ABSTRACT
In this work, we leverage advances in decentralized identifiers and permissioned blockchains to build a flexible user authentication and authorization mechanism that offers enhanced privacy, achieves fast revocation, and supports distributed "policy decision points'' executed in mutually untrusted entities. The proposed solution can be applied in multi-tenant "IoT hubs'' that interconnect diverse IoT silos and enable authorization of "guest'' users, i.e., opportunistic users that have no trust relationship with the system, which has not encountered or known them before.
- N. Fotiou, T. Kotsonis, G. F. Marias, and G. C. Polyzos. 2016. Access Control for the Internet of Things. In 2016 International Workshop on Secure Internet of Things (SIoT). 29--38.Google Scholar
- D Hardt (ed.). 2012. The OAuth 2.0 Authorization Framework. RFC 6749. IETF.Google Scholar
- Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things (IoT). In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 255--272.Google ScholarDigital Library
- W3C Credentials Community Group. 2019 a. Decentralized Identifiers (DIDs) v0.13. https://w3c-ccg.github.io/did-primer/ Retrieved July 6, 2019 fromGoogle Scholar
- W3C Credentials Community Group. 2019 b. A Primer for Decentralized Identifiers. https://w3c-ccg.github.io/did-primer/ Retrieved July 6, 2019 fromGoogle Scholar
- R. Yavatkar, D. Pendarakis, and R. Guerin. 2000. A Framework for Policy-based Admission Controlm. RFC 2753. IETF.Google Scholar
Index Terms
- Enabling Opportunistic Users in Multi-Tenant IoT Systems using Decentralized Identifiers and Permissioned Blockchains
Recommendations
Enabling Multi-user Controls in Smart Home Devices
IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and PrivacyThe Internet of Things (IoT) devices have expanded into many aspects of everyday life. As these smart home devices grow more popular, security concerns increase. Researchers have modeled the privacy and security threats for smart home devices, but have ...
An authorization mechanism for a relational database system
A multiuser database system must selectively permit users to share data, while retaining the ability to restrict data access. There must be a mechanism to provide protection and security, permitting information to be accessed only by properly authorized ...
Harnessing the power of blockchain technology to solve IoT security & privacy issues
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud ComputingIn this paper, we examine the possibility of using blockchain technology, mainly the second-generation of blockchain and smart contract, to create a new version of our decentralized pseudonymous & privacy preserving authorization management framework. ...
Comments