Provenance blockchain for ensuring IT security in cloud manufacturing

被引:1
|
作者
Umer, Mifta Ahmed [1 ]
Gouveia, Luis Borges [2 ]
Belay, Elefelious Getachew [1 ]
机构
[1] Addis Ababa Inst Technol AAiT, Sch Informat Technol & Engn, Addis Ababa, Ethiopia
[2] Univ Fernando Pessoa, Sci & Technol Fac, Porto, Portugal
来源
FRONTIERS IN BLOCKCHAIN | 2023年 / 6卷
关键词
industry; 4.0; logistics; block chain; IT security; cloud manufacturing; INDUSTRY; 4.0; FUTURE;
D O I
10.3389/fbloc.2023.1273314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Provenance blockchain is an evolving concept for protection of production, logistics, and supply chain networks from rogue Industrial Internet of Things (IIoT) devices. Such rogue IIoT devices are a recognized threat in the cloud manufacturing networks. In extreme cases, they can be used to cause industrial accidents. A brief version of provenance is about end-to-end tracking and tracing of data and the nodes involved in creating, modifying, transmitting, storing, and deleting it at specific times and locations. It provides an end-to-end verifiable and controlled computation for ensuring trustworthiness, quality, reliability, and validity of data. Provenance has existed in computing using logging software systems. This research is focused on threats to food supply chains between two countries. A scenario for protecting food supply chain from India to UAE has been modeled. This research recognized the threat of harmful food items getting mixed with flow of genuine products in a supply chain. The IIoT devices used to control the flow can be authenticated using the evolving provenance blockchain technology. With the help of recent design recommendations in the literature, a model design has been created and simulated in this research. Observations from the simulation revealed that TCP congestions and unpredictable turnaround time for assigning cryptographic keys to IIoT device sessions may have to be explored in future. A collaborative design between the two nations has been proposed. All IIoT devices not supporting cryptography will be eliminated from the cloud manufacturing and supply chain networks. Currently, this design may be used for one time registration only. Future studies may provide improved versions in which, repeated authentication and keys replacements may be implemented.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem
    Sifah, Emmanuel Boateng
    Xia, Qi
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Hu
    Smahi, Abla
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1673 - 1684
  • [2] Blockchain-Based Pension System Ensuring Security, Provenance and Efficiency
    Kamal, Minhaz
    Abdullah, Chowdhury Mohammad
    Shaiara, Fairuz
    Kamal, Abu Raihan Mostofa
    Hasan, Md Mehedi
    Kim, Jik-Soo
    Hossain, Md Azam
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (05) : 1085 - 1088
  • [3] Ensuring the Security of Additive Manufacturing
    Morton, Dave
    MANUFACTURING ENGINEERING, 2019, 162 (01): : 16 - 16
  • [4] Leveraging Artificial Intelligence and Provenance Blockchain Framework to Mitigate Risks in Cloud Manufacturing in Industry 4.0
    Umer, Mifta Ahmed
    Belay, Elefelious Getachew
    Gouveia, Luis Borges
    ELECTRONICS, 2024, 13 (03)
  • [5] Data Provenance Assurance In Cloud Using Blockchain
    Shetty, Sachin
    Red, Val
    Kamhoua, Charles
    Kwiat, Kevin
    Njilla, Laurent
    DISRUPTIVE TECHNOLOGIES IN SENSORS AND SENSOR SYSTEMS, 2017, 10206
  • [6] Ensuring Security for Virtualization in Cloud Services
    Kumar, Udaya N. L.
    Siddappa, M.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2016, : 248 - 251
  • [7] Use of Blockchain for Ensuring Data Integrity in Cloud Databases
    Vainshtein, Yakov
    Gudes, Ehud
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, 2021, 12716 : 325 - 335
  • [8] A Blockchain-based Process Provenance for Cloud Forensics
    Zhang, Yong
    Wu, Songyang
    Jin, Bo
    Du, Jiaying
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2470 - 2473
  • [9] Data Provenance in the Cloud A blockchain-based approach
    Tosh, Deepak
    Shetty, Sachin
    Liang, Xueping
    Kamhoua, Charles
    Njilla, Laurent L.
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (04) : 38 - 44
  • [10] Transparent Cloud Privacy: Data Provenance Expression in Blockchain
    Hogan, Gabriel
    Helfert, Markus
    CLOSER: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2019, : 430 - 436