Controle de acesso a serviços usando Smart Contracts

  • Marcos Vinicius M. R. Souza Universidade Federal de São Carlos
  • Helio C. Guardia Universidade Federal de São Carlos

Resumo


Advances in ubiquitous computing and in the Internet of things (IoT) bring new challenges to access control systems, such as not having to rely on a centralized trusted party, and the ability to use contextual data. Such characteristics may be required to enable IoT services in smart homes and cities, and in electronic health systems. In these environments, service-based device to device interactions reinforce the need for flexible and scalable authenticity and confidentiality mechanisms. This work presents an access control model to address such challenges using a blockchain infrastructure. In the proposed model, services and contextual data are defined using smart contracts, and blockchain logs are used for reliable information management. Assets are associated with permissions, and their transfers prove access control rights in service invocation requests. A reference implementation on Hyperledger shows the viability of the model.

Palavras-chave: BlockChain, IoT, Access Controls

Referências

AZARIA, A. et al. Medrec: Using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD). [S.l.: s.n.], 2016. p. 25-30.

BERTINO, E.; KIRKPATRICK, M. S. Location-based access control systems for mobile users: Concepts and research directions. In: Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. New York, NY, USA: ACM, 2011. (SPRINGL '11), p. 49-52. ISBN 978-1-4503-1032-1.

CACHIN, C. et al. Architecture of the hyperledger blockchain fabric*. In: . [S.l.: s.n.], 2016.

CHOI, S. et al. Secure and resilient proximity-based access control. In: Proceedings of the 2013 International Workshop on Data Management & Analytics for Healthcare. New York, NY, USA: ACM, 2013. (DARE '13), p. 15-20. ISBN 978-1-4503-2425-0.

CLEEFF, A. v.; PIETERS, W.; WIERINGA, R. Benefits of location-based access con-trol: A literature study. In: Proceedings of the 2010 IEEE/ACM Int'L Conference on Green Computing and Communications & Int'L Conference on Cyber, Physical and So-cial Computing. Washington, DC, USA: IEEE Computer Society, 2010. (GREENCOM-CPSCOM '10), p. 739-746. ISBN 978-0-7695-4331-4.

DEY, A. K. Understanding and using context. Personal Ubiquitous Comput., Springer-Verlag, London, UK, UK, v. 5, n. 1, p. 4-7, jan. 2001. ISSN 1617-4909.

ENGLISH, M.; AUER, S.; DOMINGUE, J. Block chain technologies & the semantic web: A framework for symbiotic development. In: Computer Science Conference for University of Bonn Students, J. Lehmann, H. Thakkar, L. Halilaj, and R. Asmat, Eds. [S.l.: s.n.], 2016. p. 47-61.

FERRAIOLO, D.; KUHN, R. Role-based access controls. In: BALTIMORE, MARY-LAND: NIST-NCSC. Proceedings of 15th NIST-NCSC National Computer Security Conference. [S.l.], 1992. v. 563.

GUPTA, A.; KIRKPATRICK, M.; BERTINO, E. A formal proximity model for rbac systems. In: 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). [S.l.: s.n.], 2012. p. 1-10.

HASHEMI, S. H. et al. World of empowered iot users. In: 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI). [S.l.: s.n.], 2016. p. 13-24.

HU, V. C. et al. Guide to attribute based access control (abac) definition and considerations (draft). NIST special publication, v. 800, n. 162, 2014.

KUHN, D. R.; COYNE, E. J.; WEIL, T. R. Adding attributes to role-based access control. Computer, v. 43, n. 6, p. 79-81, June 2010. ISSN 0018-9162.

NAKAMOTO, S. Bitcoin: A peer-to-peer electronic cash system. November 2008.

OUADDAH, A.; ELKALAM, A. A.; OUAHMAN, A. A. Fairaccess: a new blockchain-based access control framework for the internet of things. Security and Communication Networks, v. 9, n. 18, p. 5943-5964, 2016. ISSN 1939-0122. SCN-16-0184.

TONINELLI, A. et al. A semantic context-aware access control framework for secure col-laborations in pervasive computing environments. In: . The Semantic Web -ISWC 2006: 5th International Semantic Web Conference, ISWC 2006, Athens, GA, USA, No-vember 5-9, 2006. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. p. 473-486. ISBN 978-3-540-49055-5.

WOOD, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, v. 151, 2014.

ZYSKIND, G.; NATHAN, O.; PENTLAND, A. S. Decentralizing privacy: Using block-chain to protect personal data. In: Proceedings of the 2015 IEEE Security and Privacy Workshops. Washington, DC, USA: IEEE Computer Society, 2015. (SPW '15), p. 180-184. ISBN 978-1-4799-9933-0.
Publicado
10/09/2019
Como Citar

Selecione um Formato
SOUZA, Marcos Vinicius M. R.; GUARDIA, Helio C.. Controle de acesso a serviços usando Smart Contracts. In: WORKSHOP EM BLOCKCHAIN: TEORIA, TECNOLOGIAS E APLICAÇÕES (WBLOCKCHAIN), 2. , 2019, Gramado. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2019 . DOI: https://doi.org/10.5753/wblockchain.2019.7486.