Table 2: Communication overhead analysis.
Ref. No Costly operations for Communication overhead Communication overhead in bits
(Wang et al., 2018) 4|G| + |m| 4608 bits
(Liu et al., 2021) 3|G| + |m| 3584 bits
(Zhang et al., 2022) 4|G| + |m| 4608 bits
(Zhu et al., 2018a) 3|G| + |m| 3584 bits
Proposed 3|q| + |m| 752 bits
IoT using blockchain technology and conduct a se-
curity analysis to evaluate and compare the proposed
scheme to existing schemes. The results indicate that
the proposed scheme has the advantage of using mini-
mal computation time and communication bandwidth
compared to previous solutions. The authors suggest
that the ABAC scheme using blockchain combined
with a lightweight Hyperelliptic Curve Cryptosystem
(HCC) is well suited for secure deployment in IoT.
In the future, we will address the privacy concerns
that are raised by the practice of storing access histo-
ries on a blockchain. We will look into a more ad-
vanced privacy-preserving technique that offers the
benefits of blockchain technology without compro-
mising user privacy.
REFERENCES
Alansari, S., Paci, F., and Sassone, V. (2017). A distributed
access control system for cloud federations. pages
2131–2136. IEEE.
Alniamy, A. and Taylor, B. D. (2020). Attribute-based
access control of data sharing based on hyperledger
blockchain. pages 135–139.
Arasi, V. E., Gandhi, K. I., and Kulothungan, K. (2022).
Auditable attribute-based data access control using
blockchain in cloud storage. Journal of Supercomput-
ing, 2022(1):1–27.
Ding, S., Cao, J., Li, C., Fan, K., and Li, H. (2019).
Novel attribute-based access control scheme using
blockchain for iot. IEEE Access, 7(1):38431–38441.
Dolev, D. and Yao, A. (1983). On the security of public key
protocols. IEEE Trans. Inf. theory, 29(2):198–208.
Dukkipati, C., Zhang, Y., and Cheng, L. C. (2018). Decen-
tralized, blockchain based access control framework
for the heterogeneous internet of things. pages 61–69.
ACM.
Ghorbel, A., Ghorbel, M., and Jmaiel, M. (2021). Account-
able privacy preserving attribute-based access control
for cloud services enforced using blockchain. Interna-
tional Journal of Information Security, 2021(1):1–22.
Hu, Vincent, C., Kuhn, D. R., Ferraiolo, D. F., and Voa,
J. (2015). Attribute-based access control. Computer,
48(2):85–88.
Hussain, S., Ullah, I., Khattak, H., Adnan, M., Kumari, S.,
Ullah, S. S., Khan, M. A., and Khattak, S. J. (2020).
A lightweight and formally secure certificate based
signcryption with proxy re-encryption (cbsre) for in-
ternet of things enabled smart grid. IEEE Access,
8(1):93230–93248.
Hussain, S., Ullah, I., Khattak, H., Khan, M. A., Chen, C.,
and Kumari, S. (2021). A lightweight and provable
secure identity-based generalized proxy signcryption
(ibgps) scheme for industrial internet of things (iiot).
Journal of Information Security and Applications,
58:102625.
Jiang, X. (2021). Decentralized, blockchain based access
control framework for the heterogeneous internet of
things. pages 21–23. J. Phys Conf. Ser. 1955.
Khan, M., Rehman, S., Uddin, M., Nisar, S., and Noor,
F. (2020). n online-offline certificateless signature
scheme for internet of health things. Journal of
Healthcare Engineering, 2020(1):1–10.
Kumar, S., Tiwari, P., and Zymbler, M. (2019). Internet
of things is a revolutionary approach for future tech-
nology enhancement: a review. Journal of Big data,
6(1):1–21.
Liu, X., Zheng, Y., and Li, X. Z. (2021). A re-
vocable attribute-based access control system using
blockchain. In Journal of Physics: Conference Series,
1971(1):012058.
Lu, X., Fu, S., Jiang, C., and Lio, P. (2021). A fine-grained
iot data access control scheme combining attribute-
based encryption and blockchain. Security and Com-
munication Networks, 2021:1–13.
Omolara, Esther, A., Alabdulatif, A., Abiodun, I., Alaw-
ida, M., and Arshad, H. (2022). The internet of
things security: A survey encompassing unexplored
areas and new insights. Computers and Security,
112(1):102494.
Rouhani, S., Belchior, R., and Cruz, R. S. (2021). Dis-
tributed attribute-based access control system us-
ing permissioned blockchain. World Wide Web,
24(1):617–644.
Sandhu, S. R. and Samarati, P. (1994). Access control: prin-
ciple and practice. IEEE communications magazine,
32(9):40–48.
Sinha, Bahadur, B., and Dhanalakshmi, R. (2022). Recent
advancements and challenges of internet of things in
smart agriculture: A survey. Future Generation Com-
puter Systems, 126(1):169–184.
Swessi, D. and Idoudi, H. (2022). A survey on internet-
of-things security: threats and emerging coun-
termeasures. Wireless Personal Communications,
124(2):1557–1592.
Ullah, I., Khan, M. A., F.Khan, M.A.Jan, R.Srinivasan,
S.Mastorakis, S.Hussain, and Khattak, H. (2021). An
efficient and secure multimessage and multireceiver
SECRYPT 2023 - 20th International Conference on Security and Cryptography
538