Data security sharing model based on privacy protection for blockchain‐enabled industrial Internet of Things

With the widespread application of Industrial Internet of Things (IIoT) technology in the industry, the security threats are also increasing. To ensure the safe sharing of resources in IIoT, this paper proposes a data security sharing model based on privacy protection (DSS‐PP) for blockchain‐enabled IIoT. Compared with previous works, DSS‐PP has obvious advantages in several important aspects: (1) In the process of identity authentication, it protects users' personal information by using authentication technology with hidden attributes; (2) the encrypted shared resources are stored in off‐chain database of the blockchain, while only the ciphertext index information is stored in the block. It reduces the storage load of the blockchain; (3) it uses blockchain logging technology to trace and account for illegal access. Under the hardness assumption of Inverse Computational Diffe–Hellman (ICDH) problem, this model is proven to be correct and safe. Through the analysis of performance, DSS‐PP has better performance than the referred works.

[1]  Michail Papoutsidakis,et al.  Towards Smart Gaming Olfactory Displays , 2020, Sensors.

[2]  Wanghu Chen,et al.  Medical Data Sharing Model Based on Blockchain , 2019, Journal of Physics: Conference Series.

[3]  Dijiang Huang,et al.  Attribute-based Access Control for ICN Naming Scheme , 2014, IEEE Transactions on Dependable and Secure Computing.

[4]  Yang Cheng,et al.  IoT Security Access Authentication Method Based on Blockchain , 2019, ADHIP.

[5]  Ke Zhang,et al.  Proof-of-Reputation Based-Consortium Blockchain for Trust Resource Sharing in Internet of Vehicles , 2019, IEEE Access.

[6]  Thar Baker,et al.  Towards cross-task universal perturbation against black-box object detectors in autonomous driving , 2020, Comput. Networks.

[7]  Zibin Zheng,et al.  Toward Secure Data Sharing for the IoV: A Quality-Driven Incentive Mechanism With On-Chain and Off-Chain Guarantees , 2020, IEEE Internet of Things Journal.

[8]  Georgios Tsaramirsis,et al.  Aroma Release of Olfactory Displays Based on Audio-Visual Content , 2019, Applied Sciences.

[9]  Dapeng Oliver Wu,et al.  A Blockchain-based Data Sharing Scheme in The Supply Chain by IIoT , 2019, 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS).

[10]  Mingdong Tang,et al.  A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things , 2019, IEEE Transactions on Industrial Informatics.

[11]  Evangelina Lara,et al.  Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things , 2020, Sensors.

[12]  Jie Cui,et al.  Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage , 2016, Soft Computing.

[13]  Yong Gan,et al.  Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication , 2019, IEEE Access.

[14]  Yan Zhang,et al.  Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[15]  Shancang Li,et al.  Blockchain Enabled Industrial Internet of Things Technology , 2019, IEEE Transactions on Computational Social Systems.

[16]  H. T. Mouftah,et al.  Provisioning delay effect of partaking a Trusted Third Party in a vehicular cloud , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).

[17]  Yong Gan,et al.  A Self-certified Cross-Cluster Asymmetric Group Key Agreement for Wireless Sensor Networks , 2019 .

[18]  Ye Wang,et al.  A feature-vector generative adversarial network for evading PDF malware classifiers , 2020, Inf. Sci..

[19]  Nadeem Javaid,et al.  Data Sharing System Integrating Access Control Mechanism using Blockchain-Based Smart Contracts for IoT Devices , 2020, Applied Sciences.

[20]  Ma,et al.  An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks , 2014 .

[21]  Bin Deng,et al.  Intelligent cloud manufacturing platform for efficient resource sharing in smart manufacturing networks , 2019, Procedia CIRP.

[22]  Peilin Hong,et al.  An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage , 2019, IEEE Transactions on Information Forensics and Security.

[23]  Arun Kumar Sangaiah,et al.  Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications , 2019, Sensors.

[24]  Chul-Soo Kim,et al.  Privacy-aware blockchain for personal data sharing and tracking , 2019, Open Comput. Sci..

[25]  Antonios Gouglidis,et al.  Access Control in the Industrial Internet of Things , 2019, Security and Privacy Trends in the Industrial Internet of Thing.

[26]  Wojciech Mazurczyk,et al.  Covert Channels in Personal Cloud Storage Services: The Case of Dropbox , 2017, IEEE Transactions on Industrial Informatics.

[27]  Hui Sun,et al.  Blockchain-Based Secure Authentication Scheme for Medical Data Sharing , 2019, ICPCSEE.

[28]  Xiangyang Luo,et al.  Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things , 2019, Sensors.

[29]  Wang Ruifang,et al.  A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application , 2018, IEEE Access.

[30]  Robin Doss,et al.  An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology , 2019, IEEE Access.

[31]  Longfei Wu,et al.  Cross-lingual multi-keyword rank search with semantic extension over encrypted data , 2020, Inf. Sci..

[32]  Paulo Roberto de Lira Gondim,et al.  IoT‐based platform for environment data sharing in smart cities , 2020, Int. J. Commun. Syst..