Fine-grained Trusted Control Methods for IoT Boundary Access

Authors

  • Jie Wang State Grid Hubei Electric Power Research Institute, Hubei Wuhan, 430077, China
  • Chang Liu State Grid Hubei Electric Power Research Institute, Hubei Wuhan, 430077, China
  • Guowei Zhu State Grid Hubei Electric Power Research Institute, Hubei Wuhan, 430077, China
  • Xiaojun Liu State Grid Yichang Power Supply Company, Hubei Yichang, 443000, China
  • Bibo Xiao State Grid Yichang Power Supply Company, Hubei Yichang, 443000, China

DOI:

https://doi.org/10.12694/scpe.v26i1.3785

Keywords:

Blockchain; Access control; Internet of Things; Cryptocurrency; Trusted Execution Environment

Abstract

In order to solve the problems of coarse-grained access policies, weak auditability, lack of access process control, and excessive privileges exhibited by existing IoT access control technologies, the author proposes a fine-grained trusted control method for IoT boundary access. The author elaborated on the CcBAC model framework and formalized its definition; At the same time, specific descriptions of the functions in the model were provided, and the access control process of this model in general application scenarios was presented; After rigorous testing, it was found that as the number of requests increased, there was a slight uptick in the average time it took for the function to process them, but beyond a certain point, this time plateaued and even began to decrease gradually. Meanwhile, the system's throughput increased steadily with more requests until it reached a stable level, showing no significant drop even with additional clients. The proposed CcBAC access control model showcased remarkable performance in handling large-scale requests while ensuring fine-grained, autonomous authorization, security, and auditability. It effectively achieved consensus in distributed systems and maintained data consistency. In conclusion, this model empowers resource owners with full control over their resources' access, while also accounting for the detailed and traceable nature of access control.

Downloads

Published

2025-01-05

Issue

Section

Special Issue - High-performance Computing Algorithms for Material Sciences