Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment
نویسندگان
چکیده
The Internet of Things (IoT) is vulnerable to leakage private information during data sharing. To avoid this problem, access control and secure sharing have been introduced in IoT; however, many challenges are faced because centralized single delegator selection. Additionally, blockchain integrated into IoT enhance the security environment. For that purpose, research proposes dynamic using (DSA-Block) model, which performs Initially, device attributes user registered at a local domain authority (LDA) for generating public keys hyperelliptic curve cryptography (HECC) algorithm, ensures legitimacy users devices. Then, devices send request message edge nodes (ENs) via gateway, filtration by validating user’s authenticity. filtered requests sent server perform delegation rock hyraxes swarm optimization (RHSO), selects set nodes. decision made Trusted practical Byzantine fault tolerance (PBFT) consensus algorithm. stored cloud storage, secured differential privacy mechanism. Finally, dual revocations, such as attribute revocation revocation, used maintain security. performance DSA-Block evaluated results demonstrate proposed model achieves superior compared previous works.
منابع مشابه
A Secure Cloud Computing using Decentralized Access Control with Anonymous Authentication and User Revocation
A Secure cloud computing is been proposed using access control which is attribute based encryption along with unspecified authentication of the user from security point of view and user revocation. In proposed system two key distribution centers are used and number of KDC can be increased depending on how many users are there. Decentralized approach is used in this paper as this approach proves...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملAchieving dynamic privileges in secure data sharing on cloud storage
With rapid development of cloud computing, more and more enterprises will outsource their sensitive data for sharing in a cloud. Many data sharing and access control schemes have been submitted. However, dynamic privileges among the access groups were not considered. In many circumstances, some users may have higher privileges than others, and they can decrypt more contents than those with low ...
متن کاملXML-Based Revocation and Delegation in a Distributed Environment
The rapid increase on the circulation of data over the web has highlighted the need for distributed storage of Internet-accessible information due to the rapid increase on the circulation of data over the web. Thus, access control mechanisms should also be distributed in order to protect them effectively. A recent idea in the access control theory is the delegation and revocation of rights, i.e...
متن کاملData Replication System in Secure Data Access control in Cloud Environment
Replication is a widely used method for achieving high availability in database systems. The data replication approach can be used for solutions such as Sharing data among remote offices, Sharing data among dispersed users, Make server data more accessible, Distribute solution updates, Back up data, Provide Internet or Intranet Replication. Cloud computing is most prevalent technology used in v...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2023
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2022.3217087