A Systematic Comparison between the Ethereum and Hyperledger Fabric Blockchain Platforms for Attribute-Based Access Control in Smart Home IoT Environments
Abstract
:1. Introduction
- Firstly, the work compares ABAC implementation in both Ethereum and Hyperledger Fabric platforms.
- A comprehensive summary of access-control and blockchain-specific access-control methods.
- Development of an original ABAC smart contract for the Ethereum platform, without the use of a pre-existing codebase or template.
- Modification of the pre-existing Hyperledger Fabric ABAC smart contract, to be better suited for this comparison.
2. Related Work
Method | Advantages | Limitations | Blockchain Implementation Platforms |
---|---|---|---|
Discretionary Access Control (DAC) [6] | Used to build a more flexible access-control policy; dynamically change the policy at any time for different subjects and clearance levels | Needs to work with other methods to have a fully functional model | Hyperledger Fabric |
Mandatory Access Control (MAC) [6] | Enforces control over peers and resources for better security; suitable if you require a mechanism where the permissions are non-transferable | Lacks the flexibility of other models | Hyperledger Fabric |
Role-Based Access Control (RBAC) [28] | Well-suited framework for organizations; versatile framework; can be implemented with smart contracts, to make a more reliable access-control method | Not inherently trans-organizational; without verifying roles, this method is insecure and unreliable | Ethereum |
Attribute-Based Access Control (ABAC) [31] | Is more suited for scenarios where the number of roles is increasing; users directly apply the subjects’ attributes, resources, and environmental properties; reduces the number of rule/role updates required | Requires access to a description of the field attributes and the definition of the attributes across many fields | Ethereum |
Attribute-Based Access Control (ABAC) [31] | Modular network structure; supports component pluggability for consensus, membership, and database layers | Not suitable for flexible or dynamic applications; permissions must be defined in advance | Hyperledger Fabric |
3. Systematic Approach
3.1. Planning
3.2. Research Development
3.2.1. Literature Review
3.2.2. Experimental Process
3.3. Documentation
4. Materials and Methods
4.1. Importance of Blockchain-Based Access Control in the IoT
4.2. Access Control—An Explanation of Traditional Access Control
- A.
- Mandatory access control (MAC) is a type of access control where end users are unable to alter information when given access to a certain file system. Individuals that are given access to, and permission for, security controls are restricted from making changes. System administrators or resource owners only have the authority to grant and deny access to resource objects within security controls. MAC systems are able to define access policies through the use of security labels [8]. Its criteria are also pre-established by system administrators, and are usually imposed by operating systems within government and military facilities. MAC operates by organizing and classifying each file system object within resource objects in a file system [42]. When using MAC, users and devices have already-set clearance levels and classifications. Classifications can be distinguished between the following three categories: Confidential, Secret, and Top Secret. Security kernels are implemented and used within MAC [42]. Security kernels are made up of hardware, software, and firmware components. Security kernels serve as the center point of computers, and are the most trusted part of a computer. This was formally referred to as the TCB or trusted computer base. Security kernels check a user’s authority and credentials, before granting access to a resource [40]. MAC is the most secure access control, but it takes a significant amount of time to set it up, and to ensure the resource objects and user information are up to date [42], meaning it is not ideal for many blockchain applications.
- B.
- Role-based access control (RBAC) determines who is authorized to access certain controls, based on his or her role within an organization. Levels of access increase based on authority, responsibility, and how important the role is. Only certain access controls are given to complete a certain task. Access controls are narrowed by restricting behaviors, such as creating files, modifying files, and viewing files. The lower importance and authority given to a user within a company, the fewer access controls an individual will have [40]. This access-control method is best for organizations, and is not well suited for smart home IoT applications [40,43].
- C.
- Discretionary access control (DAC) is an access control where permissions are granted based on the identification of what group/entity a user belongs to. DAC uses an access-control list that contains information on users’ permissions. This list is consulted to identify which users do and do not have access to certain resource objects. This type of access control is easier to implement, needing just a simple username and password. When compared to MAC, DAC has fewer restrictions, and is considered to be less secure. This is because specific access control is already enforced for all subjects and objects within an information system by a security administrator [43]. DAC is less secure in the sense that anyone given access can make changes to resource objects, and the security administrator can see who is granted access or access controls [2]. As security is of the utmost importance in many IoT applications, this method will not be considered for implementation in this blockchain environment.
- D.
- The rule-based access-control (RBAC) technique is known to be a preventive approach, because it allows the system owner to customize and personalize the type of access that one can have to view resources. The kind of access a person has is based on their role within an entity. RBAC adopts predefined roles in a system, and different access levels are granted based on these roles [18,30]. Access controls are set based on what “group” a user falls into, according to their role and responsibilities within the organization. Preset criteria allow a user to have certain permissions, to view certain resources and systems [40]. Maintaining an RBAC system that covers all possible scenarios can be complex and difficult to manage in a smart home blockchain environment. Furthermore, having pre-defined rules limits the flexibility of the system, making it difficult to adapt new devices to the network. For this reason, RBAC is not suitable for a blockchain smart home in the IoT [33].
4.3. Attribute-Based Access Control—A Suitable Blockchain Access-Control Method
4.4. Blockchain Access Control: Smart Contract Access Control
4.5. Access-Control Framework with IoT Environment
5. Experimentation
5.1. Experiment Setup
5.1.1. Ethereum Network Setup
5.1.2. Hyperledger Fabric Setup
5.2. Results Comparison
5.2.1. Ethereum ABAC Implementation
Algorithm 1: Ethereum ABAC Contract Interaction |
|
5.2.2. Hyperledger Fabric ABAC Implementation
Algorithm 2: Hyperledger Fabric ABAC Contract Interaction |
|
6. Discussion and Analysis
6.1. Comparison between Ethereum and Hyperledger Fabric ABAC Implementation Results
6.2. Time to Build Blockchain Network with ABAC
6.3. Cost of Implementing ABAC Code
6.4. Support for Smart Home Environment
7. Implication of Future Research
8. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
References
- Khan, S.; Khan, M.A.; Salah, K. IoT Security: Review, Blockchain Solutions, and Open Challenges, Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar]
- Rouhani, S.; Belchior, R.; Cruz, R.S.; Deters, R. Distributed attribute-based access control system using permissioned blockchain. World Wide Web 2021, 24, 1617–1644. [Google Scholar] [CrossRef]
- Rouhani, S.; Deters, R. Blockchain Based Access Control Systems: State of the Art and Challenges. In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, New York, NY, USA, 14–17 October 2019. [Google Scholar]
- Hussein, D.; Bertin, E.; Frey, V. A Community-Driven Access Control Approach in Distributed IoT Environments. IEEE Commun. Mag. 2017, 55, 146–153. [Google Scholar] [CrossRef]
- Wang, H.-D. A Blockchain-Based Data Trust to Support Researcher Networks; University of Saskatchewan: Saskatoon, SK, Canada, 2021. [Google Scholar]
- Kumar; Randhir; Tripathi, R. Scalable and Secure Access Control Policy for Healthcare System Using Blockchain and Enhanced Bell–Lapadula Model. J. Ambient. Intell. Humaniz. Comput. 2020, 12, 2321–2338. [Google Scholar] [CrossRef]
- Feng, Q.; He, D.; Zeadally, S.; Khan, M.K.; Kumar, N. A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 2019, 126, 45–58. [Google Scholar] [CrossRef]
- Qashlan, A.; Nanda, P.; He, X. Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2019–1 January 2020. [Google Scholar]
- Buterin, V. A next-generation smart contract and decentralized application platform. White Pap. 2014, 3, 1–36. [Google Scholar]
- Ferdous, M.S.; Margheri, A.; Paci, F.; Yang, M.; Sassone, V. Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017. [Google Scholar]
- Rouhani, S.; Deters, R. Security, Performance, and Applications of Smart Contracts: A Systematic Survey. IEEE Access 2019, 7, 50759–50779. [Google Scholar] [CrossRef]
- Queiroz, M.M.; Telles, R.; Bonilla, S.H. Blockchain and supply chain management integration: A systematic review of the literature. Supply Chain Manag. Int. J. 2020, 25, 241–254. [Google Scholar] [CrossRef]
- Mohammed, A.H.; Abdulateef, A.A.; Abdulateef, I.A. Hyperledger, Ethereum and Blockchain Technology: A Short Overview. In Proceedings of the 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), New York, NY, USA, 11–13 June 2021. [Google Scholar]
- Jiang, L.; Chang, X.; Liu, Y.; Mišić, J.; Mišić, V.B. Performance analysis of Hyperledger Fabric platform: A hierarchical model approach. Peer-to-Peer Netw. Appl. 2020, 13, 1014–1025. [Google Scholar] [CrossRef]
- Yutaka, M.; Zhang, Y.; Sasabe, M.; Kasahara, S. Using ethereum blockchain for distributed attribute-based access control in the internet of things. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), New York, NY, USA, 9–13 December 2019. [Google Scholar]
- Ding, S.; Cao, J.; Li, C.; Fan, K.; Li, H. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access 2019, 7, 38431–38441. [Google Scholar] [CrossRef]
- Zhang, Y.; Kasahara, S.; Shen, Y.; Jiang, X.; Wan, J. Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J. 2018, 6, 1594–1605. [Google Scholar] [CrossRef] [Green Version]
- Wang, S.; Zhang, Y.; Zhang, Y. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 2018, 6, 38437–38450. [Google Scholar] [CrossRef]
- Hu, V.C.; Kuhn, D.R.; Ferraiolo, D.F.; Voas, J. Attribute-based access control. Computer 2015, 48, 85–88. [Google Scholar] [CrossRef]
- Hu, V.C.; Ferraiolo, D.; Kuhn, R.; Friedman, A.R.; Lang, A.J.; Cogdell, M.M.; Schnitzer, A.; Sandlin, K.; Miller, R.; Scarfone, K. Guide to attribute based access control (abac) definition and considerations (draft). NIST Spec. Publ. 2013, 800, 1–54. [Google Scholar]
- Moniruzzaman; Khezr, S.; Yassine, A.; Benlamri, R. Blockchain for smart homes: Review of current trends and research challenges. Comput. Electr. Eng. 2020, 83, 106585. [Google Scholar] [CrossRef]
- Mao, J.; Lin, Q.; Bian, J. Application of learning algorithms in smart home IoT system security. Math. Found. Comput. 2018, 1, 63–76. [Google Scholar] [CrossRef] [Green Version]
- Jemel, M.; Serhrouchni, A. Decentralized Access Control Mechanism with Temporal Dimension Based on Blockchain. In Proceedings of the 2017 IEEE 14th International Conference on e-business Engineering (ICEBE), Shanghai China, 4–6 November 2017. [Google Scholar]
- Guo, H.; Meamari, E.; Shen, C.-C. Multi-Authority Attribute-Based Access Control with Smart Contract. In Proceedings of the 2019 International Conference on Blockchain Technology, New York, NY, USA, 15–18 March 2019. [Google Scholar]
- Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA, 13–17 March 2017. [Google Scholar]
- Xu, R.; Chen, Y.; Blasch, E. Decentralized access control for IoT based on blockchain and smart contract. In Modeling and Design of Secure Internet of Things; Wiley: Hoboken, NJ, USA, 2020; pp. 505–528. [Google Scholar]
- Alansari, S.; Paci, F.; Sassone, V. A Distributed Access Control System for Cloud Federations. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017. [Google Scholar]
- Cruz, J.P.; Kaji, Y.; Yanai, N. RBAC-SC: Role-Based Access Control Using Smart Contract. IEEE Access 2018, 6, 12240–12251. [Google Scholar] [CrossRef]
- Zhu, Y.; Qin, Y.; Gan, G.; Shuai, Y.; Chu, W.C.-C. TBAC: Transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization. In Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 23–27 July 2018. [Google Scholar]
- Lee, Y.; Lee, K.M. Blockchain-Based RBAC for User Authentication with Anonymity. In Proceedings of the Conference on Research in Adaptive and Convergent Systems, New York, NY, USA, 24–27 September 2019. [Google Scholar]
- Qashlan, A.; Nanda, P.; He, X.; Mohanty, M. Privacy-Preserving Mechanism in Smart Home Using Blockchain. IEEE Access 2021, 9, 103651–103669. [Google Scholar] [CrossRef]
- Yuan, E.; Tong, J. Attributed Based Access Control (ABAC) for Web Services. In Proceedings of the IEEE International Conference on Web Services (ICWS’05), Orlando, FL, USA, 11–15 July 2005. [Google Scholar]
- Di Francesco Maesa, D.; Mori, P.; Ricci, L. Blockchain based access control. In Distributed Applications and Interoperable Systems: 17th IFIP WG 6.1 International Conference, DAIS 2017, Held as Part of the 12th International Federated Conference on Distributed Computing Techniques, DisCoTec 2017, Neuchâtel, Switzerland, 19–22 June 2017; Springer: Cham, Switzerland, 2017. [Google Scholar]
- Fotiou, N.; Polyzos, G.C. Smart contracts for the internet of things: Opportunities and challenges. In Proceedings of the 2018 European Conference on Networks and Communications (EuCNC), New York, NY, USA, 18–21 June 2018. [Google Scholar]
- Nakamura, Y.; Zhang, Y.; Sasabe, M.; Kasahara, S. Capability-Based Access Control for the Internet of Things: An ethereum blockchain-based scheme. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), New York, NY, USA, 9–13 December 2019. [Google Scholar]
- Es-Samaali, H.; Outchakoucht, A.; Leroy, J.P. A blockchain-based access control for big data. Int. J. Comput. Netw. Commun. Secur. 2017, 5, 137. [Google Scholar]
- Dar, A.B.; Lone, A.H.; Naaz, R.; Baba, A.I.; Wu, F. Blockchain Driven Access Control Mechanisms, Models and Frameworks: A Systematic Literature Review. J. Inf. Secur. Cybercrimes Res. 2022, 5, 5–34. [Google Scholar]
- Azaria, A.; Ekblaw, A.; Vieira, T.; Lippman, A. MedRec: Using Blockchain for Medical Data Access and Permission Management. In Proceedings of the 2016 2nd International Conference on Open and Big Data (OBD), Vienna, Austria, 22–24 August 2016; pp. 25–30. [Google Scholar]
- Xia, Q.; Sifah, E.B.; Asamoah, K.O.; Gao, J.; Du, X.; Guizani, M. MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain. IEEE Access 2017, 5, 14757–14767. [Google Scholar] [CrossRef]
- McCune, J.M.; Jaeger, T.; Berger, S.; Caceres, R.; Sailer, R. Shamon: A System for Distributed Mandatory Access Control. In Proceedings of the 2006 22nd Annual Computer Security Applications Conference (ACSAC’06), New York, NY, USA, 11–15 December 2006. [Google Scholar]
- Maesa, D.D.F.; Mori, P.; Ricci, L. A blockchain based approach for the definition of auditable Access Control systems. Comput. Secur. 2019, 84, 93–119. [Google Scholar] [CrossRef]
- Hu, V.C.; Kuhn, D.R.; Ferraiolo, D.F. Access Control for Emerging Distributed Systems. Computer 2018, 51, 100–103. [Google Scholar] [CrossRef]
- Yavari, A.; Panah, A.S.; Georgakopoulos, D.; Jayaraman, P.P.; van Schyndel, R. Scalable Role-Based Data Disclosure Control for the Internet of Things. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017. [Google Scholar]
- Kushwaha, S.S.; Joshi, S.; Singh, D.; Kaur, M.; Lee, H.-N. Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract. IEEE Access 2022, 10, 6605–6621. [Google Scholar] [CrossRef]
- Song, L.; Li, M.; Zhu, Z.; Yuan, P.; He, Y. Attribute-Based Access Control Using Smart Contracts for the Internet of Things. Procedia Comput. Sci. 2020, 174, 231–242. [Google Scholar] [CrossRef]
- Valenta, M.; Sandner, P. Comparison of Ethereum, Hyperledger Fabric and Corda; Frankfurt School Blockchain Center: Hessen, Germany, 2017; Volume 8, pp. 1–8. [Google Scholar]
- Wohrer, M.; Zdun, U. Smart contracts: Security Patterns in the Ethereum Ecosystem and Solidity. In Proceedings of the 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE), New York, NY, USA, 20 March 2018. [Google Scholar]
- Liu, Q.; Zhang, H.; Wan, J.; Chen, X. An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things. IEEE Access 2017, 5, 7001–7011. [Google Scholar] [CrossRef]
- Bhatt, S.; Patwa, F.; Sandhu, R. Access Control Model for AWS Internet of Things. In Proceedings of the Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, 21–23 August 2017. [Google Scholar]
- Valencia Ramírez, J.P. Contratos inteligentes. Rev. Investig. Tecnol. Inf. 2019, 7, 1–10. [Google Scholar] [CrossRef] [Green Version]
- Gusmeroli, S.; Piccione, S.; Rotondi, D. A capability-based security approach to manage access control in the Internet of Things. Math. Comput. Model. 2013, 58, 1189–1205. [Google Scholar] [CrossRef]
- Kshetri, N. Can blockchain strengthen the internet of things? IT Prof. 2017, 19, 68–72. [Google Scholar] [CrossRef] [Green Version]
- Banafa, A. IoT and Blockchain Convergence: Benefits and Challenges. IEEE Internet Things 2017, 9. Available online: https://iot.ieee.org/articles-publications/newsletter/january-2017/iot-and-blockchain-convergence-benefits-and-challenges.html (accessed on 1 July 2023).
- Košťál, K.; Helebrandt, P.; Belluš, M.; Ries, M.; Kotuliak, I. Management and Monitoring of IoT Devices Using Blockchain. Sensors 2019, 19, 856. [Google Scholar] [CrossRef] [Green Version]
- Clack, C.D. Smart Contract Templates: Legal semantics and code validation. J. Digit. Bank. 2018, 2, 338–352. [Google Scholar]
- Oliva, G.A.; Hassan, A.E.; Jiang, Z.M. An exploratory study of smart contracts in the Ethereum blockchain platform. Empir. Softw. Eng. 2020, 25, 1864–1904. [Google Scholar] [CrossRef]
- Taş, R.; Tanrıöver, Ö.Ö. Building a Decentralized Application on the Ethereum Blockchain. In Proceedings of the 2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkey, 11–13 October 2019. [Google Scholar]
- Peters, G.W.; Panayi, E. Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money. In Banking beyond Banks and Money; Springer: Cham, Switzerland, 2016. [Google Scholar]
- Feng, C.; Niu, J. Selfish Mining in Ethereum. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019. [Google Scholar]
- Kamboj, P.; Khare, S.; Pal, S. User authentication using Blockchain based smart contract in role-based access control. Peer-to-Peer Netw. Appl. 2021, 14, 2961–2976. [Google Scholar] [CrossRef]
- Sandhu, R.; Zhang, X. Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, New York, NY, USA, 1–3 June 2005. [Google Scholar]
- Liu, H.; Han, D.; Li, D. Fabric-iot: A Blockchain-Based Access Control System in IoT. IEEE Access 2020, 8, 18207–18218. [Google Scholar] [CrossRef]
- Sun, H.; Hua, S.; Zhou, E.; Pi, B.; Sun, J.; Yamashita, K. Using Ethereum Blockchain in Internet of Things: A Solution for Electric Vehicle Battery Refueling. In Proceedings of the Blockchain–ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, 25–30 June 2018. [Google Scholar]
- Creswell, J.W.; Creswell, J.D. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches; Sage Publications: Washington, DC, USA, 2017. [Google Scholar]
- Satyanarayanan, M. The emergence of edge computing. Computer 2017, 50, 30–39. [Google Scholar] [CrossRef]
- Yu, W.; Liang, F.; He, X.; Hatcher, W.G.; Lu, C.; Lin, J.; Yang, X. A Survey on the Edge Computing for the Internet of Things. IEEE Access 2017, 6, 6900–6919. [Google Scholar] [CrossRef]
- Zhang, Y.; Yutaka, M.; Sasabe, M.; Kasahara, S. Attribute-Based Access Control for Smart Cities: A Smart-Contract-Driven Framework. IEEE Internet Things J. 2020, 8, 6372–6384. [Google Scholar] [CrossRef]
- Singh, M.; Kim, S. Blockchain technology for decentralized autonomous organizations. In Advances in Computers; Elsevier: Amsterdam, The Netherlands, 2019; pp. 115–140. [Google Scholar]
- Pathak, A.; Al-Anbagi, I.; Hamilton, H.J. TABI: Trust-based ABAC Mechanism for Edge-IoT using Blockchain Technology. IEEE Access 2023, 11, 36379–36398. [Google Scholar] [CrossRef]
- Vasishta, M.V.A.; Palanisamy, B.; Sural, S. Decentralized Authorization using Hyperledger Fabric. In Proceedings of the 2022 IEEE International Conference on Blockchain (Blockchain), New York, NY, USA, 22–25 August 2022. [Google Scholar]
- Yang, Z.; Shao, D.; Qu, L.; Zhang, M. Internet of Things Access Control System Based on Hyperledger. J. Phys. Conf. Ser. 2021, 1748, 042031. [Google Scholar] [CrossRef]
- Li, P.; Li, S.; Ding, M.; Yu, J.; Zhang, H.; Zhou, X.; Li, J. A Vulnerability Detection Framework for Hyperledger Fabric Smart Contracts Based on Dynamic and Static Analysis. In Proceedings of the International Conference on Evaluation and Assessment in Software Engineering, New York, NY, USA, 13 June 2022. [Google Scholar]
- Kim, B.; Shin, W.; Hwang, D.-Y.; Kim, K.-H. Attribute-Based Access Control (ABAC) with Decentralized Identifier in the Blockchain-Based Energy Transaction Platform. In Proceedings of the 2021 International Conference on Information Networking (ICOIN), New York, NY, USA, 13–16 January 2021. [Google Scholar]
- Dang, T.L.N.; Nguyen, M.S. An Approach to Data Privacy in Smart Home Using Blockchain Technology. In Proceedings of the 2018 International Conference on Advanced Computing and Applications (ACOMP), Ho Chi Minh City, Vietnam, 27–29 November 2018. [Google Scholar]
- Nicolas, K.; Wang, Y.; Giakos, G.C.; Wei, B.; Shen, H. Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach. IEEE Access 2020, 9, 3838–3857. [Google Scholar] [CrossRef]
- Islam, M.A.; Madria, S. A Permissioned Blockchain Based Access Control System for IOT. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), New York, NY, USA, 14–17 July 2019. [Google Scholar]
Traditional Access-Control Method | Description | Reason Method Is Not Suitable for Blockchain IoT |
---|---|---|
Mandatory access control (MAC) | Highly secure method that restricts user access based on predefined security labels | Time-consuming setup and not ideal for many blockchain IoT applications |
Role-based access control (RBAC) | Determines authorization based on user’s job, responsibilities, and authority level in an organization | Hierarchical nature limits the flexibility needed for dynamic and decentralized blockchain IoT environments |
Discretionary access control (DAC) | Utilizes access-control lists to define user’s permissions for accessing specific resources | Its simple implementation raises security concerns in applications where data integrity is crucial |
Rule-based access control (RBAC) | Access based on predefined roles and levels | Complex-to-manage rule sets, making it challenging to adopt in a dynamic blockchain IoT environment |
Device | CPU | Operating System | Memory | Hard Disk | Platform |
---|---|---|---|---|---|
Microsoft Surface Book 2 | Intel Core i7-8650U 4.2 GHz max | Windows 11 Pro (64-bit) | 16 GB | 512 GB | Ethereum |
Dell XPS 13 9300 | Intel Core i7-1065G7 3.9 GHz max | Windows 11 Home | 16 GB | 460 GB | Hyperledger Fabric |
Raspberry Pi 3 Model B | Quad-core ARM Cortex A53, 1.2 GHz | Raspberry Pi OS Lite | 1 GB SDRAM | 16 GB (microSD card) | Ethereum |
Aspect of Comparison | Ethereum | Hyperledger Fabric |
---|---|---|
Time to build blockchain network with ABAC | Longer construction time for network and smart contract development due to no pre-existing test networks or full solidity contracts | Faster implementation using existing test networks and modified chain code |
Cost of implementing ABAC code | Gas generation and consumption for transactions and smart contract execution, resulting in higher system demands | No gas consumption, leading to lower system strain and easier interaction with network |
Support for smart home environment | Higher support for connecting physical IoT devices to Ethereum network; easier integration of smart equipment | Limited support for adding physical devices to this platform; not the ideal platform for a smart home environment |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pancari, S.; Rashid, A.; Zheng, J.; Patel, S.; Wang, Y.; Fu, J. A Systematic Comparison between the Ethereum and Hyperledger Fabric Blockchain Platforms for Attribute-Based Access Control in Smart Home IoT Environments. Sensors 2023, 23, 7046. https://doi.org/10.3390/s23167046
Pancari S, Rashid A, Zheng J, Patel S, Wang Y, Fu J. A Systematic Comparison between the Ethereum and Hyperledger Fabric Blockchain Platforms for Attribute-Based Access Control in Smart Home IoT Environments. Sensors. 2023; 23(16):7046. https://doi.org/10.3390/s23167046
Chicago/Turabian StylePancari, Stefan, Anik Rashid, Jason Zheng, Shirali Patel, Yi Wang, and Jian Fu. 2023. "A Systematic Comparison between the Ethereum and Hyperledger Fabric Blockchain Platforms for Attribute-Based Access Control in Smart Home IoT Environments" Sensors 23, no. 16: 7046. https://doi.org/10.3390/s23167046
APA StylePancari, S., Rashid, A., Zheng, J., Patel, S., Wang, Y., & Fu, J. (2023). A Systematic Comparison between the Ethereum and Hyperledger Fabric Blockchain Platforms for Attribute-Based Access Control in Smart Home IoT Environments. Sensors, 23(16), 7046. https://doi.org/10.3390/s23167046