Research Article
A Right Transfer Access Control Model of Internet of Things Based on Smart Contract
Table 4
Model state transition table.
| V | Input set U | Output set T |
| V0: initial state of system | U0: CS_PEP accepts the request from the RE and initials instance. | T0: send transaction and call request function. | V1: GrantAccess | U1: CS_AA respondes to the request from CS_PEP. | T1: get the attributes of RO and RE. | V2: GetAccess | U2: call the policy decision function from CS_PDP. | T2: emit the policy decision event. | V3: PAP emits events | U3: match attributes and policy. | T3: emit the request result event. | V4: access | U4: access RO’s resources typically and update the attributes of the RE. | T4: send a new access request. | V5: DeliveryAccess | U5: TS accepts right delivery messages from A. | T5: TS sends the information of right transfer message to CS. | V6: PIP gets information | U6: verify the legitimacy of the attributes and constraints of TS and obtain the relevant information of B from PIP. | T6: return the decision result to TS. | V7: delivery token | U7: TS sends the token to B and informs A. | T7: send a new access request. | V8: end state of system | U8: end access control of the subject. | T8: end the whole process of access control. |
|
|