Vol. 24 No. 2 (2025): Mapana Journal of Sciences
Research Articles

Blockchain-Driven Access Control and Data Protection Framework for Industrial IoT Systems

Yashaswini N.
Sri Siddhartha Academy of Higher Education, Agalakote, Tumkur, Karnataka, India
Sujatha S. R.
Department of Computer Science Engineering, Sri Siddhartha Institute of Technology, Tumkur, Karnataka, India

Published 2025-07-22

Keywords

  • Blockchain,
  • Industrial IoT (IIoT),
  • Access Control,
  • Data Protection,
  • Smart Contracts,
  • Role-Based Access Control (RBAC),
  • Data Integrity,
  • Cloud Integration
  • ...More
    Less

Abstract

The exponential expansion of Industrial Internet of Things (IIoT) presents major difficulties in guaranteeing strong data security and safe access management over distributed and resource-limited settings. This paper suggests a blockchain-driven architecture combining dynamic access control based on roles with data integrity and confidentiality assurance mechanisms catered for IIoT environments. Three basic levels define the architecture: the IoT layer with intelligent sensors and actuators; the blockchain layer to offer distributed access enforcement and tamper-proof audit trails; and the cloud layer for scalable data storage and processing. Using smart contracts, the system automates access delegation, revocation, and real-time permission changes, hence reducing single points of failure and unwanted access. Compared to centralised systems, experimental evaluation employing Python simulations shows enhanced accuracy, precision, and security at the tradeoff of quite limited throughput. Emphasising privacy, transparency, and resilience, this study provides the basis for reliable, scalable, auditable IIoT infrastructures.

References

  1. . K. Yu, M. Arifuzzaman, Z. Wen, D. Zhang, and T. Sato, “A key management scheme for secure communications of information centric advanced metering infrastructure in smart grid,” IEEE transactions on instrumentation and measurement, vol. 64, no. 8, pp. 2072–2085, 2015.
  2. . Z. Guo, K. Yu, A. Jolfaei, A. K. Bashir, A. O. Almagrabi and N. Kumar, “A Fuzzy Detection System for Rumors through Explainable Adaptive Learning,” IEEE Transactions on Fuzzy Systems, doi: 10.1109/TFUZZ.2021.3052109.
  3. . H. Li, K. Yu, B. Liu, C. Feng, Z. Qin and G. Srivastava, ”An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things,” IEEE Journal of Biomedical and Health Informatics, 2021, doi: 10.1109/JBHI.2021.3075995.
  4. . K.-K. R. Choo, S. Gritzalis, and J. H. Park, “Cryptographic solutions for industrial internet-of-things: Research challenges and opportunities,” IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3567–3569, aug 2018.
  5. . K. Yu, Z. Guo, Y. Shen, W. Wang, J. C. Lin, T. Sato, “Secure Artificial Intelligence of Things for Implicit Group Recommendations”, IEEE Internet of Things Journal, 2021, doi: 10.1109/JIOT.2021.3079574.
  6. . L. Tan, K. Yu, F. Ming, X. Cheng, G. Srivastava, “Secure and Resilient Artificial Intelligence of Things: a HoneyNet Approach for Threat Detection and Situational Awareness”, IEEE Consumer Electronics Magazine, 2021, doi: 10.1109/MCE.2021.3081874.
  7. . S. Bhatt, T. K. Pham, M. Gupta, J. Benson, J. Park, and R. Sandhu, “Attribute-based access control for AWS Internet of Things and secure industries of the future,” IEEE Access, vol. 9, pp. 107200–107223, 2021.
  8. . Y. Liu et al., “Capability-based IoT access control using blockchain,” Digital Commun. Netw. vol. 7, no. 4, pp. 463–469, 2021. [Online]. Available: https://www.sciencedirect. com/science/article/ pii/S2352864820302844
  9. . S. A. Chaudhry, K. Yahya, F. Al-Turjman, and M.-H. Yang, “A secure and reliable device access control scheme for IoT based sensor cloud systems,” IEEE Access, vol. 8, pp. 139244–139254, 2020.
  10. . L. Liu, H. Wang, and Y. Zhang, “Secure IoT data Outsourcing with aggregate statistics and fine-grained access control,” IEEE Access, vol. 8, pp. 95057–95067, 2020.
  11. . Q. Yang, M. Zhang, Y. Zhou, T. Wang, Z. Xia, and B. Yang, “A noninteractive attribute-based access control scheme by blockchain for IoT,” Electronics, vol. 10, no. 15, p. 1855, 2021. [Online]. Available: https: //www.mdpi.com/2079-9292/10/15/1855
  12. . A. Kousalya, K. Sakthidasan, and A. Latha, “Reliable service availability and access control method for cloud assisted IoT communications,” Wireless Netw., vol. 27, pp. 881–892, Feb. 2021.
  13. . K. M. Hossein, M. E. Esmaeili, T. Dargahi, A. Khonsari, and M. Conti, “BCHealth: A novel blockchain-based privacy-preserving architecture for IoT Healthcare applications,” Comput. Commun., vol. 180, pp. 31–47, Dec. 2021. [Online]. Available: https://www.sciencedirect.com/science/article /pii/S0140366421003054
  14. . Z. Li, J. Hao, J. Liu, H. Wang, and M. Xian, “An IoT-applicable access control model under double-layer blockchain,” IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 68, no. 6, pp. 2102–2106, Jun. 2021.
  15. . U. Khalid, M. Asim, T. Baker, P. C. K. Hung, M. A. Tariq, and L. Rafferty, “A decentralized lightweight blockchain-based authentication mechanism for IoT systems,” Clust. Comput., vol. 23, pp. 2067–2087, Feb. 2020.
  16. . S. Xiong, Q. Ni, L. Wang, and Q. Wang, “SEM-ACSIT: Secure and efficient multiauthority access control for IoT cloud storage,” IEEE Internet Things J., vol. 7, no. 4, pp. 2914–2927, Apr. 2020.
  17. . S. Banerjee et al., “Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment,” J. Inf. Security Appl., vol. 53, Aug. 2020, Art. no. 102503. [Online]. Available: https://www.sciencedirect.com/ science/article/pii/S2214212619310178
  18. . M. Dammak, S.-M. Senouci, M. A. Messous, M. H. Elhdhili, and C. Gransart, “Decentralized lightweight group key management for dynamic access control in IoT environments,” IEEE Trans. Netw. Service Manag., vol. 17, no. 3, pp. 1742–1757, Sep. 2020.
  19. . P. Chinnasamy, P. Deepalakshmi, A. K. Dutta, J. You, and G. P. Joshi, “Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system,” Mathematics, vol. 10, no. 1, p. 68, 2022. [Online]. Available: https://www.mdpi.com/ 2227-7390/10/1/68
  20. . N. Tapas, F. Longo, G. Merlino, and A. Puliafito, “Experimenting with smart contracts for access control and delegation in IoT,” Future Gener. Comput. Syst., vol. 111, pp. 324–338, Oct. 2020. [Online]. Available: https://www. sciencedirect.com/science/article/pii/S0167739X18326979
  21. . S. Pal, T. Rabehaja, M. Hitchens, V. Varadharajan, and A. Hill, “On the design of a flexible delegation model for the Internet of Things using blockchain,” IEEE Trans. Ind. Informat., vol. 16, no. 5, pp. 3521–3530, May 2020
  22. . Zhong, Botao, Xing Pan, Lieyun Ding, Qiang Chen, and Xiaowei Hu. "Blockchain-driven integration technology for the AEC industry." Automation in Construction 150 (2023): 104791.
  23. . Tong, Wei, Xuewen Dong, Yulong Shen, Xiaohong Jiang, and Zhiwei Zhang. "A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity." Future Generation Computer Systems 135 (2022): 85-94.
  24. . Patil, Pradnya, M. Sangeetha, and Vidhyacharan Bhaskar. "Blockchain for IoT access control, security and privacy: a review." Wireless Personal Communications 117, no. 3 (2021): 1815-1834.
  25. . Sodhro, Ali Hassan, Sandeep Pirbhulal, Muhammad Muzammal, and Luo Zongwei. "Towards blockchain-enabled security technique for industrial internet of things based decentralized applications." Journal of Grid Computing 18, no. 4 (2020): 615-628.
  26. . Alshehri, Suhair, Omaimah Bamasaq, Daniyal Alghazzawi, and Arwa Jamjoom. "Dynamic secure access control and data sharing through trusted delegation and revocation in a blockchain-enabled cloud-IoT environment." IEEE Internet of Things Journal 10, no. 5 (2022): 4239-4256.