BCTC-KSM: A blockchain-assisted threshold cryptography for key security management in power IoT data sharing

被引:17
作者
Deng, Song [1 ]
Hu, Qicong [1 ]
Wu, Di [2 ]
He, Yi [3 ]
机构
[1] Nanjing Univ Post & Telecommun, Inst Adv Technol, Nanjing 210003, Peoples R China
[2] Southwest Univ, Coll Comp & Informat Sci, Chongqing 400715, Peoples R China
[3] Old Dominion Univ, Norfolk, VA 23462 USA
关键词
Power IoT; Blockchain; Key management; Threshold secret sharing; SCHEME;
D O I
10.1016/j.compeleceng.2023.108666
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancement of the manufacturing industry from digital stage to network stage, the massive data generated by the production, consumption and other links in power IoT (PIoT) needs to be analyzed and processed urgently. However, due to the limited storage and computing capacity of PIoT devices, the collected industrial data are usually encrypted and stored in the cloud. Data security will be highly dependent on key security, and it is crucial for data privacy protection in PIoT to securely manage keys. Therefore, this paper proposes a Blockchain-Assisted Threshold Cryptography for Key Security Management in Power IoT Data Sharing (BCTC-KSM). We use the Pedersen threshold secret sharing algorithm off-chain to split the symmetric keys used to encrypt cloud-outsourcing data in PIoT into multiple key fragments and publish them on-chain, and use the ledger technology of blockchain to record the rotation history of each key fragment and its access subjects, and then restrict the user access to the key fragments through attribute access control policies on-chain. Security analysis and experimental results show that the BCTC-KSM can significantly improve the security and availability in PIoT data sharing at a slightly higher time cost than the state-of-the-art cryptography scheme.
引用
收藏
页数:15
相关论文
共 36 条
[1]   ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments [J].
Ali, Zeeshan ;
Hussain, Sajid ;
Rehman, Rana Haseeb Ur ;
Munshi, Asmaa ;
Liaqat, Misbah ;
Kumar, Neeraj ;
Chaudhry, Shehzad Ashraf .
IEEE ACCESS, 2020, 8 :107993-108003
[2]   A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things [J].
Alwarafy, Abdulmalik ;
Al-Thelaya, Khaled A. ;
Abdallah, Mohamed ;
Schneider, Jens ;
Hamdi, Mounir .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4004-4022
[3]   What Do Practitioners Discuss about IoT and Industry 4.0 Related Technologies? Characterization and Identification of IoT and Industry 4.0 Categories in Stack Overflow Discussions [J].
Aly, Mohab ;
Khomh, Foutse ;
Yacout, Soumaya .
INTERNET OF THINGS, 2021, 14
[4]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[5]   Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy [J].
Avoine, Gildas ;
Canard, Sebastien ;
Ferreira, Loic .
TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 :199-224
[6]   Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System [J].
Bera, Basudeb ;
Saha, Sourav ;
Das, Ashok Kumar ;
Vasilakos, Athanasios V. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5744-5761
[7]   Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data [J].
Chen, Biwen ;
Wu, Libing ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond ;
He, Debiao .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) :1753-1764
[8]   ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication [J].
Ebinazer, Silambarasan Elkana ;
Savarimuthu, Nickolas ;
Bhanu, S. Mary Saira .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) :3309-3325
[9]   Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV [J].
Feng, Chaosheng ;
Yu, Keping ;
Aloqaily, Moayad ;
Alazab, Mamoun ;
Lv, Zhihan ;
Mumtaz, Shahid .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) :13784-13795
[10]   A survey on privacy protection in blockchain system [J].
Feng, Qi ;
He, Debiao ;
Zeadally, Sherali ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 126 :45-58