2022
DOI: 10.1109/jiot.2021.3109147
|View full text |Cite
|
Sign up to set email alerts
|

Policychain: A Decentralized Authorization Service With Script-Driven Policy on Blockchain for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…After removing repeated literature and summary analysis, we find that the combination of blockchain technology and access control forms two decentralized access management methods: one is the combination of blockchain technology and existing access control models, blockchain acts as the carrier of existing access control models, including the combination of RBAC [8], ABAC [9] and Cap-BAC [10]. The other is a newly developed access control method based on transactions [11] or intelligent contracts [12].…”
Section: Blockchain Used In Access Controlmentioning
confidence: 99%
“…After removing repeated literature and summary analysis, we find that the combination of blockchain technology and access control forms two decentralized access management methods: one is the combination of blockchain technology and existing access control models, blockchain acts as the carrier of existing access control models, including the combination of RBAC [8], ABAC [9] and Cap-BAC [10]. The other is a newly developed access control method based on transactions [11] or intelligent contracts [12].…”
Section: Blockchain Used In Access Controlmentioning
confidence: 99%
“…In conclusion, researchers demonstrate that our method for the decentralized administration of ABAC policies in IoT-ICS is both safe and workable. The proliferation of the IoT has allowed smart cities to break through into the mainstream [17,55] of the urbanization process. IoT networks make it possible for intelligent devices located in different locations to communicate with one another and share data by using the internet.…”
Section: B Edge and Distributed Computing Security Modelsmentioning
confidence: 99%
“…Shi and Li [33] reviewed the access control schemes in the IoT environment and pointed out that owing to the lack of trust in cross-organization or crossdomain access control, the blockchain can act as an open and trusted platform. Te works [34,35] both proposed a blockchain-based data-sharing mechanism, which applies blockchain to record access policy so as to provide a secure and verifable data-sharing scheme. Inspired by the research, blockchain can provide services such as secure and trusted data sharing or automatic and transparent execution for policy-oriented forwarding control among SDN domains.…”
Section: Blockchain-based Access Control and Data Sharingmentioning
confidence: 99%