Blockchain Based Authentication and Authorization Framework for Remote Collaboration Systems

Due to the advantages of blockchain technologies, including decentralization, immutability, transparency and security, people try to replace existing problematic architectures /frameworks with blockchain based ones. In this paper we propose a novel authentication and authorization framework based on blockchain technologies to control access to the resources of an IoT device. In this paper, we focus on devices such as the Cyber Handyman used in remote collaboration applications to develop our framework. We tested our smart contracts on the Ropsten test network. Our results showed that it can handle 25 service requests simultaneously.

[1]  David Evans,et al.  Decentralized Certificate Authorities , 2017, ArXiv.

[2]  Logan Widick,et al.  An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems , 2018, 2018 National Cyber Summit (NCS).

[3]  Ju Wook Jang,et al.  A Blockchain-based Secure IoT Control Scheme , 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE).

[4]  Burton S. Kaliski,et al.  PKCS #10: Certification Request Syntax Specification Version 1.7 , 2000, RFC.

[5]  Yaling Zhang,et al.  A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems , 2018, IEEE Access.

[6]  Bruce Schneier,et al.  Cryptography Engineering - Design Principles and Practical Applications , 2010 .

[7]  Abhishek Ranjan,et al.  An exploratory analysis of partner action and camera control in a video-mediated collaborative task , 2006, CSCW '06.

[8]  Phillip M. Hallam-Baker,et al.  DNS Certification Authority Authorization (CAA) Resource Record , 2019, RFC.

[9]  Juan Benet,et al.  IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.

[10]  Ki-Hyung Kim,et al.  Dynamic Access Control Scheme for IoT Devices using Blockchain , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).

[11]  Álvaro Alonso,et al.  A model to enable application-scoped access control as a service for IoT using OAuth 2.0 , 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN).

[12]  Roman Danyliw The Incident Object Description Exchange Format Version 2 , 2016, RFC.

[13]  Domenico Rotondi,et al.  A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..

[14]  MacLane Wilkison,et al.  NuCypher KMS: Decentralized key management system , 2017, ArXiv.

[15]  Richard Barnes,et al.  Automatic Certificate Management Environment (ACME) , 2019, RFC.

[16]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[17]  Adam Langley,et al.  Certificate Transparency , 2014, RFC.

[18]  Praneeth Babu Marella,et al.  Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology , 2018 .

[19]  Prabath Siriwardena,et al.  OAuth 2.0 , 2014 .

[20]  Ludwig Seitz,et al.  Authorization framework for the Internet-of-Things , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[21]  Khaled Salah,et al.  Using Blockchain for IOT Access Control and Authentication Management , 2018, ICIOT.

[22]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[23]  R. Bashroush,et al.  A provisioning model towards OAuth 2.0 performance optimization , 2011, 2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS).

[24]  Matt Luongo The Keep Network : A Privacy Layer for Public Blockchains , 2019 .

[25]  Ram Dantu,et al.  Cyber Handyman and Nursing for Humanitarian Services and Disaster Relief , 2018, 2018 IEEE International Symposium on Technologies for Homeland Security (HST).

[26]  Raphael M. Reischuk,et al.  IKP: Turning a PKI Around with Blockchains , 2016, IACR Cryptol. ePrint Arch..

[27]  Srikanth Jonnada Analysis and Performance of a Cyber-Human System and Protocols for Geographically Separated Collaborators , 2017 .

[28]  Theodora A. Varvarigou,et al.  Implementation of smart contracts for blockchain based IoT applications , 2018, 2018 9th International Conference on the Network of the Future (NOF).

[29]  David Shaw,et al.  OpenPGP Message Format , 1998, RFC.

[30]  Michael B. Jones,et al.  JSON Web Token (JWT) , 2015, RFC.