Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The increasing number of edge layer devices connected to fog servers in fog computing environments has led to a rise in vulnerable and unauthorized actions. Implementing authorized access control with secure key management is essential to address this issue. As the traditional key management methods rely on third-party involvement, which suffers from drawbacks such as single points of failure and inconsistent key management in centralized architecture, so establishing efficient and secure key management between edge devices while ensuring effective access control is the main challenge in the digital environment. This study introduces a novel Blockchain-Based Access Control Protocol in IoT-Enabled Fog Computing (BACP-IeFC) environment for intra-network, inter-network, and mobile device communication models. The BACP-IeFC protocol eliminates the necessity for third-party intermediaries by leveraging Elliptic Curve Cryptography (ECC) for secure data sharing and hash chains for key pair generation. The BACP-IeFC protocol utilizes session keys generated by fog servers, which are securely recorded on a blockchain, ensuring robust authentication at edge devices. A Permissioned Blockchain is also used for secure key storage at the fog layer. The BACP-IeFC security has undergone comprehensive evaluation, including testing its session key (SK) security under the Real-or-Random (ROR) model, confirming its effectiveness in achieving SK security. An informal security analysis confirms the BACP-IeFC protocol resilience against known attacks. For the formal security verification, the BACP-IeFC protocol utilized the ProVerif security tool, and the results show that it is secure against major attacks. Additionally, the performance analysis of the proposed protocol using MIRACL shows a significant improvement in computation overhead, communication, storage cost, and energy consumption cost compared to existing protocols. The scalability and latency analysis of the BACP-IeFC protocol demonstrates that it supports high scalability with low latency costs. The BACP-IeFC protocol is implemented on Truffle Blockchain using Ethereum 2.0, and a lightweight Proof of Authority (PoA) consensus algorithm demonstrates that the BACP-IeFC protocol significantly outperformed existing protocols in terms of average response time for edge device registration time, authentication time, and block preparation time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 4
Algorithm 4
Algorithm 5
Algorithm 6
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Algorithm 7
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availibility

No datasets were generated or analysed during the current study.

References

  1. Zhang, L., Xiong, H., Huang, Q., Li, J., Choo, K.-K.R., Li, J.: Cryptographic solutions for cloud storage: challenges and research opportunities. IEEE Trans. Serv. Comput. 15(1), 567–587 (2019)

    Article  Google Scholar 

  2. Manvi, S., Gowda, N.: trust management in fog computing: a survey, pp. 34–48 (2019)

  3. Zhou, L., Li, X., Yeh, K.-H., Su, C., Chiu, W.: Lightweight IoT-based authentication scheme in cloud computing circumstance. Futur. Gener. Comput. Syst. 91, 244–251 (2019)

    Article  Google Scholar 

  4. Alam, S., Shuaib, M., Khan, W.Z., Garg, S., Kaddoum, G., Hossain, M.S., Zikria, Y.B.: Blockchain-based initiatives: current state and challenges. Comput. Netw. 198, 108395 (2021)

    Article  Google Scholar 

  5. Pal, S., Dorri, A., Jurdak, R.: Blockchain for IoT access control: recent trends and future research directions. J. Netw. Comput. Appl. 203, 103371 (2022)

    Article  Google Scholar 

  6. Patil, P., Sangeetha, M., Bhaskar, V.: Blockchain for IoT access control, security and privacy: a review. Wirel. Pers. Commun. 117, 1815–1834 (2021)

    Article  Google Scholar 

  7. Wang, S., Li, H., Chen, J., Wang, J., Deng, Y.: Dag blockchain-based lightweight authentication and authorization scheme for IoT devices. J. Inf. Secur. Appl. 66, 103134 (2022)

    Google Scholar 

  8. Rahmani, M.K.I., Shuaib, M., Alam, S., Siddiqui, S.T., Ahmad, S., Bhatia, S., Mashat, A.: Blockchain-based trust management framework for cloud computing-based internet of medical things (IoMT): a systematic review. Comput. Intell. Neurosci. 2022 (2022)

  9. Mohapatra, D., Bhoi, S.K., Jena, K.K., Nayak, S.R., Singh, A.: A blockchain security scheme to support fog-based internet of things. Microprocess. Microsyst. 89, 104455 (2022)

    Article  Google Scholar 

  10. Guo, Y., Zhang, Z., Guo, Y., Xiong, P.: BSRA: Blockchain-based secure remote authentication scheme for the fog-enabled internet of things. IEEE Internet Things J. (2023)

  11. Gowda, N.C., Manvi, S.S., Malakreddy, B., Lorenz, P.: BSKM-FC: Blockchain-based secured key management in a fog computing environment. Futur. Gener. Comput. Syst. (2023)

  12. Guo, Y., Zhang, Z., Guo, Y.: Secfhome: Secure remote authentication in fog-enabled smart home environment. Comput. Netw. 207, 108818 (2022)

    Article  Google Scholar 

  13. Baker, T., Asim, M., Samwini, H., Shamim, N., Alani, M.M., Buyya, R.: A blockchain-based fog-oriented lightweight framework for smart public vehicular transportation systems. Comput. Netw. 203, 108676 (2022)

    Article  Google Scholar 

  14. Das, A.K., Bera, B., Saha, S., Kumar, N., You, I., Chao, H.-C.: Ai-envisioned blockchain-enabled signature-based key management scheme for industrial cyber-physical systems. IEEE Internet Things J. 9(9), 6374–6388 (2021)

    Article  Google Scholar 

  15. Yang, H., Guo, Y., Guo, Y.: Blockchain-based cloud-fog collaborative smart home authentication scheme. Comput. Netw. 110240 (2024)

  16. Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)

    Article  Google Scholar 

  17. Bahga, A., Madisetti, V.K.: Blockchain platform for industrial internet of things. J. Softw. Eng. Appl. 9(10), 533–546 (2016)

    Article  Google Scholar 

  18. Pham, H.L., Tran, T.H., Nakashima, Y.: A secure remote healthcare system for hospital using blockchain smart contract. In: 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1–6. IEEE (2018)

  19. Xu, Q., Aung, K.M.M., Zhu, Y., Yong, K.L.: A blockchain-based storage system for data analytics in the internet of things. New Adv. Internet Things 119–138 (2018)

  20. Zhang, C., Zhu, L., Xu, C.: BPAF: Blockchain-enabled reliable and privacy-preserving authentication for fog-based IoT devices. IEEE Consumer Electron. Mag. 11(2), 88–96 (2021)

    Article  Google Scholar 

  21. Ashik, M.H., Islam, T., Hasan, K., Lim, K.: A blockchain-based secure fog-cloud architecture for internet of things. In: 2021 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2021 7th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 1–3. IEEE (2021)

  22. Liu, H., Han, D., Li, D.: Fabric-IoT: a blockchain-based access control system in IoT. IEEE Access 8, 18207–18218 (2020)

    Article  Google Scholar 

  23. Han, D., Zhu, Y., Li, D., Liang, W., Souri, A., Li, K.-C.: A blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE Trans. Ind. Inf. 18(5), 3530–3540 (2021)

    Article  Google Scholar 

  24. Kumari, D., Kumar, P., Prajapat, S.: A blockchain assisted public auditing scheme for cloud-based digital twin healthcare services. Clust. Comput. 1–17 (2023)

  25. Thakur, G., Prajapat, S., Kumar, P., Das, A.K., Shetty, S.: An efficient lightweight provably secure authentication protocol for patient monitoring using wireless medical sensor networks. IEEE Access (2023)

  26. Prajapat, S., Kumar, P., Kumar, S., Das, A.K., Shetty, S., Hossain, M.S.: Designing high-performance identity-based quantum signature protocol with strong security. IEEE Access (2024)

  27. Herzog, J.: A computational interpretation of Dolev–Yao adversaries. Theoret. Comput. Sci. 340(1), 57–81 (2005)

    Article  MathSciNet  Google Scholar 

  28. Forouzan, B.A.: Debdeepmukhopadhyay,“. Cryptography and Network Security (2007)

  29. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  30. Dinh, T.T.A., Liu, R., Zhang, M., Chen, G., Ooi, B.C., Wang, J.: Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366–1385 (2018)

    Article  Google Scholar 

  31. Al Asad, N., Elahi, M.T., Al Hasan, A., Yousuf, M.A.: Permission-based blockchain with proof of authority for secured healthcare data sharing. In: 2020 2nd International Conference on Advanced Information and Communication Technology (ICAICT), pp. 35–40. IEEE (2020)

  32. Yang, J., Dai, J., Gooi, H.B., Nguyen, H.D., Paudel, A.: A proof-of-authority blockchain-based distributed control system for islanded microgrids. IEEE Trans. Ind. Inf. 18(11), 8287–8297 (2022)

    Article  Google Scholar 

  33. Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. J. ACM (JACM) 51(4), 557–594 (2004)

    Article  MathSciNet  Google Scholar 

  34. Blanchet, B., Cheval, V., Allamigeon, X., Smyth, B.: ProVerif: cryptographic protocol verifier in the formal model; 2012 (2019)

  35. SDK, M.C.: MIRACL Cryptographic SDK: Multiprecision Integer and Rational Arithmetic Cryptographic Library. MIRACL (2020)

  36. Garg, S., Kaur, K., Kaddoum, G., Rodrigues, J.J., Guizani, M.: Secure and lightweight authentication scheme for smart metering infrastructure in smart grid. IEEE Trans. Ind. Inf. 16(5), 3548–3557 (2019)

    Article  Google Scholar 

  37. Merriam, P., Carver, J.: Web3.py 4.8.2 Python Library Documentation. Last visited: 10.05.2024. https://web3py.readthedocs.io/en/stable/

  38. Verma, R., Dhanda, N., Nagar, V.: Application of truffle suite in a blockchain environment. In: Proceedings of Third International Conference on Computing, Communications, and Cyber-Security: IC4S 2021, pp. 693–702. Springer, Berlin (2022)

Download references

Acknowledgements

This work is supported by a research project funded by IHUB NTIHAC Foundation, IIT Kanpur (Sanction Order No.: IHUB-NTIHAC/2021/01/8) under the aegis of the National Mission on Interdisciplinary Cyber-Physical System (NM-ICPS), DST, GoI.

Funding

This work is supported by a research project funded by IHUB NTIHAC Foundation, IITK under the aegis of the National Mission on Interdisciplinary Cyber-Physical System (NM-ICPS), DST, Government of India.

Author information

Authors and Affiliations

Authors

Contributions

Akhil Chaurasia: Conceptualization, Investigation, Software, Methodology, Validation, Formal analysis, Writing—original draft. Alok Kumar: Investigation, Methodology, Software, Validation, Formal analysis. Udai Pratap Rao: Methodology, Software, Validation.

Corresponding author

Correspondence to Akhil Chaurasia.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Ethical approval

Not applicable.

Consent to participate

Not applicable.

Consent for publication

All the authors are agreed for the publication.

Materials availability

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chaurasia, A., Kumar, A. & Rao, U.P. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment. Cluster Comput 27, 13919–13944 (2024). https://doi.org/10.1007/s10586-024-04656-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-024-04656-4

Keywords