Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things

Edge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIoT). However, computing′s unique features...

Full description

Bibliographic Details
Main Authors: Yongjun Ren, Fujian Zhu, Jian Qi, Jin Wang, Arun Kumar Sangaiah
Format: Article
Language:English
Published: MDPI AG 2019-05-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/9/10/2058
_version_ 1818107627284987904
author Yongjun Ren
Fujian Zhu
Jian Qi
Jin Wang
Arun Kumar Sangaiah
author_facet Yongjun Ren
Fujian Zhu
Jian Qi
Jin Wang
Arun Kumar Sangaiah
author_sort Yongjun Ren
collection DOAJ
description Edge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIoT). However, computing′s unique features have also introduced new security problems. To solve the problem, in this paper, blockchain-based identity management combining access control mechanism is designed under edge computing. The self-certified cryptography is utilized to realize the registration and authentication of network entities. We bind the generated implicit certificate to its identity and construct the identity and certificate management mechanism based on blockchain. Secondly, an access control mechanism based on Bloom filter is designed and integrated with identity management. Moreover, for secure communication in resource-constrained edge devices, a lightweight secret key agreement protocol based on self-authenticated public key is constructed. These mechanisms work together to provide data security guarantees for IIoT such as authentication, auditability, and confidentiality.
first_indexed 2024-12-11T02:02:28Z
format Article
id doaj.art-eafd1dbeceaa4a58bd6c4d2f9f395593
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-12-11T02:02:28Z
publishDate 2019-05-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-eafd1dbeceaa4a58bd6c4d2f9f3955932022-12-22T01:24:28ZengMDPI AGApplied Sciences2076-34172019-05-01910205810.3390/app9102058app9102058Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of ThingsYongjun Ren0Fujian Zhu1Jian Qi2Jin Wang3Arun Kumar Sangaiah4School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSchool of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSchool of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSchool of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha 410004, ChinaSchool of Computing Science and Engineering, Vellore Institute of Technology (VIT), Tamil Nadu, Vellore 632014, IndiaEdge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIoT). However, computing′s unique features have also introduced new security problems. To solve the problem, in this paper, blockchain-based identity management combining access control mechanism is designed under edge computing. The self-certified cryptography is utilized to realize the registration and authentication of network entities. We bind the generated implicit certificate to its identity and construct the identity and certificate management mechanism based on blockchain. Secondly, an access control mechanism based on Bloom filter is designed and integrated with identity management. Moreover, for secure communication in resource-constrained edge devices, a lightweight secret key agreement protocol based on self-authenticated public key is constructed. These mechanisms work together to provide data security guarantees for IIoT such as authentication, auditability, and confidentiality.https://www.mdpi.com/2076-3417/9/10/2058edge computingindustrial internet of thingsidentity managementaccess control
spellingShingle Yongjun Ren
Fujian Zhu
Jian Qi
Jin Wang
Arun Kumar Sangaiah
Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things
Applied Sciences
edge computing
industrial internet of things
identity management
access control
title Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things
title_full Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things
title_fullStr Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things
title_full_unstemmed Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things
title_short Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things
title_sort identity management and access control based on blockchain under edge computing for the industrial internet of things
topic edge computing
industrial internet of things
identity management
access control
url https://www.mdpi.com/2076-3417/9/10/2058
work_keys_str_mv AT yongjunren identitymanagementandaccesscontrolbasedonblockchainunderedgecomputingfortheindustrialinternetofthings
AT fujianzhu identitymanagementandaccesscontrolbasedonblockchainunderedgecomputingfortheindustrialinternetofthings
AT jianqi identitymanagementandaccesscontrolbasedonblockchainunderedgecomputingfortheindustrialinternetofthings
AT jinwang identitymanagementandaccesscontrolbasedonblockchainunderedgecomputingfortheindustrialinternetofthings
AT arunkumarsangaiah identitymanagementandaccesscontrolbasedonblockchainunderedgecomputingfortheindustrialinternetofthings