A Distributed Ledger Approach to Digital Twin Secure Data Sharing

The Digital Twin refers to a digital representation of any real-world counterpart allowing its management (from simple monitoring to autonomy). At the core of the concept lies the inclusion of the entire asset lifecycle. To enable all lifecycle parties to partake, the Digital Twin should provide a sharable data base. Thereby, integrity and confidentiality issues are pressing, turning security into a major requirement. However, given that the Digital Twin paradigm is still at an early stage, most works do not consider security yet. Distributed ledgers provide a novel technology for multi-party data sharing that emphasizes security features such as integrity. For this reason, we examine the applicability of distributed ledgers to secure Digital Twin data sharing. We contribute to current literature by identifying requirements for Digital Twin data sharing in order to overcome current infrastructural challenges. We furthermore propose a framework for secure Digital Twin data sharing based on Distributed Ledger Technology. A conclusive use case demonstrates requirements fulfillment and is followed by a critical discussion proposing avenues for future work.

[1]  Fei Tao,et al.  Digital twin-driven product design, manufacturing and service with big data , 2017, The International Journal of Advanced Manufacturing Technology.

[2]  Karuna Pande Joshi,et al.  Generating Digital Twin Models using Knowledge Graphs for Industrial Production Lines , 2017 .

[3]  Jan Mendling,et al.  Untrusted Business Process Monitoring and Execution Using Blockchain , 2016, BPM.

[4]  Arthur Gervais,et al.  Do you Need a Blockchain? , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).

[5]  Marko Vukolic,et al.  Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.

[6]  Luca Fumagalli,et al.  Flexible Automation and Intelligent Manufacturing , FAIM 2017 , 27-30 June 2017 , Modena , Italy A review of the roles of Digital Twin in CPS-based production systems , 2017 .

[7]  Rupert J. Baumgartner,et al.  Nachhaltiges Produktmanagement durch die Kombination physischer und digitaler Produktlebenszyklen als Treiber für eine Kreislaufwirtschaft , 2018 .

[8]  Rolf Steinhilper,et al.  The Digital Twin: Realizing the Cyber-Physical Production System for Industry 4.0☆ , 2017 .

[9]  Alistair A. Young,et al.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , 2017, MICCAI 2017.

[10]  Annelie Sohr,et al.  Next Generation Digital Twin , 2018, atp magazin.

[11]  Manuel Oliva,et al.  Product Avatar as Digital Counterpart of a Physical Individual Product: Literature Review and Implications in an Aircraft , 2015, ISPE CE.

[12]  Thomas Usländer SERVUS: Agile Engineering of Digital Twins deployed in IIoT Platforms , 2018, ERCIM News.

[13]  Edward H. Glaessgen,et al.  The Digital Twin Paradigm for Future NASA and U.S. Air Force Vehicles , 2012 .

[14]  Rodrigo Roman,et al.  Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection , 2017, CRITIS.

[15]  Laura Ricci,et al.  Blockchain Based Access Control , 2017, DAIS.

[16]  Somayeh Malakuti,et al.  Architectural aspects of digital twins in IIoT systems , 2018, ECSA.

[17]  Stephen T. Kent,et al.  Security Mechanisms in High-Level Network Protocols , 1983, CSUR.

[18]  Carlos Eduardo Pereira,et al.  Digital Twin Data Modeling with AutomationML and a Communication Methodology for Data Exchange , 2016 .

[19]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[20]  Cesare Pautasso,et al.  The Blockchain as a Software Connector , 2016, 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA).

[21]  Giovanni Meroni,et al.  Combining Artifact-Driven Monitoring with Blockchain: Analysis and Solutions , 2018, CAiSE Workshops.

[22]  Nasser Jazdi,et al.  Consistency check to synchronize the Digital Twin of manufacturing automation based on anchor points , 2018 .

[23]  Theodora A. Varvarigou,et al.  Blockchains for Supply Chain Management: Architectural Elements and Challenges Towards a Global Scale Deployment , 2019, Logistics.

[24]  R. Sandhu,et al.  Access control: principles and practice , 1994, IEEE Commun. Mag..

[25]  Olga Kieselmann,et al.  k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables , 2016, ARES.

[26]  Andreas Ekelhart,et al.  Towards Security-Aware Virtual Environments for Digital Twins , 2018, CPSS@AsiaCCS.

[27]  Colin Tankard,et al.  The security issues of the Internet of Things , 2015 .