2021
DOI: 10.1007/s00779-020-01498-w
|View full text |Cite
|
Sign up to set email alerts
|

BHE-AC: a blockchain-based high-efficiency access control framework for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…The suggested method made use of a tokens mechanism that enables users to request numerous resources in batches rather than individually. An extension of [17] is presented in [29], with a particular emphasis on the analysis of the results. However, the disadvantage of CapBAC-based authorisation systems or access control models is that users are granted access to resources solely based on capability tokens created for each policy.…”
Section: Smart Contracts-based Approachesmentioning
confidence: 99%
“…The suggested method made use of a tokens mechanism that enables users to request numerous resources in batches rather than individually. An extension of [17] is presented in [29], with a particular emphasis on the analysis of the results. However, the disadvantage of CapBAC-based authorisation systems or access control models is that users are granted access to resources solely based on capability tokens created for each policy.…”
Section: Smart Contracts-based Approachesmentioning
confidence: 99%
“…Thus, the trade-off between the techniques and transactions performance must be researched to find the optimum level. From the extraction of this SLR, four frameworks were found to develop an access control that focuses on communication control between various entities such as IoT device, gateway, cloud and users [4], [68], [69], [47]. To accomplish the objective of the proposed framework, researchers have adopted blockchain technology to design control communication between various entities by validating data flows before attempting to communicate with other entities.…”
Section: Table III Access Control Modelmentioning
confidence: 99%
“…The 3 smart contracts have two functionalities: 1) contract level of communication between IoT actuators and sensors, and 2) contract to access data-sources and 3) interoperability of heterogeneous IoT smart contracts. In another approach, the authors in [4] developed access control in various entities and communication control frameworks for cloud-enabled IoT. This framework has three layers: the register model layer, blockchain-based token requesting mechanism layer and requesting data with token used to control the access of users in the system's layers.…”
Section: Table III Access Control Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Lyu et al [7] presented a blockchain-based access-control framework, affording data owners the capacity to securely distribute, audit, and revoke access rights. However, as observed in [8], the distribution of user permissions occurs externally to the blockchain, rendering user rights susceptible to tampering. To achieve fine-grained secure access control, Wang et al [9] proposed a blockchain-based data-sharing scheme, where data owners encrypt their shared data using attribute-based encryption.…”
Section: Introductionmentioning
confidence: 99%