Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things
Edge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIoT). However, computing′s unique features...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-05-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/9/10/2058 |
_version_ | 1818107627284987904 |
---|---|
author | Yongjun Ren Fujian Zhu Jian Qi Jin Wang Arun Kumar Sangaiah |
author_facet | Yongjun Ren Fujian Zhu Jian Qi Jin Wang Arun Kumar Sangaiah |
author_sort | Yongjun Ren |
collection | DOAJ |
description | Edge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIoT). However, computing′s unique features have also introduced new security problems. To solve the problem, in this paper, blockchain-based identity management combining access control mechanism is designed under edge computing. The self-certified cryptography is utilized to realize the registration and authentication of network entities. We bind the generated implicit certificate to its identity and construct the identity and certificate management mechanism based on blockchain. Secondly, an access control mechanism based on Bloom filter is designed and integrated with identity management. Moreover, for secure communication in resource-constrained edge devices, a lightweight secret key agreement protocol based on self-authenticated public key is constructed. These mechanisms work together to provide data security guarantees for IIoT such as authentication, auditability, and confidentiality. |
first_indexed | 2024-12-11T02:02:28Z |
format | Article |
id | doaj.art-eafd1dbeceaa4a58bd6c4d2f9f395593 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-12-11T02:02:28Z |
publishDate | 2019-05-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-eafd1dbeceaa4a58bd6c4d2f9f3955932022-12-22T01:24:28ZengMDPI AGApplied Sciences2076-34172019-05-01910205810.3390/app9102058app9102058Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of ThingsYongjun Ren0Fujian Zhu1Jian Qi2Jin Wang3Arun Kumar Sangaiah4School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSchool of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSchool of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSchool of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha 410004, ChinaSchool of Computing Science and Engineering, Vellore Institute of Technology (VIT), Tamil Nadu, Vellore 632014, IndiaEdge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIoT). However, computing′s unique features have also introduced new security problems. To solve the problem, in this paper, blockchain-based identity management combining access control mechanism is designed under edge computing. The self-certified cryptography is utilized to realize the registration and authentication of network entities. We bind the generated implicit certificate to its identity and construct the identity and certificate management mechanism based on blockchain. Secondly, an access control mechanism based on Bloom filter is designed and integrated with identity management. Moreover, for secure communication in resource-constrained edge devices, a lightweight secret key agreement protocol based on self-authenticated public key is constructed. These mechanisms work together to provide data security guarantees for IIoT such as authentication, auditability, and confidentiality.https://www.mdpi.com/2076-3417/9/10/2058edge computingindustrial internet of thingsidentity managementaccess control |
spellingShingle | Yongjun Ren Fujian Zhu Jian Qi Jin Wang Arun Kumar Sangaiah Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things Applied Sciences edge computing industrial internet of things identity management access control |
title | Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things |
title_full | Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things |
title_fullStr | Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things |
title_full_unstemmed | Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things |
title_short | Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things |
title_sort | identity management and access control based on blockchain under edge computing for the industrial internet of things |
topic | edge computing industrial internet of things identity management access control |
url | https://www.mdpi.com/2076-3417/9/10/2058 |
work_keys_str_mv | AT yongjunren identitymanagementandaccesscontrolbasedonblockchainunderedgecomputingfortheindustrialinternetofthings AT fujianzhu identitymanagementandaccesscontrolbasedonblockchainunderedgecomputingfortheindustrialinternetofthings AT jianqi identitymanagementandaccesscontrolbasedonblockchainunderedgecomputingfortheindustrialinternetofthings AT jinwang identitymanagementandaccesscontrolbasedonblockchainunderedgecomputingfortheindustrialinternetofthings AT arunkumarsangaiah identitymanagementandaccesscontrolbasedonblockchainunderedgecomputingfortheindustrialinternetofthings |