A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City

被引:15
|
作者
Fang, Liming [1 ,2 ]
Zhang, Hanyi [1 ,2 ]
Li, Minghui [1 ,2 ]
Ge, Chunpeng [1 ,2 ]
Liu, Liang [1 ,2 ]
Liu, Zhe [1 ,2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, State Key Lab Cryptol, Nanjing 211106, Peoples R China
基金
美国国家科学基金会; 欧盟地平线“2020”; 中国国家自然科学基金; 日本学术振兴会;
关键词
Protocols; Control systems; Cloud computing; Data security; Conditional proxy re-encryption; data security; IoT platform; smart city services; smart industry; AUTHENTICATION; INTERNET;
D O I
10.1109/JIOT.2020.2996664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the high popularity of IoT devices, industrial IoT platforms, such as smart factories and oilfield industrial control systems, have become a new trend in the development of smart city. Although various manufacturers pay wide attention to the different functional requirements of IoT platforms, they seldom consider security issues, especially in terms of data security, which has led to a large number of cases of privacy leakage. Some works have been made to provide secure and reliable communication solutions for industrial IoT platforms, unfortunately, as different communication protocols and interaction models are adopted in different scenarios, these solutions are mainly isolated and fragmented. Therefore, it is an urgent challenge to construct a universal cross-platform secure communication scheme for industrial IoT platforms. In this article, we analyze the logic and requirements of different industrial IoT scenarios to abstracts them into a universal model. We summarize the possible attacks on different industrial IoT platforms and design a security scheme to capture these attacks based on the conditional proxy re-encryption primitive. The proposed scheme ensures that data cannot be accessed by an unauthorized user. We also evaluate the security and performance of our scheme, and the experimental results show that our scheme can achieve the functionality and security requirements with low overhead.
引用
收藏
页码:7982 / 7990
页数:9
相关论文
共 50 条
  • [41] A fine-grained access control and revocation scheme on clouds
    Tu, Shan-shan
    Niu, Shao-zhang
    Li, Hui
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (06) : 1697 - 1714
  • [42] FINE-GRAINED TRUSTED CONTROL METHODS FOR IOT BOUNDARY ACCESS
    Wang, Jie
    Liu, Chang
    Zhu, Guowei
    Liu, Xiaojun
    Xiao, Bibo
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2025, 26 (01): : 180 - 190
  • [43] Fine-grained management of CoAP interactions with constrained IoT devices
    Van den Abeele, Floris
    Hoebeke, Jeroen
    Moerman, Ingrid
    Demeester, Piet
    2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2014,
  • [44] Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms
    Diaz Lopez, Daniel
    Blanco Uribe, Maria
    Santiago Cely, Claudia
    Tarquino Murgueitio, Daniel
    Garcia Garcia, Edwin
    Nespoli, Pantaleone
    Gomez Marmol, Felix
    SYMMETRY-BASEL, 2018, 10 (12):
  • [45] A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing
    Yin, Hui
    Qin, Zheng
    Zhang, Jixin
    Deng, Hua
    Li, Fangmin
    Li, Keqin
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 56 - 69
  • [46] A proxy signcryption scheme for secure sharing of industrial IoT data in fog environment
    Patil, Rachana Y.
    Patil, Yogesh H.
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2023, 26 (02) : 118 - 128
  • [47] Authenticated Data Redaction with Fine-Grained Control
    Ma, Jinhua
    Liu, Jianghua
    Huang, Xinyi
    Xiang, Yang
    Wu, Wei
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 291 - 302
  • [48] A secure authentication scheme for IoT application in smart home
    Pankaj Kumar
    Lokesh Chouhan
    Peer-to-Peer Networking and Applications, 2021, 14 : 420 - 438
  • [49] On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure
    Das, Ashok Kumar
    Bera, Basudeb
    Wazid, Mohammad
    Jamal, Sajjad Shaukat
    Park, Youngho
    IEEE ACCESS, 2021, 9 : 71856 - 71867
  • [50] Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud
    Song Lingwei
    Yu Fang
    Zhang Ru
    Niu Xinxin
    The Journal of China Universities of Posts and Telecommunications, 2015, (02) : 38 - 43