Documente Academic
Documente Profesional
Documente Cultură
net/publication/329015471
CITATIONS READS
0 169
3 authors, including:
Some of the authors of this publication are also working on these related projects:
A Novel Adaptive Beacon-based Scheme for Warning Messages Dissemination in Vehicular Ad-Hoc Networks View project
All content following this page was uploaded by Truc Dinh Trung Nguyen on 23 November 2018.
1 Introduction
With the great success of Bitcoin [1], the blockchain technology recently has
become a trending research topic in both academic institutes and industries as-
sociations. In a simple manner, blockchain is a decentralized database that con-
tains linked data blocks where each block is a group of valid and digitally signed
transactions. The blockchain itself is maintained by nodes in a peer-to-peer net-
work. What makes blockchain noticeable is the employment of a decentralized
fashion in which applications can operate efficiently without the need of a central
authority. In specific, it enables a trustless network where participants can trans-
act although they do not trust one another. Smart contracts in the blockchain
context are self-executing and self-enforcing contracts that are stored on chain.
They are deployed with explicit terms and conditions that are publicly visible
to all participants. Blockchain and smart contracts together have motivated nu-
merous decentralized applications such as Golem [2], Augur [3], or Status [4].
Consequently, the blockchain technology has the potential to go beyond financial
transactions and can be leveraged to tackle many problems in other domains,
especially in Internet of Things (IoT), which is currently employing a centralized
architecture.
We are witnessing the incredible growth of smart and networked embedded
devices that Cisco predicts to have about 50 billion connected devices by 2020
[5]. As such, there is an urgent need to shift toward a decentralized model with
2 T. Nguyen et al.
2 Problem statement
This paper mainly tackles the data privacy issues when third-party services are
involved. In specific, we concentrate on IoT-based applications in which data
collected from IoT devices can be accessed by some third-party services given
that the users have consented. Our solution aims to address the following privacy
issues:
Leveraging Blockchain to Enhance Data Privacy in IoT-based Applications 3
– Access control: the system recognizes users as the owners of their data and
they can authorize other services to access the data. Users have the flexibility
to modify the set of permissions at any given time.
– Data transparency: Third-party services who were granted permissions by
users can easily access the published data; and the assurance that those
published data are officially coming from the users.
– Access tracking: Users are fully aware over what data are being collected
and how they are accessed by third-party services.
Furthermore, we address the attack in which adversaries can tamper with IoT
devices and produce fraudulent data. Our solution makes sure that IoT devices
can obtain the latest official firmware from their vendors and prevent fraudulent
data from being published on blockchain, thereby maintaining the data integrity.
3 System model
4 Implementation
4.1 Encryption scheme
Data stored in the off-chain storage are encrypted by the Aggregator. Since
encrypting a large chunk of data using asymmetric encryption schemes is not
known to be efficient, in this work, we employ a hybrid approach with a re-
encryption scheme [15, 16]. We denote EN C(d, k) as encrypting data d using
Leveraging Blockchain to Enhance Data Privacy in IoT-based Applications 5
At this time, sj can read the published data l, and also verify the sigal i using
pkai to confirm the data’s origin.
Each time ai wants to publish new data, it only needs to repeat from step
2. However, in case ai wants to revoke the access permission of sj to a specific
slot l, it will repeat step 1 to generate a new pair of (pkal i , skal i ) so that the
re-encryption keys are now changed, sj will not be able to decrypt any further
lenc .
Contract 1 AccessControl
M : map (ai , sj ) → P . P: a set of policies
AccessLog: record an attempt to access an ai ’s slot by a 5-tuple (sj , ai , l, time, stt)
As opposed to the traditional cloud-centric IoT model in which data are sus-
ceptible to be manipulated and misused, the Aggregators in this system design
have full control over their data. As can be seen from the AccessControl con-
tract, an Aggregator may modify the set of permissions at any time without the
need of any central authority. By combining with the encryption scheme, the
system makes sure that Subscribers who are not granted permissions will not be
8 T. Nguyen et al.
Contract 2 FirmwareUpdate
F : map between a vi ∈ V to its latest firmware hash
able to access the Aggregator’s data. An adversary may attempt to take control
of the storage nodes to obtain data, however, the data are all encrypted, thus
without having a re-encryption key issued by the Aggregator, the data cannot
be decrypted. Furthermore, in case of using a distributed storage platform like
distributed hashtable (DHT) [17], data are separated into chunks and are stored
across different storage nodes, it would be hard for someone to assemble the
data. Another way of attack is to have a malicious blockchain node query data
from the off-chain storage or the node itself ignores the access control policy
and gives data to unauthorized Subscribers. However, in the same manner, data
are encrypted, only Subscribers who were granted permissions may be able to
decrypt them.
Subscribers who were given appropriate permission may easily access data
published by the Aggregator. As the system guarantees the data integrity, Sub-
scribers can make sure that the obtained data are accurate, untampered. This is
due to the fact that the off-chain storage uses a content-based addressing scheme,
therefore if the data were altered, it would not be addressable by the hash stored
on blockchain. Additionally, as blockchain is immutable, hashes stored on chain
remain permanently authentic. Thanks to that, even if an Aggregator’s private
key was stolen, data already stored on the off-chain storage could not be modi-
fied. By verifying the signature found in the data, Subscribers can firmly believe
that they are originated from the official source.
Along with sharing data, the system also enables Aggregators to be fully
aware of the shared data. Each time a Subscriber issues a retrieve transaction
to obtain data, the attempt, either successful or failed, will be recorded by the
AccessControl contract. By looking into the records, the Aggregator may track
how its data are being collected by third-party services.
Moreover, by employing the firmware update scheme, we limit attempts to
physically tamper IoT devices that overwrites the firmware in order to produce
fraudulent data to the network. By traversing back all firmware’s hashes stored
on the blockchain, an Aggregator can detect if its devices were compromised,
which also helps discovering some vulnerabilities resided within its system. Ag-
gregators can set up a schedule to check or update new firmware images on a
recurring basis (e.g., daily). In this way, users can assure that malicious firmwares
Leveraging Blockchain to Enhance Data Privacy in IoT-based Applications 9
will eventually be replaced with legitimate firmwares (given the assumption that
the Vendor keeps its private key secured).
Even though data on chain are publicly accessible, an adversary will not be
able to learn any essential information on the blockchain because it can only see
the access control policy and some hashes. All sensitive data are encrypted and
kept secured off-chain with restricted access. Nevertheless, since our proposed
system relies on blockchain and smart contracts, it can only be as secured as the
blockchain itself.
6 Related Work
Due to the attraction of blockchain and IoT, there are a lot of research efforts
in both academic and industrial works that have addressed the integration of
blockchain and IoT. In [18], the authors gave a detailed review on how blockchain
and smart contracts make a good fit for IoT in which they concluded that the
combination will cause important impact on several industries. Khan et al. [19]
presented current security issues in IoT and asserted that blockchain would be
a key solution. Some other works [20–22] outline aspects and use cases where
blockchain can be combined with IoT. However, none of these works illustrates
the integration in detail.
In [23], the authors presented an access control mechanism using blockchain.
They described the system thoroughly with detailed designs and protocols. Nev-
ertheless, all the operations are executed off-chain, that is, they did not exploit
the smart contracts in their work. Therefore, they missed out some great ad-
vantages of smart contracts such as accuracy, transparency and trust. In our
proposed system, we keep the access control management on-chain with smart
contracts so that the operations are explicitly visible to all participants which
eliminates the possibility of manipulation, bias or error.
The work by Shafagh et al. [24] is the most closely related to ours. They
presented a blockchain-based system for IoT that enabled a secured data sharing
without the need of any central authority. However, they also did not take the
advantages of smart contracts. Furthermore, as they enabled third-party services
to retrieve data directly from the off-chain storage, users could not track how
their data were being accessed. In our proposed solution, all attempts to access
users’ data are all recorded permanently on the blockchain.
assurance that data are authentic and comes from the right user. Moreover, we
also propose a firmware update scheme to limit the impact of IoT device tamper-
ing in which firmwares are overwritten by malicious ones to produce fraudulent
data.
Since this paper only presents the concepts and modelings, further efforts
should focus on conducting realistic experiments to evaluate the performance
and robustness of the system, especially in terms of latency, throughput and
stability as these are crucial criteria in any IoT application. The proposed system
model can be implemented using some blockchain platforms such as Ethereum
[25] or Hyperledger [26].
Acknowledgment
This paper is partially supported by NSF CNS-1443905 and NSF EFRI 1441231.
References
1. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
2. “Golem.” [Online]. Available: https://golem.network/
3. “Augur — a decentralized oracle & prediction market protocol.” [Online].
Available: https://www.augur.net/
4. “Status, a mobile ethereum os.” [Online]. Available: https://status.im/
5. D. Evans, “The internet of things: How the next evolution of the internet is chang-
ing everything,” CISCO white paper, vol. 1, no. 2011, pp. 1–11, 2011.
6. P. Brody and V. Pureswaran, “Device democracy: Saving the future of the internet
of things,” IBM, September, 2014.
7. M. B. Barcena and C. Wueest, “Insecurity in the internet of things,” Security
Response, Symantec, 2015.
8. A. Mosenia and N. K. Jha, “A comprehensive study of security of internet-of-
things,” IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp.
586–602, 2017.
9. O. Arias, J. Wurm, K. Hoang, and Y. Jin, “Privacy and security in internet of things
and wearable devices,” IEEE Transactions on Multi-Scale Computing Systems,
vol. 1, no. 2, pp. 99–109, 2015.
10. G. Hernandez, O. Arias, D. Buentello, and Y. Jin, “Smart nest thermostat: A
smart spy in your home,” Black Hat USA, 2014.
11. C. Miller, “Battery firmware hacking,” Black Hat USA, pp. 3–4, 2011.
12. J. Benet, “Ipfs-content addressed, versioned, p2p file system,”
https://github.com/ipfs/papers, 2014.
13. “Swarm.” [Online]. Available: https://swarm-gateways.net/bzz:/theswarm.eth/
14. S. Wilkinson, T. Boshevski, J. Brandoff, and V. Buterin, “Storj a peer-to-peer
cloud storage network,” 2014.
15. M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy
cryptography,” in International Conference on the Theory and Applications of
Cryptographic Techniques. Springer, 1998, pp. 127–144.
16. M. Egorov, M. Wilkison, and D. Nuñez, “Nucypher kms: decentralized key man-
agement system,” arXiv preprint arXiv:1707.06140, 2017.
Leveraging Blockchain to Enhance Data Privacy in IoT-based Applications 11