A Security Scheme for Cloud-assisted Industrial Control System

被引:0
|
作者
Tu Y.-F. [1 ,2 ]
Yang G. [1 ]
Zhang C.-Z. [2 ]
机构
[1] School of Computer Science & Technology, Nanjing University of Post & Telecommunication, Nanjing
[2] College of Computer Science & Technology, Nanjing Tech University, Nanjing
来源
Zidonghua Xuebao/Acta Automatica Sinica | 2021年 / 47卷 / 02期
基金
中国国家自然科学基金;
关键词
Access control; Authentication; Confidentiality; Industrial control system; Integrity;
D O I
10.16383/j.aas.c180142
中图分类号
学科分类号
摘要
With the integration of cloud computing, internet of things (IoT) and supervisory control and data acquisition (SCADA) system, industrial control system (ICS) is faced with new security issues. Among them, the issue of data integrity, confidentiality protection and effective authentication has drawn attention. To address these issues in such a versatile and distributed environment, attribute-based encryption is used to construct access control policies, provide authentication and authorization services, protect the data communication between users and ICS and check the integrity of stored data in real time. We prove the correctness of the scheme, analyze its security and evaluate its performance, also compare it with the commonly used methods. Copyright © 2021 Acta Automatica Sinica. All rights reserved.
引用
收藏
页码:432 / 441
页数:9
相关论文
共 27 条
  • [1] Sajid A, Abbas H, Saleem K., Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges, IEEE Access, 4, pp. 1375-1384, (2016)
  • [2] Langmann R, Rojas-Pena L F., A PLC as an industry 4.0 component, Proceedings of the 13th International Conference on Remote Engineering and Virtual Instrumentation (REV), pp. 10-15, (2016)
  • [3] Wan J F, Tang S L, Shu Z G, Li D, Wang S Y, Imran M, Et al., Software-defined industrial internet of things in the context of industry 4.0, IEEE Sensors Journal, 16, 20, pp. 7373-7380, (2016)
  • [4] Goldin E, Feldman D, Georgoulas G, Castano M, Nikolakopoulos G., Cloud computing for big data analytics in the process control industry, Proceedings of the 25th Mediterranean Conference on Control and Automation (MED), pp. 1373-1378, (2017)
  • [5] Xia Yuan-Qing, Cloud control systems and their challenges, Acta Automatica Sinica, 42, 1, pp. 1-12, (2016)
  • [6] Farwell J P, Rohozinski R., Stuxnet and the future of cyber war, Survival, 53, 1, pp. 23-40, (2011)
  • [7] Zhou Xiao-Feng, Chen Xiu-Zhen, Gray analytical hierarchical assessment model for industry control system security, Netinfo Security, 1, pp. 15-20, (2014)
  • [8] Singh A, Prasad A, Talwar Y., SCADA security issues and FPGA implementation of AES --- A review, Proceedings of the 2nd International Conference on Next Generation Computing Technologies (NGCT), pp. 899-904, (2016)
  • [9] Liang Yao, Feng Dong-Qin, Xu Shan-Shan, Chen Si-Yuan, Gao Meng-Zhou, Feasibility analysis of encrypted transmission on security of industrial control systems, Acta Automatica Sinica, 44, 3, pp. 434-442, (2018)
  • [10] Zhou X J, Xu Z, Wang L M, Chen K., What should we do? A structured review of scada system cyber security standards, Proceedings of the 4th International Conference on Control, Decision and Information Technologies (CoDIT), pp. 605-614, (2017)