Font Size: a A A

An Access Control Model Based On Consortium Blockchain

Posted on:2021-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:S K RenFull Text:PDF
GTID:2518306047986729Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
Access control technology is an important module in the field of information security.With the advent of the 5G era,the further popularization of Internet of Things equipment,the increasing demand for network security and reliability,a good access control system also appears more and more important.Access control technology has evolved from a traditional access control model to a more complex and professional access control model based on roles and tasks.However,these access control models have a single point of failure security risk,and the access control problems of devices on different platforms cause data inaccessibility because of insufficient trust between nodes,which is not conducive to the access control model of multi-platform large-scale Io T device Construct.In recent years,with the continuous development and maturity of blockchain technology and applications,Oscar Novo et al.proposed various access control models based on the underlying technologies of blockchain based on the distributed decentralized and tamperresistant features of blockchain network,which solved the problems caused by the centralized model to some extent.However,the model based on the public chain has a natural weakness in terms of efficiency.Based on the existing work,this article optimizes the underlying implementation of the blockchain,uses the consortium blockchain instead of the public chain,and introduces a more efficient consensus strategy without affecting the network security of the blockchain to meet the availability of the design system in this article.In the system implemented in this article,the access control policies of Io T devices are mainly stored in the blockchain network,and the integrity,availability and privacy of data are protected by the blockchain network.When receiving the access of the remaining devices,go directly to the blockchain network to check whether they have permission to access the resources.For Io T devices,there is no need to store a large amount of access policy data locally,which reduces the burden and can better provide services.The innovative work of this article is as follows:(1)Independently designed the Digital Access Policy Identification(DAPI)structure as a secure communication protocol between the manager and the consortium blockchain network.(2)The consensus layer in the consortium blockchain network is optimized,and a two-phase consensus algorithm VRaft-PBFT is proposed.While ensuring the fault tolerance of the algorithm,the efficiency of consensus is greatly improved.(3)Optimize the cache algorithm of Io T devices by using bloom filters in special scenarios.(4)In order to simulate a real network environment,the designed system is deployed to cloud servers in different geographical locations for testing,and the data can better reflect the availability in the real network environment.This article reflects the value of the combination of blockchain technology and access control technology to the security of the Internet of Things,and has played a certain guiding and reference role in the combination of other technologies and blockchain technology.
Keywords/Search Tags:Internet of Things, access control, consortium blockchain, Digital Access Policy Identification, Practical Byzantine Fault Tolerance
PDF Full Text Request
Related items