Bhat Snober Ali, Yashwant Singh, P. Singh, M. Răboacă
{"title":"物联网中的动态访问控制:使用智能合约监控用户行为","authors":"Bhat Snober Ali, Yashwant Singh, P. Singh, M. Răboacă","doi":"10.1109/ECAI50035.2020.9223240","DOIUrl":null,"url":null,"abstract":"Dynamic Access Control in IoT (Internet of Things) through monitoring user behavior is a procedure that defines access control theory. Usually, an institution provides services to a user who owns a specific role that was issued by another institution. Such access control methods are possible in man-to-man communications only, but not in computer networks, because it is hard to establish security and limit spiteful actions through the users with high-risk values. High-risk values are caused by the users who do the tasks which they are not intended to do. In this paper, we bring forward a technique to limit malicious activities by monitoring user behavior using smart contracts. This proposed technique uses blockchain based technology and smart contracts for trust and the confirmation of user’s possession. We described the substructure, containing two main parts: smart contract and an authentication arrangement protocol.","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Dynamic Access Control In Iot: Monitoring User Behavior Using Smart Contracts\",\"authors\":\"Bhat Snober Ali, Yashwant Singh, P. Singh, M. Răboacă\",\"doi\":\"10.1109/ECAI50035.2020.9223240\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Dynamic Access Control in IoT (Internet of Things) through monitoring user behavior is a procedure that defines access control theory. Usually, an institution provides services to a user who owns a specific role that was issued by another institution. Such access control methods are possible in man-to-man communications only, but not in computer networks, because it is hard to establish security and limit spiteful actions through the users with high-risk values. High-risk values are caused by the users who do the tasks which they are not intended to do. In this paper, we bring forward a technique to limit malicious activities by monitoring user behavior using smart contracts. This proposed technique uses blockchain based technology and smart contracts for trust and the confirmation of user’s possession. We described the substructure, containing two main parts: smart contract and an authentication arrangement protocol.\",\"PeriodicalId\":324813,\"journal\":{\"name\":\"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)\",\"volume\":\"246 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECAI50035.2020.9223240\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECAI50035.2020.9223240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic Access Control In Iot: Monitoring User Behavior Using Smart Contracts
Dynamic Access Control in IoT (Internet of Things) through monitoring user behavior is a procedure that defines access control theory. Usually, an institution provides services to a user who owns a specific role that was issued by another institution. Such access control methods are possible in man-to-man communications only, but not in computer networks, because it is hard to establish security and limit spiteful actions through the users with high-risk values. High-risk values are caused by the users who do the tasks which they are not intended to do. In this paper, we bring forward a technique to limit malicious activities by monitoring user behavior using smart contracts. This proposed technique uses blockchain based technology and smart contracts for trust and the confirmation of user’s possession. We described the substructure, containing two main parts: smart contract and an authentication arrangement protocol.