Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT

被引:77
作者
Qi, Saiyu [1 ,2 ]
Lu, Youshui [2 ]
Wei, Wei [3 ]
Chen, Xiaofeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Comp Sci & Technol, Xian 710049, Peoples R China
[3] Xian Univ Technol, Sch Comp & Engn, Xian 710048, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2021年 / 8卷 / 04期
关键词
Cloud computing; Time series analysis; Task analysis; Access control; Production; Data protection; Encryption; cloud; Industrial Internet of Things (IIoT); radio-frequency identification (RFID); time-series IoT data; ATTRIBUTE-BASED ENCRYPTION; FRAMEWORK;
D O I
10.1109/JIOT.2020.3020979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) has provided a promising opportunity to build digitalized industrial systems. A fundamental technology of IIoT is the radio-frequency identification (RFID) technique, which allows industrial participants to identify items and anchor time-series IoT data for them. They can further share the IoT data through the cloud service to enable information exchange and support critical decisions in production operations. Storing IoT data in the cloud, however, requires a data access control mechanism to protect sensitive business issues. Unfortunately, using traditional cryptographic access control schemes for time-series IoT data face severe efficiency and key leakage problems. In this article, we design a secure industrial data access control scheme for cloud-assisted IIoT. Our scheme enables participants to enforce fine-grained access control policies for their IoT data via ciphertext policy-attribute-based encryption (CP-ABE) scheme. Our scheme adopts a hybrid cloud infrastructure for participants to outsource expensive CP-ABE tasks to the cloud service with strong privacy guarantees. Importantly, our scheme guarantees a new privacy notion named item-level data protection for IoT data to prevent key leakage problem. We achieve these goals via several encryption and optimization techniques. Our performance assessments combine system implementation with large-scale emulations and confirm the security and efficiency of our design.
引用
收藏
页码:2886 / 2899
页数:14
相关论文
共 51 条
[1]   FAME: Fast Attribute-based Message Encryption [J].
Agrawal, Shashank ;
Chase, Melissa .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :665-682
[2]  
[Anonymous], 2012, The Rise of Industrial Big Data
[3]   Persona: An Online Social Network with User-Defined Privacy [J].
Baden, Randy ;
Bender, Adam ;
Spring, Neil ;
Bhattacharjee, Bobby ;
Starin, Daniel .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2009, 39 (04) :135-146
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Bougdira A, 2016, 2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), P214, DOI 10.1109/CloudTech.2016.7847701
[6]  
Burkhalter L, 2020, PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, P835
[7]   IoT-Based Configurable Information Service Platform for Product Lifecycle Management [J].
Cai, Hongming ;
Xu, Li Da ;
Xu, Boyi ;
Xie, Cheng ;
Qin, Shaojun ;
Jiang, Lihong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (02) :1558-1567
[8]  
Challapalli K., 2014, INTERNET THINGS TIME
[9]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[10]  
Chen MC, 2016, 2016 INTERNATIONAL CONFERENCE ON INFORMATICS, MANAGEMENT ENGINEERING AND INDUSTRIAL APPLICATION (IMEIA 2016), P1, DOI 10.1109/PLASMA.2016.7534032