Rancang Bangun Identity and Access Management IoT Berbasis KSI dan Permissioned Blockchain

Guntur Dharma Putra, Sujoko Sumaryono, Widyawan Widyawan

Abstract


Blockchain menawarkan berbagai dobrakan di bidang teknologi, mulai dari bidang keuangan hingga kesehatan. Beberapa usulan juga menerapkan blockchain pada teknologi IoT untuk meningkatkan unjuk kerja dan scalability. Namun, tipikal penerapan teknologi IoT dalam skala masif masih memiliki beberapa kendala, terlebih dalam hal manajemen akses dan identitas peranti yang terkoneksi. Makalah ini mengusulkan kombinasi dari permissioned blockchain dan teknologi Keyless Signature Infrastructure (KSI) sebagai metode untuk mengatur hak akses dan identitas peranti IoT. KSI dikenal mampu untuk memberikan layanan tanda tangan digital tanpa tergantung pada kunci privat maupun publik dengan menggunakan teknik pohon hash. Dengan karakteristik dari blockchain yang terdistribusi, teknologi KSI dapat dipadukan secara lebih efisien. Hasil yang diperoleh memberikan manajemen akses dan identitas dengan scalability yang tinggi.

Keywords


Manajemen Identitas dan Akses; Permissioned Blockchain; Internet of Things; Keyless Signature Infrastructure; Keamanan Data dan Jaringan

Full Text:

PDF

References


S. Nakamoto, (2008) “Bitcoin: a peer-to-peer electronic cash system,” [Online], http//www.bitcoin.org/bitcoin.pdf, tanggal akses: 13 Agt. 2018.

G. Brambilla, “Peer-to-Peer Location-Based Services based on Blockchain and Web Technologies,” Disertasi, Università degli Studi di Parma, Parma, Italia, Des. 2017.

S. Wilkinson dan J. Lowry, “MetaDisk: Blockchain-Based Decentralized File Storage Application,” Storj Labs Inc., Technical Report, hal. 1–11, 2014.

S. Ibba, A. Pinna, M. Seu, dan F.E. Pani, “CitySense,” Proc. XP2017 Sci. Work. - XP ’17, 2017, hal. 1–5.

X. Yue, H. Wang, D. Jin, M. Li, dan W. Jiang, “Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control,” J. Med. Syst., Vol. 40, No. 10, hal. 1–8, Oct. 2016.

A. Dorri, S.S. Kanhere, R. Jurdak, dan P. Gauravaram, “Blockchain for IoT Security and Privacy: The Case Study of a Smart Home,” 2017 IEEE Int. Conf. Pervasive Comput. Commun. Work. (PerCom Work), 2017, hal. 618–623.

A. Dorri, S.S. Kanhere, dan R. Jurdak, “Towards an Optimized BlockChain for IoT,” Proc. Second Int. Conf. Internet-of-Things Des. Implement. - IoTDI ’17, 2017, hal. 173–178.

H. Shafagh, L. Burkhalter, A. Hithnawi, dan S. Duquennoy, “Towards Blockchain-based Auditable Storage and Sharing of IoT Data,” Proc. of the 2017 on Cloud Computing Security Workshop, 2017, hal. 45–50.

M.A. Khan dan K. Salah, “IoT Security: Review, Blockchain Solutions, and Open Challenges,” Futur. Gener. Comput. Syst., Vol. 82, hal. 395–411, 2018.

J. Bernal Bernabe, J.L. Hernandez-Ramos, and A.F. Skarmeta Gomez, “Holistic Privacy-Preserving Identity Management System for the Internet of Things,” Mob. Inf. Syst., Vol. 2017, hal. 1–20, 2017.

O. Novo, “Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT,” IEEE Internet Things J., Vol. 5, No. 2, hal. 1184–1195, 2018.

M. Jakobsoson dan A. Juels, “Process of Work and Bread Pudding Protocols (Extended Abstract),” Proc. IFIP TC6/TC11 Jt. Work. Conf. Secur. Inf. Net- Work. Commun. Multimed. Secur., 1999, hal. 258–272.

F. Dai, Y. Shi, N. Meng, L. Wei, dan Z. Ye, “From Bitcoin to Cybersecurity: A Comparative Study of Blockchain Application and Security Issues,” 2017 4th Int. Conf. Syst. Informatics, ICSAI 2017, 2018, hal. 975–979.

J.H. Lee, “BIDaaS: Blockchain Based ID As a Service,” IEEE Access, Vol. 6, hal. 2274–2278, 2017.

A. Buldas, A. Kroonmaa, dan R. Laanoja, “Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees,” Secure IT Systems, 2013, pp. 313–320.

N. Emmadi dan H. Narumanchi, “Reinforcing Immutability of Permissioned Blockchains with Keyless Signatures’ Infrastructure,” Proc. of the 18th International Conference on Distributed Computing and Networking - ICDCN ’17, 2017, hal. 1–6.

A. Khalimonenko, J. Strohschneider, dan O. Kupreev, (2017) “DDoS Attacks in Q4 2016,” [Online] https://securelist.com/ddos-attacks-inq4-2016/77412/, tanggal akses: 13 Agt. 2018.

Z. Shelby, K. Hartke, dan C. Bormann, “The Constrained Application Protocol (CoAP),” Internet Engineering Task Force, Jun. 2014.




DOI: http://dx.doi.org/10.22146/jnteti.v7i4.455

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI)

JNTETI (Jurnal Nasional Teknik Elektro dan Teknologi Informasi)

Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik Universitas Gadjah Mada
Jl. Grafika No 2. Kampus UGM Yogyakarta 55281
+62 274 552305
jnteti@ugm.ac.id