{"title":"Group-Capability-Based Access Control with Ring Signature","authors":"Xiaoying Zhu , Shihong Zou , Guoai Xu , Jinwen Xi","doi":"10.1016/j.jisa.2025.104014","DOIUrl":null,"url":null,"abstract":"<div><div>With the rapid development of Internet of Things (IoT) technology, the number of connected devices is expected to reach 75 billion worldwide by 2025. loT devices are particularly susceptible to security breaches, making robust access control mechanisms crucial for safeguarding legitimate resource access. Traditional access control systems, however, struggle to manage the scale of loT environments effectively. This paper introduces a novel access control scheme, Group-Capability-Based Access Control with Ring Signature (G-CapBAC), designed and proposed to enhance the scalability of Smart Campus IoT. G-CapBAC leverages blockchain technology as a trust anchor to enforce access policies for loT devices, without requiring these resource-constrained devices to participate directly in the blockchain network, this approach significantly reduces the computational and storage demands on loT devices. In addition, the proposed scheme manages capability tokens by group utilizing the ring signature, which not only reduces storage requirements but also facilitates access policy management. Our security analysis substantiates the robustness of the G-CapBAC scheme. Experimental results indicate superior storage efficiency and expedited access request processing when compared to traditional Capability-Based Access Control (CapBAC).</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104014"},"PeriodicalIF":3.8000,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625000523","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
With the rapid development of Internet of Things (IoT) technology, the number of connected devices is expected to reach 75 billion worldwide by 2025. loT devices are particularly susceptible to security breaches, making robust access control mechanisms crucial for safeguarding legitimate resource access. Traditional access control systems, however, struggle to manage the scale of loT environments effectively. This paper introduces a novel access control scheme, Group-Capability-Based Access Control with Ring Signature (G-CapBAC), designed and proposed to enhance the scalability of Smart Campus IoT. G-CapBAC leverages blockchain technology as a trust anchor to enforce access policies for loT devices, without requiring these resource-constrained devices to participate directly in the blockchain network, this approach significantly reduces the computational and storage demands on loT devices. In addition, the proposed scheme manages capability tokens by group utilizing the ring signature, which not only reduces storage requirements but also facilitates access policy management. Our security analysis substantiates the robustness of the G-CapBAC scheme. Experimental results indicate superior storage efficiency and expedited access request processing when compared to traditional Capability-Based Access Control (CapBAC).
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.