• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Du Ruizhong, Liu Yan, Tian Junfeng. An Access Control Method Using Smart Contract for Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2287-2298. DOI: 10.7544/issn1000-1239.2019.20190416
Citation: Du Ruizhong, Liu Yan, Tian Junfeng. An Access Control Method Using Smart Contract for Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2287-2298. DOI: 10.7544/issn1000-1239.2019.20190416

An Access Control Method Using Smart Contract for Internet of Things

More Information
  • Published Date: September 30, 2019
  • While Internet of things (IoT) technology has been widely recognized as an essential part in our daily life, it also brings new challenges in terms of privacy and security. In view of the limited resources, large number of connections and strong dynamics of the devices in the Internet of things, the traditional centralized access control technology is not fully applicable, and how to achieve secure and efficient access control authorization in the IoT environment has become an urgent problem to be solved. In this regard, a distributed architecture based on hierarchical blockchain for Internet of Things (DAHB) is proposed, which includes device layer, edge layer and the cloud layer. In this architecture, we combine the advantages of blockchain technology to realize flexible, dynamic and automatic access control for IoT devices based on ABAC model in the domain and across the domain by means of smart contract. At the same time, the credit value and honesty are added to the attribute metric to dynamically evaluate the trust relationship between different domains and devices. The theoretical analysis and experimental results show that this scheme is more effective than the existing schemes in solving the requirements of lightweight, flexibility, fine-grained and security in Internet of things (IoT)access control.
  • Related Articles

    [1]Li Liying, Zhang Runze, Wei Tongquan. Service Decoupling and Deployment Strategy for Edge Computing[J]. Journal of Computer Research and Development, 2023, 60(5): 1073-1085. DOI: 10.7544/issn1000-1239.202220736
    [2]Li Xiaowei, Chen Benhui, Yang Dengqi, Wu Gaofei. Review of Security Protocols in Edge Computing Environments[J]. Journal of Computer Research and Development, 2022, 59(4): 765-780. DOI: 10.7544/issn1000-1239.20210644
    [3]Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei. Research Advances on Privacy Preserving in Edge Computing[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051. DOI: 10.7544/issn1000-1239.2020.20200614
    [4]Huang Qianyi, Li Zhiyang, Xie Wentao, Zhang Qian. Edge Computing in Smart Homes[J]. Journal of Computer Research and Development, 2020, 57(9): 1800-1809. DOI: 10.7544/issn1000-1239.2020.20200253
    [5]Yue Guangxue, Dai Yasheng, Yang Xiaohui, Liu Jianhua, You Zhenxu, Zhu Youkang. Model of Trusted Cooperative Service for Edge Computing[J]. Journal of Computer Research and Development, 2020, 57(5): 1080-1102. DOI: 10.7544/issn1000-1239.2020.20190077
    [6]Shi Weisong, Zhang Xingzhou, Wang Yifan, Zhang Qingyang. Edge Computing: State-of-the-Art and Future Directions[J]. Journal of Computer Research and Development, 2019, 56(1): 69-89. DOI: 10.7544/issn1000-1239.2019.20180760
    [7]Deng Xiaoheng, Guan Peiyuan, Wan Zhiwen, Liu Enlu, Luo Jie, Zhao Zhihui, Liu Yajun, Zhang Honggang. Integrated Trust Based Resource Cooperation in Edge Computing[J]. Journal of Computer Research and Development, 2018, 55(3): 449-477. DOI: 10.7544/issn1000-1239.2018.20170800
    [8]Zhao Ziming, Liu Fang, Cai Zhiping, Xiao Nong. Edge Computing: Platforms, Applications and Challenges[J]. Journal of Computer Research and Development, 2018, 55(2): 327-337. DOI: 10.7544/issn1000-1239.2018.20170228
    [9]Sun Yong, Tan Wenan. Cross-Organizational Workflow Task Allocation Algorithms for Socially Aware Collaborative Computing[J]. Journal of Computer Research and Development, 2017, 54(9): 1865-1879. DOI: 10.7544/issn1000-1239.2017.20160513
    [10]Shi Weisong, Sun Hui, Cao Jie, Zhang Quan, Liu Wei. Edge Computing—An Emerging Computing Model for the Internet of Everything Era[J]. Journal of Computer Research and Development, 2017, 54(5): 907-924. DOI: 10.7544/issn1000-1239.2017.20160941
  • Cited by

    Periodical cited type(20)

    1. 马行坡,闫梦凡,闵洁,殷明. 一种基于“云-边”协同计算的新安全联邦学习方案. 信阳师范大学学报(自然科学版). 2025(01): 66-71 .
    2. 白静,许建军,张龙昌. 随机供需云环境中应用提供商收益驱动的最优资源协同配置策略. 信息系统学报. 2025(01): 105-127 .
    3. 何涵,刘鹏,赵亮,王青山. 无人机任务卸载与充电协同优化. 工程科学与技术. 2024(01): 99-109 .
    4. 朱思峰,蔡江昊,柴争义,孙恩林. 车联网边缘场景下基于免疫算法的计算卸载优化. 吉林大学学报(工学版). 2024(01): 221-231 .
    5. 陈晶腾,陈芳. 分布式新能源接入的配电网降损技术研究. 自动化与仪器仪表. 2024(06): 291-295 .
    6. 白静,张龙昌. 云应用提供商收益驱动的最佳云资源配置策略. 计算机集成制造系统. 2024(07): 2495-2505 .
    7. 冯起,薛喜红,任龙,冯英. 考虑云端距离的科技服务边缘计算资源均衡调度算法. 自动化技术与应用. 2024(08): 95-98+104 .
    8. 纪雯,杨哲铭,王智,郭斌,沈博. 视觉端边云融合架构:面向超级智慧城市群演进的关键技术. 中国科学:信息科学. 2024(11): 2518-2532 .
    9. 赵璞,肖人彬. 基于自组织劳动分工的边云协同任务调度与资源缓存算法. 控制与决策. 2023(05): 1352-1362 .
    10. 唐续豪,刘发贵,王彬,李超,蒋俊,唐泉,陈维明,何凤文. 跨云环境下任务调度综述. 计算机研究与发展. 2023(06): 1262-1275 . 本站查看
    11. 原静,孙骏. 基于边缘计算的智能电网数据调度与快速分发方法. 信息与电脑(理论版). 2023(06): 226-229 .
    12. 刘鲤君,丁红,祁鸿燕,杜丽华,孙艳丽,姜宁. PaaS架构后端管理平台的云边协同调度算法设计. 现代电子技术. 2023(16): 91-96 .
    13. 徐胜超. 基于混合蛙跳算法的容器云资源低能耗部署方法. 重庆邮电大学学报(自然科学版). 2023(05): 952-959 .
    14. 何卫刚,王晓敏. 多技术辅助的高可靠矿井通信网络框架. 陕西煤炭. 2023(06): 150-153 .
    15. 蒋伟进,孙永霞,朱昊冉,陈萍萍,张婉清,陈君鹏. 边云协同计算下基于ST-GCN的监控视频行为识别机制. 南京大学学报(自然科学). 2022(01): 163-174 .
    16. 周伟,谢志强. 考虑多工序设备权重的资源协同综合调度算法. 电子与信息学报. 2022(05): 1625-1635 .
    17. 李凌,陈曦,沈维捷,熊汉武,蔡冉冉. 面向电工装备智能监造的边缘缓存策略. 计算机与现代化. 2022(05): 61-67 .
    18. 关天柱. 基于随机优化的边缘网络任务资源协同传输调度机制. 长江信息通信. 2022(06): 59-61 .
    19. 邓勇琛,胡忠波,王素贞. 边缘计算环境下的任务调度综述. 河北省科学院学报. 2022(04): 1-7 .
    20. 王其朝,金光淑,李庆,王锴,杨祖业,王宏. 工业边缘计算研究现状与展望. 信息与控制. 2021(03): 257-274 .

    Other cited types(27)

Catalog

    Article views (2652) PDF downloads (1578) Cited by(47)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return