Читать книгу The New Advanced Society - Группа авторов - Страница 66
3.5.3 Proposed Distributed Ledger-Based IoT Cloud IAM
ОглавлениеDistributed Ledger implementation needs a basic platform namely a Blockchain. As the blockchain facilitates distributed database and essential characteristics of immutability, Distributed Ledger implementation can be done upon this platform efficiently. Blockchain as a technology can easily be integrated with access control and data sharing mechanisms. This way it may provide a new means for elimination of shortcomings of the age old traditional schemes. Blockchain provides solutions to many problems that are more effective to provide data integrity, fairness, authenticity, security, and distribution [21]. By virtue of the inherent cryptographic properties and decentralized storage and processing, as a technology Blockchain has been assessed as a suitable method for providing IAM services for IoT ecosystem as deliberated by the authors of [22, 23].
In any cryptographically secured system key management plays a vital role. In our proposed method Elliptic Curve Digital Signature Algorithm (ECDSA) may be conveniently used for generating public and private keys for the devices and the IoT clusters associated with Blockchain nodes. It provides the same level of security as with the RSA method. We have selected this approach depending upon a detailed comparison between encryption algorithms described by [24]. The ECDSA based program needs comparatively reduced power consumption from other similar methods. Hence it also suits the requirements of IoT infrastructure, keeping the constraint resources availability of the IoT devices.
Figure 3.4 above represents a schematic diagram of the proposed Blockchain based IoT Cloud model for the IAM service implementation. Vital aspects of the proposed model are as follows.
1 (i) Establishment of an Ethereum-based private blockchain as a core of the distributed ledger network.
2 (ii) Device address and user Ids are mapped over the nodes of the blockchain.
3 (iii) Storage of the acquired data from the devices is done off the blockchain inn the cloud storage.
4 (iv) Use of multiple smart contracts for ensuring ‘user’ and ‘things’ mapping for effective service management as well as identity management.
5 (v) Use of blockchain consensus mechanism for verification of data access as a registered event logged in the blockchain
6 (vi) Use of cloud nodes for processing and relieving the edge devices from loading of processing due to their constrained resources availability.
7 (vii) Superimposing the IAM functionality of Cloud with the inherent advantages of blockchain related information security and event logging.
Figure 3.4 Proposed model of blockchain-based IoT Cloud for IAM.