley: Hoboken, NJ, USA, 2020; pp. 505–528.
  23. Alansari, S.; Paci, F.; Sassone, V. A Distributed Access Control System for Cloud Federations. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017.
  24. Cruz, J.P.; Kaji, Y.; Yanai, N. RBAC-SC: Role-Based Access Control Using Smart Contract. IEEE Access 2018, 6, 12240–12251.
  25. Zhu, Y.; Qin, Y.; Gan, G.; Shuai, Y.; Chu, W.C.-C. TBAC: Transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization. In Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 23–27 July 2018.
  26. Lee, Y.; Lee, K.M. Blockchain-Based RBAC for User Authentication with Anonymity. In Proceedings of the Conference on Research in Adaptive and Convergent Systems, New York, NY, USA, 24–27 September 2019.
  27. Qashlan, A.; Nanda, P.; He, X.; Mohanty, M. Privacy-Preserving Mechanism in Smart Home Using Blockchain. IEEE Access 2021, 9, 103651–103669.
More
Information
Contributors MDPI registered users' name will be linked to their SciProfiles pages. To register with us, please refer to https://encyclopedia.pub/register : , , , , ,
View Times: 309
Revisions: 2 times (View History)
Update Date: 24 Aug 2023
1000/1000
Video Production Service