Provenance blockchain for ensuring IT security in cloud manufacturing

被引:1
|
作者
Umer, Mifta Ahmed [1 ]
Gouveia, Luis Borges [2 ]
Belay, Elefelious Getachew [1 ]
机构
[1] Addis Ababa Inst Technol AAiT, Sch Informat Technol & Engn, Addis Ababa, Ethiopia
[2] Univ Fernando Pessoa, Sci & Technol Fac, Porto, Portugal
来源
FRONTIERS IN BLOCKCHAIN | 2023年 / 6卷
关键词
industry; 4.0; logistics; block chain; IT security; cloud manufacturing; INDUSTRY; 4.0; FUTURE;
D O I
10.3389/fbloc.2023.1273314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Provenance blockchain is an evolving concept for protection of production, logistics, and supply chain networks from rogue Industrial Internet of Things (IIoT) devices. Such rogue IIoT devices are a recognized threat in the cloud manufacturing networks. In extreme cases, they can be used to cause industrial accidents. A brief version of provenance is about end-to-end tracking and tracing of data and the nodes involved in creating, modifying, transmitting, storing, and deleting it at specific times and locations. It provides an end-to-end verifiable and controlled computation for ensuring trustworthiness, quality, reliability, and validity of data. Provenance has existed in computing using logging software systems. This research is focused on threats to food supply chains between two countries. A scenario for protecting food supply chain from India to UAE has been modeled. This research recognized the threat of harmful food items getting mixed with flow of genuine products in a supply chain. The IIoT devices used to control the flow can be authenticated using the evolving provenance blockchain technology. With the help of recent design recommendations in the literature, a model design has been created and simulated in this research. Observations from the simulation revealed that TCP congestions and unpredictable turnaround time for assigning cryptographic keys to IIoT device sessions may have to be explored in future. A collaborative design between the two nations has been proposed. All IIoT devices not supporting cryptography will be eliminated from the cloud manufacturing and supply chain networks. Currently, this design may be used for one time registration only. Future studies may provide improved versions in which, repeated authentication and keys replacements may be implemented.
引用
收藏
页数:15
相关论文
共 50 条
  • [11] Blockchain for Cloud Storage Security: A Review
    Mughal, Aamir
    Joseph, Alex
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 1163 - 1169
  • [12] Ensuring Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    IWQOS: 2009 IEEE 17TH INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2009, : 37 - +
  • [13] Ensuring that cyber security is fit for the future of manufacturing
    Carroll D.
    Network Security, 2024, 2024 (06)
  • [14] A SECURITY FRAMEWORK FOR CLOUD MANUFACTURING
    Wang, Yazhe
    Ma, Shunan
    Ren, Lei
    PROCEEDINGS OF THE ASME 9TH INTERNATIONAL MANUFACTURING SCIENCE AND ENGINEERING CONFERENCE, 2014, VOL 1, 2014,
  • [15] Smart Contracts for Ensuring Data Integrity in Cloud Storage with Blockchain
    Bhurani, Kashish
    Dogra, Aashna
    Agarwal, Prerna
    Shrivastava, Pranav
    Singh, Thipendra P.
    Bhandwal, Mohit
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2024, 11 (06):
  • [16] Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering
    Li, Haochen
    Gai, Keke
    Fang, Zhengkang
    Zhu, Liehuang
    Xu, Lei
    Jiang, Peng
    BSCI '19: PROCEEDINGS OF THE 2019 ACM INTERNATIONAL SYMPOSIUM ON BLOCKCHAIN AND SECURE CRITICAL INFRASTRUCTURE, 2019, : 47 - 55
  • [17] Ensuring Information Security of Web Resources Based on Blockchain Technologies
    Aliya, Barakova
    Olga, Ussatova
    Yenlik, Begimbayeva
    Sogukpinar, Ibrahim
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 834 - 843
  • [18] Blockchain-Based Cloud Manufacturing: Decentralization
    Barenji, Ali Vatankhah
    Guo, Hanyang
    Tian, Zonggui
    Li, Zhi
    Wang, W. M.
    Huang, George Q.
    TRANSDISCIPLINARY ENGINEERING METHODS FOR SOCIAL INNOVATION OF INDUSTRY 4.0, 2018, 7 : 1003 - 1011
  • [19] Ensuring cloud security: Current concerns and research challenges
    Vesyropoulos, Nikos
    Georgiadis, Christos K.
    Pimenidis, Elias
    Pimenidis, Elias, 1600, Springer Verlag (441): : 3 - 10
  • [20] Ensuring Data Security in Cloud Based Social Networks
    Praveena, A.
    Smys, S.
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 289 - 295