Fuzzychain-edge: Adaptive Blockchain Access
- Fuzzychain-edge is a fuzzy logic-based adaptive access control model that integrates zero-knowledge proofs and smart contracts to secure blockchain-enabled edge computing for IoT.
- The model uses a layered architecture combining IoT devices, edge nodes, permissioned blockchains, and cloud services to ensure privacy, traceability, and dynamic access decisions in sensitive domains like healthcare.
- It employs a detailed fuzzy inference system with triangular/trapezoidal membership functions and zk-SNARK integration to achieve low latency and high throughput, as verified by comparative performance metrics.
Fuzzychain-edge is a Fuzzy logic-based adaptive access control model designed for blockchain-based edge computing environments, emphasizing the integration of Zero-Knowledge Proofs (ZKPs), context-aware fuzzy inference, and smart contracts within permissioned distributed ledgers. The framework targets security and privacy challenges in Internet of Things (IoT) domains—especially healthcare—by enabling privacy-preserving, adaptive, and traceable access decisions for sensitive data and services (Farooq et al., 15 Jan 2026).
1. System Architecture
Fuzzychain-edge adopts a four-tier architecture comprising:
- IoT Devices: Sensors and wearables responsible for generating subject attributes (SA), object attributes (OA), trust levels (TL), data sensitivity (DS), and transmitting credentials ().
- Edge Nodes: Host the Fuzzy Logic Access Control Module (FLACM) and a local blockchain node, serving as intermediaries for cryptographic operations and initial processing.
- Permissioned Blockchain Network: Implements distributed, immutable storage with consensus and hosts smart contracts enforcing the access policy (example platforms: Hyperledger Fabric).
- Cloud/Data Center Providers: Deliver the backend computation or store records (e.g., electronic health-record servers).
Data flow occurs through seven steps:
- IoT device submits attributes and credentials.
- Edge node generates zk-SNARK proof ; verification performed on both user and service provider sides.
- Privacy-preserved hashes (, ) are appended onto blockchain .
- FLACM fuzzifies parameters to produce a capability token .
- Rule-based fuzzy inference derives Degree-of-Access ().
- Smart contracts grant or deny access, with all decisions logged immutably.
- Edge node returns result or denial reason to requesting device.
This layered approach separates data capture, policy evaluation, cryptographic proof, blockchain-based enforcement, and service provisioning.
2. Fuzzy Logic Access Control Model
Access control is achieved through a fuzzy inference system evaluating multi-dimensional, contextual variables:
- Input Variables: Five normalized parameters ():
- Data Sensitivity ()
- Trust Level ()
- User Activity ()
- Compliance History ()
- Patient Condition ()
Membership Functions: Triangular and trapezoidal, e.g.:
Rule Base (sample rules):
| Rule | Condition | Decision |
|---|---|---|
| R1 | IF is High AND is Low AND PatientCondition is Critical | Deny |
| R2 | IF is Medium AND is Medium AND PatientCondition is Moderate | Read–Write |
| R3 | IF is Low AND is High AND PatientCondition is Stable | Full |
| R4 | IF UserActivity is Frequent AND ComplianceHistory is Excellent | Full |
| R5 | IF UserActivity is Occasional AND ComplianceHistory is Poor | Read-Only |
Fuzzification and Inference:
- Each input is mapped to fuzzy sets.
- Mamdani inference applies: for each rule ,
- Resulting MFs are aggregated:
Defuzzification:
- Centroid method to obtain crisp decision:
This adaptive evaluation resists role-based injection attacks and supports fine-grained, context-aware enforcement.
3. Zero-Knowledge Proof Integration
ZKPs are deployed to verify credentials and sensitive attributes without revealing underlying information.
- zk-SNARK Protocol:
- Prover constructs proof , where is a public statement (attributes), a witness, with the private key.
- Verifier checks: .
- NP-Relation Definition:
- Security Properties:
- Completeness: Valid always accepted.
- Soundness: Invalid instances are accepted only with negligible probability.
- Zero-Knowledge: Existence of a simulator ensuring indistinguishability between simulated and real proofs.
Hashes of ZKP-derived proofs, salted for privacy, are stored on the blockchain, preventing replay and correlational attacks.
4. Smart Contract Protocols and Implementation
The access logic is enforced on-chain using smart contracts:
- Contract State: Code is specified in Solidity-style pseudocode.
- Enum
Decisionencodes {Deny, ReadOnly, ReadWrite, Full} struct Policylinks subject, object, and decision.- Mappings maintain policies and store ZKP proofs.
- Events signal grant or denial.
- Enum
Pseudocode highlights:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 |
function requestAccess(
bytes32 requestId,
bytes calldata proof,
bytes32 subjHash,
bytes32 objHash
) external {
require(verifyZKP(proof, subjHash), "ZKP failure");
Decision doA = evaluateFuzzy(subjHash, objHash);
if (doA != Decision.Deny) {
policies[requestId] = Policy(subjHash, objHash, doA);
emit AccessGranted(requestId, subjHash);
} else {
emit AccessDenied(requestId, subjHash);
}
} |
- Performance: Verification for zk-SNARKs costs ~200,000 gas, fuzzy inference ~30,000 gas, and hash/storage operations ~8,000 gas.
On-chain access decisions are logged for traceability and non-repudiation.
5. Security and Performance Evaluation
Threat Model and Mitigations:
- Defends against unauthorized access, proof replay, and collusion.
- zk-SNARKs provide credential privacy and replay resistance.
- Fuzzy logic enables dynamic, context-driven adaptation to thwart rule injection.
- Blockchain enforces auditability and immutable policy enforcement.
Evaluation Metrics:
- Latency (), throughput (TPS), access decision accuracy, and privacy coverage.
- Selected performance results:
| Send Rate (tps) | Paper 1 Lat (ms) | Paper 2 Lat (ms) | Fuzzychain Lat (ms) | Paper 1 TPS | Paper 2 TPS | Fuzzychain TPS |
|---|---|---|---|---|---|---|
| 25 | 320 | 315 | 312 | 22 | 22 | 24 |
| 100 | 400 | 390 | 386 | 100 | 100 | 105 |
| 200 | 2285 | 1785 | 1765 | 150 | 160 | 165 |
Fuzzychain-edge achieves lowest observed latency and highest throughput across all tested loads compared to alternative schemes. This suggests improvements in efficiency and scalability within permissioned IoT environments.
6. Limitations and Prospective Enhancements
Identified Limitations:
- zk-SNARK proof generation remains a computational bottleneck for resource-constrained edge nodes.
- Consensus overhead in permissioned blockchains introduces additional delay under elevated transaction rates.
Future Directions:
- Explore zk-STARKs or Bulletproofs to reduce proof size and verification time.
- Offload cryptographic operations to hardware accelerators at the edge.
- Combine reinforcement learning with fuzzy rule-base for dynamic adaptation.
- Extend applicability to other high-value IoT domains (e.g., smart grids, industrial IoT).
- Investigate hybrid on-chain/off-chain storage for performance and cost optimization (Farooq et al., 15 Jan 2026).
Fuzzychain-edge defines a direction for integrating privacy-preserving, adaptive access control in decentralized edge computing, supporting verifiable, context-sensitive, and efficient policies across sensitive domains.