BCTC-KSM: A blockchain-assisted threshold cryptography for key security management in power IoT data sharing

被引:15
作者
Deng, Song [1 ]
Hu, Qicong [1 ]
Wu, Di [2 ]
He, Yi [3 ]
机构
[1] Nanjing Univ Post & Telecommun, Inst Adv Technol, Nanjing 210003, Peoples R China
[2] Southwest Univ, Coll Comp & Informat Sci, Chongqing 400715, Peoples R China
[3] Old Dominion Univ, Norfolk, VA 23462 USA
关键词
Power IoT; Blockchain; Key management; Threshold secret sharing; SCHEME;
D O I
10.1016/j.compeleceng.2023.108666
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancement of the manufacturing industry from digital stage to network stage, the massive data generated by the production, consumption and other links in power IoT (PIoT) needs to be analyzed and processed urgently. However, due to the limited storage and computing capacity of PIoT devices, the collected industrial data are usually encrypted and stored in the cloud. Data security will be highly dependent on key security, and it is crucial for data privacy protection in PIoT to securely manage keys. Therefore, this paper proposes a Blockchain-Assisted Threshold Cryptography for Key Security Management in Power IoT Data Sharing (BCTC-KSM). We use the Pedersen threshold secret sharing algorithm off-chain to split the symmetric keys used to encrypt cloud-outsourcing data in PIoT into multiple key fragments and publish them on-chain, and use the ledger technology of blockchain to record the rotation history of each key fragment and its access subjects, and then restrict the user access to the key fragments through attribute access control policies on-chain. Security analysis and experimental results show that the BCTC-KSM can significantly improve the security and availability in PIoT data sharing at a slightly higher time cost than the state-of-the-art cryptography scheme.
引用
收藏
页数:15
相关论文
共 36 条
  • [1] ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments
    Ali, Zeeshan
    Hussain, Sajid
    Rehman, Rana Haseeb Ur
    Munshi, Asmaa
    Liaqat, Misbah
    Kumar, Neeraj
    Chaudhry, Shehzad Ashraf
    [J]. IEEE ACCESS, 2020, 8 (08): : 107993 - 108003
  • [2] A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things
    Alwarafy, Abdulmalik
    Al-Thelaya, Khaled A.
    Abdallah, Mohamed
    Schneider, Jens
    Hamdi, Mounir
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4004 - 4022
  • [3] What Do Practitioners Discuss about IoT and Industry 4.0 Related Technologies? Characterization and Identification of IoT and Industry 4.0 Categories in Stack Overflow Discussions
    Aly, Mohab
    Khomh, Foutse
    Yacout, Soumaya
    [J]. INTERNET OF THINGS, 2021, 14
  • [4] Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains
    Androulaki, Elli
    Barger, Artem
    Bortnikov, Vita
    Cachin, Christian
    Christidis, Konstantinos
    De Caro, Angelo
    Enyeart, David
    Ferris, Christopher
    Laventman, Gennady
    Manevich, Yacov
    Muralidharan, Srinivasan
    Murthy, Chet
    Binh Nguyen
    Sethi, Manish
    Singh, Gari
    Smith, Keith
    Sorniotti, Alessandro
    Stathakopoulou, Chrysoula
    Vukolic, Marko
    Cocco, Sharon Weed
    Yellick, Jason
    [J]. EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
  • [5] Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
    Avoine, Gildas
    Canard, Sebastien
    Ferreira, Loic
    [J]. TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 199 - 224
  • [6] Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System
    Bera, Basudeb
    Saha, Sourav
    Das, Ashok Kumar
    Vasilakos, Athanasios V.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) : 5744 - 5761
  • [7] Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data
    Chen, Biwen
    Wu, Libing
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) : 1753 - 1764
  • [8] ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication
    Ebinazer, Silambarasan Elkana
    Savarimuthu, Nickolas
    Bhanu, S. Mary Saira
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) : 3309 - 3325
  • [9] Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
    Feng, Chaosheng
    Yu, Keping
    Aloqaily, Moayad
    Alazab, Mamoun
    Lv, Zhihan
    Mumtaz, Shahid
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13784 - 13795
  • [10] A survey on privacy protection in blockchain system
    Feng, Qi
    He, Debiao
    Zeadally, Sherali
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 126 : 45 - 58