A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems

被引:16
作者
Zhang, Weiting [1 ]
Zhang, Hanyi [1 ]
Fang, Liming [1 ]
Liu, Zhe [1 ]
Ge, Chunpeng [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Univ Wollongong, Sch Informat Technol, Wollongong, NSW 2522, Australia
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
SCADA systems; Security; Protocols; Cloud computing; Encryption; Access control; Servers; Cloud security; data security; fine-grained data transmission; supervisory control and data acquisition (SCADA) system;
D O I
10.1109/JIOT.2021.3091760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The supervisory control and data acquisition (SCADA) system is widely used in industrial control and the contemporary Industrial Internet of Things (IIoT). Unfortunately, due to its relatively weak design in terms of data security and access control, SCADA systems are becoming a favorite target for attackers. End-to-end encryption, such as SSL/TLS protocol, is used to protect the data transmission, but it cannot guarantee security in third-party cloud platforms. In this article, we propose a secure revocable fine-grained access control and data sharing scheme. This scheme not only ensures the confidentiality of the data but also enhances the access control of the SCADA system. Our scheme is based on three key observations. The common communication architecture of SCADA systems cannot protect data security itself. The security supports provided by industrial control protocols are limited. Moreover, the third-party cloud platforms are semitrusted. In addition, we have introduced digital signature technology to assure the integrity of the data in the SCADA system. We prove that our scheme is secure. This scheme has been experimentally evaluated to introduce negligible performance losses while improving data security in the SCADA system.
引用
收藏
页码:1976 / 1984
页数:9
相关论文
共 21 条
[1]   A Secure and Efficient Key Establishment Scheme for Communications of Smart Meters and Service Providers in Smart Grid [J].
Abbasinezhad-Mood, Dariush ;
Ostad-Sharif, Arezou ;
Nikooghadam, Morteza ;
Mazinani, Sayyed Majid .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) :1495-1502
[2]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[3]   Distributed Key Management in Microgrids [J].
Bolgouras, Vaios ;
Ntantogian, Christoforos ;
Panaousis, Emmanouil ;
Xenakis, Christos .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) :2125-2133
[4]  
Choi D, 2013, J INF SCI ENG, V29, P281
[5]   Server-Aided Revocable Attribute-Based Encryption [J].
Cui, Hui ;
Deng, Robert H. ;
Li, Yingjiu ;
Qin, Baodong .
COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 :570-587
[6]   Encrypted DNP3 Traffic Classification Using Supervised Machine Learning Algorithms [J].
de Toledo, Thais ;
Torrisi, Nunzio .
MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2019, 1 (01) :384-399
[7]   A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach [J].
Figueroa-Lorenzo, Santiago ;
Anorga, Javier ;
Arrizabalaga, Saioa .
SENSORS, 2019, 19 (20)
[8]   Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds [J].
Ge, Chunpeng ;
Liu, Zhe ;
Xia, Jinyue ;
Fang, Liming .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1214-1226
[9]   A Survey of Security in SCADA Networks: Current Issues and Future Challenges [J].
Ghosh, Sagarika ;
Sampalli, Srinivas .
IEEE ACCESS, 2019, 7 :135812-135831
[10]   Attack taxonomies for the Modbus protocols [J].
Huitsing, Peter ;
Chandia, Rodrigo ;
Papa, Mauricio ;
Shenoi, Sujeet .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 :37-44