Pruning Blockchain Protocols for Efficient Access Control in IoT Systems

We consider access control for IoT systems that involves shared accesses to the IoT devices as well as their data. Since IoT devices are dispersed all over the edge of the Internet, traditional centralized access control has problems. Blockchain based decentralized access control is thus the new sol...

Full description

Saved in:
Bibliographic Details
Published in:Proceedings - International Conference on Parallel and Distributed Systems pp. 617 - 624
Main Authors: Huang, Yongtao, Yen, I-Ling, Bastani, Farokh
Format: Conference Proceeding
Language:English
Published: IEEE 10.10.2024
Subjects:
ISSN:2690-5965
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract We consider access control for IoT systems that involves shared accesses to the IoT devices as well as their data. Since IoT devices are dispersed all over the edge of the Internet, traditional centralized access control has problems. Blockchain based decentralized access control is thus the new solution trend. However, existing blockchain based access control methods do not focus on performance issues and may incur a high communication overhead. In this paper, we develop a Pruned Blockchain based Access Control (PBAC) protocol to cutdown the unnecessary message rounds and achieve high efficiency in access validations and policy management. To realize the PBAC protocols, it is necessary to carefully engineer the system architecture, which is also discussed in the paper. Experiments demonstrate the efficacy of the PBAC protocol, specifically, it reduces the access validation time by approximately 43 \%.
AbstractList We consider access control for IoT systems that involves shared accesses to the IoT devices as well as their data. Since IoT devices are dispersed all over the edge of the Internet, traditional centralized access control has problems. Blockchain based decentralized access control is thus the new solution trend. However, existing blockchain based access control methods do not focus on performance issues and may incur a high communication overhead. In this paper, we develop a Pruned Blockchain based Access Control (PBAC) protocol to cutdown the unnecessary message rounds and achieve high efficiency in access validations and policy management. To realize the PBAC protocols, it is necessary to carefully engineer the system architecture, which is also discussed in the paper. Experiments demonstrate the efficacy of the PBAC protocol, specifically, it reduces the access validation time by approximately 43 \%.
Author Huang, Yongtao
Bastani, Farokh
Yen, I-Ling
Author_xml – sequence: 1
  givenname: Yongtao
  surname: Huang
  fullname: Huang, Yongtao
  email: huang.yongtao@utdallas.edu
  organization: University of Texas at Dallas
– sequence: 2
  givenname: I-Ling
  surname: Yen
  fullname: Yen, I-Ling
  email: ilyen@utdallas.edu
  organization: University of Texas at Dallas
– sequence: 3
  givenname: Farokh
  surname: Bastani
  fullname: Bastani, Farokh
  email: bastani@utdallas.edu
  organization: University of Texas at Dallas
BookMark eNotjtFKwzAYhaMouM29gUheoPVP0vxpLmudbjBwsHk9QppotEukqRd7ewt6dc7Fdz7OnFzFFB0h9wxKxkA_bNpd87RHISSUHHhVAkCNF2Spla6FYJJJjXhJZhw1FFOXN2Se8ycAh2kzI-vd8BNDfKePfbJf9sOESHdDGpNNfaY-DXTlfbDBxZE21rqcaZviOKSeTuQmHej-nEd3yrfk2ps-u-V_Lsjb8-rQrovt68umbbZFYArHgjNZebTSVLXzHjk3EnG62glrETurWc2VN7JTgE6CEaqDTpquMowpX2uxIHd_3uCcO34P4WSG85GBQoF1JX4B5MxPDQ
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICPADS63350.2024.00086
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9798331515966
EISSN 2690-5965
EndPage 624
ExternalDocumentID 10763684
Genre orig-research
GroupedDBID 29O
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i176t-2154f6c5a48eff622a566983d3cc66dc91827fa5d706e50a37d0d5ad4a117f893
IEDL.DBID RIE
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001481011800076&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 01:59:30 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i176t-2154f6c5a48eff622a566983d3cc66dc91827fa5d706e50a37d0d5ad4a117f893
PageCount 8
ParticipantIDs ieee_primary_10763684
PublicationCentury 2000
PublicationDate 2024-Oct.-10
PublicationDateYYYYMMDD 2024-10-10
PublicationDate_xml – month: 10
  year: 2024
  text: 2024-Oct.-10
  day: 10
PublicationDecade 2020
PublicationTitle Proceedings - International Conference on Parallel and Distributed Systems
PublicationTitleAbbrev ICPADS
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020350
Score 2.2776904
Snippet We consider access control for IoT systems that involves shared accesses to the IoT devices as well as their data. Since IoT devices are dispersed all over the...
SourceID ieee
SourceType Publisher
StartPage 617
SubjectTerms Access control
Blockchain
Blockchains
Internet of Things
Internet of Things (IoT)
Peer-to-Peer (P2P) Network
Performance evaluation
Protocols
Systems architecture
Title Pruning Blockchain Protocols for Efficient Access Control in IoT Systems
URI https://ieeexplore.ieee.org/document/10763684
WOSCitedRecordID wos001481011800076&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA62ePBUHxXf5OB1dTe7eeyx1pYWpCxYobeSzQOL0JV26-93Jt1WLx68hZAlMGF2ZjL5vo-Qe61KjjJIEdKhYZtRRqXOdQSprRWxYTwtA4nri5xM1GyWFw1YPWBhnHPh8Zl7wGHo5dvKbPCqDDwcvEGorEVaUsotWGtfXWGLrIEAJ3H-OO4XvedXkcIsVIEMObJjBEz_0lAJIWTY-efmx6T7A8ajxT7MnJADtzwlnZ0aA22c84yMitUGLznoE8SnD_MOJT9-V1dw1GsKuSkdBLoI2IX2gkwi7W_fqVNYOa6mtGEv75K34WDaH0WNTkK0SKSoI4jamReG60w57wVjGnK0XKU2NUYIa3KoIaTX3MpYOB7rVNrYcm0znSTSQ8JyTtrLaukuCBW8TEqhkPQFCufS5k567rnSjPmMMXlJumiZ-eeWCmO-M8rVH_PX5AiNjz_7JL4h7Xq1cbfk0HzVi_XqLhzgN20Tmrc
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB60Cnqqj4pvc_C6upvdJLvHWltarGXBCt5KNg8sQlfarb_fSbqtXjx4CyFLIMPszGTyfR_ArUwL5mSQAkeH5tqMIihkJgNMbTUPFWVx4Ulch2I0St_esrwGq3ssjDHGPz4zd27oe_m6VEt3VYYejt7A02QbdliS0GgF19rUV65JVoOAozC7H3Ty9uMLj3EW60DqWLJDB5n-paLig0iv-c_tD6D1A8cj-SbQHMKWmR1Bc63HQGr3PIZ-Pl-6aw7ygBHqQ71j0e--q0o09oJgdkq6njACdyFtL5RIOquX6gRXDsoxqfnLW_Da6447_aBWSgimkeBVgHE7sVwxmaTGWk6pxCwtS2MdK8W5VhlWEcJKpkXIDQtlLHSomdSJjCJhMWU5gcasnJlTIJwVUcFTR_uCpXOhMyMssyyVlNqEUnEGLXcyk88VGcZkfSjnf8zfwF5__DycDAejpwvYd4Zwv_4ovIRGNV-aK9hVX9V0Mb_2xvwGqoad_g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+-+International+Conference+on+Parallel+and+Distributed+Systems&rft.atitle=Pruning+Blockchain+Protocols+for+Efficient+Access+Control+in+IoT+Systems&rft.au=Huang%2C+Yongtao&rft.au=Yen%2C+I-Ling&rft.au=Bastani%2C+Farokh&rft.date=2024-10-10&rft.pub=IEEE&rft.eissn=2690-5965&rft.spage=617&rft.epage=624&rft_id=info:doi/10.1109%2FICPADS63350.2024.00086&rft.externalDocID=10763684