Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
The industrial Internet of Things (IIoT) supports recent developments in data management and information services, as well as services for smart factories. Nowadays, many mature IIoT cloud platforms are available to serve smart factories. However, due to the semicredibility nature of the IIoT cloud...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on industrial informatics 2021-11, Vol.17 (11), p.7669-7678 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 7678 |
---|---|
container_issue | 11 |
container_start_page | 7669 |
container_title | IEEE transactions on industrial informatics |
container_volume | 17 |
creator | Yu, Keping Tan, Liang Aloqaily, Moayad Yang, Hekun Jararweh, Yaser |
description | The industrial Internet of Things (IIoT) supports recent developments in data management and information services, as well as services for smart factories. Nowadays, many mature IIoT cloud platforms are available to serve smart factories. However, due to the semicredibility nature of the IIoT cloud platforms, how to achieve secure storage, access control, information update and deletion for smart factory data, as well as the tracking and revocation of malicious users has become an urgent problem. To solve these problems, in this article, a blockchain-enhanced security access control scheme that supports traceability and revocability has been proposed in IIoT for smart factories. The blockchain first performs unified identity authentication, and stores all public keys, user attribute sets, and revocation list. The system administrator then generates system parameters and issues private keys to users. The domain administrator is responsible for formulating domain security and privacy-protection policies, and performing encryption operations. If the attributes meet the access policies and the user's ID is not in the revocation list, they can obtain the intermediate decryption parameters from the edge/cloud servers. Malicious users can be tracked and revoked during all stages if needed, which ensures the system security under the Decisional Bilinear Diffie-Hellman (DBDH) assumption and can resist multiple attacks. The evaluation has shown that the size of the public/private keys is smaller compared to other schemes, and the overhead time is less for public key generation, data encryption, and data decryption stages. |
doi_str_mv | 10.1109/TII.2021.3049141 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TII_2021_3049141</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9314268</ieee_id><sourcerecordid>2556486970</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-29d7f80ff9714e9ced6fcefb1830f1ed9fb4fa841f65c265dec16c3c151203f23</originalsourceid><addsrcrecordid>eNo9kM1LAzEQxYMoWKt3wUvA89ZMPrabox9VFyqCrngMaTZxU2tSs1vB_96UFk8zMO_N4_0QOgcyASDyqqnrCSUUJoxwCRwO0Agkh4IQQQ7zLgQUjBJ2jE76fkkImxImR-jpZhXNp-m0D8UsdDoY2-I7PWj82unkwwd-90OHm6SN1YuVxTrku0_WDPjF_kSjBx8D9gHXdWxO0ZHTq96e7ecYvd3PmtvHYv78UN9ezwtDJQwFle3UVcQ5OQVuZY4snbFuARUjDmwr3YI7XXFwpTC0FK01UBpmQEBu4Cgbo8vd33WK3xvbD2oZNynkSEWFKHlVylxvjMhOZVLs-2SdWif_pdOvAqK20FSGprbQ1B5atlzsLN5a-y-XDDgtK_YHAu1nKg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2556486970</pqid></control><display><type>article</type><title>Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT</title><source>IEEE Electronic Library (IEL)</source><creator>Yu, Keping ; Tan, Liang ; Aloqaily, Moayad ; Yang, Hekun ; Jararweh, Yaser</creator><creatorcontrib>Yu, Keping ; Tan, Liang ; Aloqaily, Moayad ; Yang, Hekun ; Jararweh, Yaser</creatorcontrib><description>The industrial Internet of Things (IIoT) supports recent developments in data management and information services, as well as services for smart factories. Nowadays, many mature IIoT cloud platforms are available to serve smart factories. However, due to the semicredibility nature of the IIoT cloud platforms, how to achieve secure storage, access control, information update and deletion for smart factory data, as well as the tracking and revocation of malicious users has become an urgent problem. To solve these problems, in this article, a blockchain-enhanced security access control scheme that supports traceability and revocability has been proposed in IIoT for smart factories. The blockchain first performs unified identity authentication, and stores all public keys, user attribute sets, and revocation list. The system administrator then generates system parameters and issues private keys to users. The domain administrator is responsible for formulating domain security and privacy-protection policies, and performing encryption operations. If the attributes meet the access policies and the user's ID is not in the revocation list, they can obtain the intermediate decryption parameters from the edge/cloud servers. Malicious users can be tracked and revoked during all stages if needed, which ensures the system security under the Decisional Bilinear Diffie-Hellman (DBDH) assumption and can resist multiple attacks. The evaluation has shown that the size of the public/private keys is smaller compared to other schemes, and the overhead time is less for public key generation, data encryption, and data decryption stages.</description><identifier>ISSN: 1551-3203</identifier><identifier>EISSN: 1941-0050</identifier><identifier>DOI: 10.1109/TII.2021.3049141</identifier><identifier>CODEN: ITIICH</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Access control ; Big data ; Blockchain ; Cloud computing ; Cryptography ; Data encryption ; Data management ; Data retrieval ; data sharing ; Domains ; Encryption ; Factories ; Industrial applications ; Industrial Internet of Things ; industrial Internet-of-Thing (IIoT) ; Industrial plants ; Information management ; Information services ; Internet of Things ; Parameters ; Policies ; Privacy ; Security ; smart factory ; Smart manufacturing ; traceable and revocation</subject><ispartof>IEEE transactions on industrial informatics, 2021-11, Vol.17 (11), p.7669-7678</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c291t-29d7f80ff9714e9ced6fcefb1830f1ed9fb4fa841f65c265dec16c3c151203f23</citedby><cites>FETCH-LOGICAL-c291t-29d7f80ff9714e9ced6fcefb1830f1ed9fb4fa841f65c265dec16c3c151203f23</cites><orcidid>0000-0003-2443-7234 ; 0000-0002-7363-6697</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9314268$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9314268$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yu, Keping</creatorcontrib><creatorcontrib>Tan, Liang</creatorcontrib><creatorcontrib>Aloqaily, Moayad</creatorcontrib><creatorcontrib>Yang, Hekun</creatorcontrib><creatorcontrib>Jararweh, Yaser</creatorcontrib><title>Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT</title><title>IEEE transactions on industrial informatics</title><addtitle>TII</addtitle><description>The industrial Internet of Things (IIoT) supports recent developments in data management and information services, as well as services for smart factories. Nowadays, many mature IIoT cloud platforms are available to serve smart factories. However, due to the semicredibility nature of the IIoT cloud platforms, how to achieve secure storage, access control, information update and deletion for smart factory data, as well as the tracking and revocation of malicious users has become an urgent problem. To solve these problems, in this article, a blockchain-enhanced security access control scheme that supports traceability and revocability has been proposed in IIoT for smart factories. The blockchain first performs unified identity authentication, and stores all public keys, user attribute sets, and revocation list. The system administrator then generates system parameters and issues private keys to users. The domain administrator is responsible for formulating domain security and privacy-protection policies, and performing encryption operations. If the attributes meet the access policies and the user's ID is not in the revocation list, they can obtain the intermediate decryption parameters from the edge/cloud servers. Malicious users can be tracked and revoked during all stages if needed, which ensures the system security under the Decisional Bilinear Diffie-Hellman (DBDH) assumption and can resist multiple attacks. The evaluation has shown that the size of the public/private keys is smaller compared to other schemes, and the overhead time is less for public key generation, data encryption, and data decryption stages.</description><subject>Access control</subject><subject>Big data</subject><subject>Blockchain</subject><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Data management</subject><subject>Data retrieval</subject><subject>data sharing</subject><subject>Domains</subject><subject>Encryption</subject><subject>Factories</subject><subject>Industrial applications</subject><subject>Industrial Internet of Things</subject><subject>industrial Internet-of-Thing (IIoT)</subject><subject>Industrial plants</subject><subject>Information management</subject><subject>Information services</subject><subject>Internet of Things</subject><subject>Parameters</subject><subject>Policies</subject><subject>Privacy</subject><subject>Security</subject><subject>smart factory</subject><subject>Smart manufacturing</subject><subject>traceable and revocation</subject><issn>1551-3203</issn><issn>1941-0050</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kM1LAzEQxYMoWKt3wUvA89ZMPrabox9VFyqCrngMaTZxU2tSs1vB_96UFk8zMO_N4_0QOgcyASDyqqnrCSUUJoxwCRwO0Agkh4IQQQ7zLgQUjBJ2jE76fkkImxImR-jpZhXNp-m0D8UsdDoY2-I7PWj82unkwwd-90OHm6SN1YuVxTrku0_WDPjF_kSjBx8D9gHXdWxO0ZHTq96e7ecYvd3PmtvHYv78UN9ezwtDJQwFle3UVcQ5OQVuZY4snbFuARUjDmwr3YI7XXFwpTC0FK01UBpmQEBu4Cgbo8vd33WK3xvbD2oZNynkSEWFKHlVylxvjMhOZVLs-2SdWif_pdOvAqK20FSGprbQ1B5atlzsLN5a-y-XDDgtK_YHAu1nKg</recordid><startdate>20211101</startdate><enddate>20211101</enddate><creator>Yu, Keping</creator><creator>Tan, Liang</creator><creator>Aloqaily, Moayad</creator><creator>Yang, Hekun</creator><creator>Jararweh, Yaser</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-2443-7234</orcidid><orcidid>https://orcid.org/0000-0002-7363-6697</orcidid></search><sort><creationdate>20211101</creationdate><title>Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT</title><author>Yu, Keping ; Tan, Liang ; Aloqaily, Moayad ; Yang, Hekun ; Jararweh, Yaser</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-29d7f80ff9714e9ced6fcefb1830f1ed9fb4fa841f65c265dec16c3c151203f23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Big data</topic><topic>Blockchain</topic><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Data management</topic><topic>Data retrieval</topic><topic>data sharing</topic><topic>Domains</topic><topic>Encryption</topic><topic>Factories</topic><topic>Industrial applications</topic><topic>Industrial Internet of Things</topic><topic>industrial Internet-of-Thing (IIoT)</topic><topic>Industrial plants</topic><topic>Information management</topic><topic>Information services</topic><topic>Internet of Things</topic><topic>Parameters</topic><topic>Policies</topic><topic>Privacy</topic><topic>Security</topic><topic>smart factory</topic><topic>Smart manufacturing</topic><topic>traceable and revocation</topic><toplevel>online_resources</toplevel><creatorcontrib>Yu, Keping</creatorcontrib><creatorcontrib>Tan, Liang</creatorcontrib><creatorcontrib>Aloqaily, Moayad</creatorcontrib><creatorcontrib>Yang, Hekun</creatorcontrib><creatorcontrib>Jararweh, Yaser</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on industrial informatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yu, Keping</au><au>Tan, Liang</au><au>Aloqaily, Moayad</au><au>Yang, Hekun</au><au>Jararweh, Yaser</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT</atitle><jtitle>IEEE transactions on industrial informatics</jtitle><stitle>TII</stitle><date>2021-11-01</date><risdate>2021</risdate><volume>17</volume><issue>11</issue><spage>7669</spage><epage>7678</epage><pages>7669-7678</pages><issn>1551-3203</issn><eissn>1941-0050</eissn><coden>ITIICH</coden><abstract>The industrial Internet of Things (IIoT) supports recent developments in data management and information services, as well as services for smart factories. Nowadays, many mature IIoT cloud platforms are available to serve smart factories. However, due to the semicredibility nature of the IIoT cloud platforms, how to achieve secure storage, access control, information update and deletion for smart factory data, as well as the tracking and revocation of malicious users has become an urgent problem. To solve these problems, in this article, a blockchain-enhanced security access control scheme that supports traceability and revocability has been proposed in IIoT for smart factories. The blockchain first performs unified identity authentication, and stores all public keys, user attribute sets, and revocation list. The system administrator then generates system parameters and issues private keys to users. The domain administrator is responsible for formulating domain security and privacy-protection policies, and performing encryption operations. If the attributes meet the access policies and the user's ID is not in the revocation list, they can obtain the intermediate decryption parameters from the edge/cloud servers. Malicious users can be tracked and revoked during all stages if needed, which ensures the system security under the Decisional Bilinear Diffie-Hellman (DBDH) assumption and can resist multiple attacks. The evaluation has shown that the size of the public/private keys is smaller compared to other schemes, and the overhead time is less for public key generation, data encryption, and data decryption stages.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TII.2021.3049141</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0003-2443-7234</orcidid><orcidid>https://orcid.org/0000-0002-7363-6697</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1551-3203 |
ispartof | IEEE transactions on industrial informatics, 2021-11, Vol.17 (11), p.7669-7678 |
issn | 1551-3203 1941-0050 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TII_2021_3049141 |
source | IEEE Electronic Library (IEL) |
subjects | Access control Big data Blockchain Cloud computing Cryptography Data encryption Data management Data retrieval data sharing Domains Encryption Factories Industrial applications Industrial Internet of Things industrial Internet-of-Thing (IIoT) Industrial plants Information management Information services Internet of Things Parameters Policies Privacy Security smart factory Smart manufacturing traceable and revocation |
title | Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T10%3A18%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Blockchain-Enhanced%20Data%20Sharing%20With%20Traceable%20and%20Direct%20Revocation%20in%20IIoT&rft.jtitle=IEEE%20transactions%20on%20industrial%20informatics&rft.au=Yu,%20Keping&rft.date=2021-11-01&rft.volume=17&rft.issue=11&rft.spage=7669&rft.epage=7678&rft.pages=7669-7678&rft.issn=1551-3203&rft.eissn=1941-0050&rft.coden=ITIICH&rft_id=info:doi/10.1109/TII.2021.3049141&rft_dat=%3Cproquest_RIE%3E2556486970%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2556486970&rft_id=info:pmid/&rft_ieee_id=9314268&rfr_iscdi=true |