Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT

被引:68
|
作者
Qi, Saiyu [1 ,2 ]
Lu, Youshui [2 ]
Wei, Wei [3 ]
Chen, Xiaofeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Comp Sci & Technol, Xian 710049, Peoples R China
[3] Xian Univ Technol, Sch Comp & Engn, Xian 710048, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2021年 / 8卷 / 04期
关键词
Cloud computing; Time series analysis; Task analysis; Access control; Production; Data protection; Encryption; cloud; Industrial Internet of Things (IIoT); radio-frequency identification (RFID); time-series IoT data; ATTRIBUTE-BASED ENCRYPTION; FRAMEWORK;
D O I
10.1109/JIOT.2020.3020979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) has provided a promising opportunity to build digitalized industrial systems. A fundamental technology of IIoT is the radio-frequency identification (RFID) technique, which allows industrial participants to identify items and anchor time-series IoT data for them. They can further share the IoT data through the cloud service to enable information exchange and support critical decisions in production operations. Storing IoT data in the cloud, however, requires a data access control mechanism to protect sensitive business issues. Unfortunately, using traditional cryptographic access control schemes for time-series IoT data face severe efficiency and key leakage problems. In this article, we design a secure industrial data access control scheme for cloud-assisted IIoT. Our scheme enables participants to enforce fine-grained access control policies for their IoT data via ciphertext policy-attribute-based encryption (CP-ABE) scheme. Our scheme adopts a hybrid cloud infrastructure for participants to outsource expensive CP-ABE tasks to the cloud service with strong privacy guarantees. Importantly, our scheme guarantees a new privacy notion named item-level data protection for IoT data to prevent key leakage problem. We achieve these goals via several encryption and optimization techniques. Our performance assessments combine system implementation with large-scale emulations and confirm the security and efficiency of our design.
引用
下载
收藏
页码:2886 / 2899
页数:14
相关论文
共 50 条
  • [1] Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control
    Zhang, Kai
    Wang, Xiwen
    Ning, Jianting
    Gong, Junqing
    Huang, Xinyi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5286 - 5301
  • [2] A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT
    Sun, Jianfei
    Chen, Dajiang
    Zhang, Ning
    Xu, Guowen
    Tang, Mingjian
    Nie, Xuyun
    Cao, Mingsheng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12) : 10034 - 10046
  • [3] Secure and efficient fine-grained data access control scheme in cloud computing
    Yang, Changsong
    Ye, Jun
    JOURNAL OF HIGH SPEED NETWORKS, 2015, 21 (04) : 259 - 271
  • [4] Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoT
    Halder, Subir
    Newe, Thomas
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [5] Toward Fine-Grained and Forward-Secure Access Control in Cloud-Assisted IoT
    Deng, Hua
    Yin, Hui
    Qin, Zheng
    Ou, Lu
    Li, Fangmin
    Ge, Ningchao
    IEEE Internet of Things Journal, 2024, 11 (22) : 36569 - 36580
  • [6] A fine-grained data access control algorithm in cloud computing
    Han, Dezhi
    Wu, Shuai
    Bi, Kun
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 245 - 248
  • [7] Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT
    Mei, Qian
    Yang, Minghao
    Chen, Jinhao
    Wang, Lili
    Xiong, Hu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2625 - 2640
  • [8] Fine-Grained Access Control ensuring Data Privacy in OpenStack Cloud
    John, Naveen Thomas M.
    Thomas, Manoj V.
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 1669 - 1674
  • [9] Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud
    Song Lingwei
    Yu Fang
    Zhang Ru
    Niu Xinxin
    The Journal of China Universities of Posts and Telecommunications, 2015, (02) : 38 - 43
  • [10] Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud
    Song Lingwei
    Yu Fang
    Zhang Ru
    Niu Xinxin
    The Journal of China Universities of Posts and Telecommunications, 2015, 22 (02) : 38 - 43