Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT

被引:68
|
作者
Qi, Saiyu [1 ,2 ]
Lu, Youshui [2 ]
Wei, Wei [3 ]
Chen, Xiaofeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Comp Sci & Technol, Xian 710049, Peoples R China
[3] Xian Univ Technol, Sch Comp & Engn, Xian 710048, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2021年 / 8卷 / 04期
关键词
Cloud computing; Time series analysis; Task analysis; Access control; Production; Data protection; Encryption; cloud; Industrial Internet of Things (IIoT); radio-frequency identification (RFID); time-series IoT data; ATTRIBUTE-BASED ENCRYPTION; FRAMEWORK;
D O I
10.1109/JIOT.2020.3020979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) has provided a promising opportunity to build digitalized industrial systems. A fundamental technology of IIoT is the radio-frequency identification (RFID) technique, which allows industrial participants to identify items and anchor time-series IoT data for them. They can further share the IoT data through the cloud service to enable information exchange and support critical decisions in production operations. Storing IoT data in the cloud, however, requires a data access control mechanism to protect sensitive business issues. Unfortunately, using traditional cryptographic access control schemes for time-series IoT data face severe efficiency and key leakage problems. In this article, we design a secure industrial data access control scheme for cloud-assisted IIoT. Our scheme enables participants to enforce fine-grained access control policies for their IoT data via ciphertext policy-attribute-based encryption (CP-ABE) scheme. Our scheme adopts a hybrid cloud infrastructure for participants to outsource expensive CP-ABE tasks to the cloud service with strong privacy guarantees. Importantly, our scheme guarantees a new privacy notion named item-level data protection for IoT data to prevent key leakage problem. We achieve these goals via several encryption and optimization techniques. Our performance assessments combine system implementation with large-scale emulations and confirm the security and efficiency of our design.
引用
收藏
页码:2886 / 2899
页数:14
相关论文
共 50 条
  • [21] Efficient, Revocable, and Privacy-Preserving Fine-Grained Data Sharing With Keyword Search for the Cloud-Assisted Medical IoT System
    Bao, Yangyang
    Qiu, Weidong
    Tang, Peng
    Cheng, Xiaochun
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 2041 - 2051
  • [22] The Fine-Grained Security Access Control of Spatial Data
    Ma, Fuguang
    Gao, Yong
    Yan, Menglong
    Xu, Fuchun
    Liu, Ding
    2010 18TH INTERNATIONAL CONFERENCE ON GEOINFORMATICS, 2010,
  • [23] An efficient fine-grained data access control system with a bounded service number
    Liu, Xin
    Wang, Hao
    Zhang, Bo
    Zhang, Bin
    INFORMATION SCIENCES, 2022, 584 : 536 - 563
  • [24] Fine-grained Access Control Method for Blockchain Data Sharing based on Cloud Platform Big Data
    Qiu, Yu
    Sun, Biying
    Dang, Qian
    Du, Chunhui
    Li, Na
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (10) : 24 - 31
  • [26] Secure Storage and Deletion Based on Blockchain for Cloud Data with Fine-grained Access Control
    Zhou Yousheng
    Chen Lujun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (07) : 1856 - 1863
  • [27] Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud
    He, Heng
    Li, Ruixuan
    Dong, Xinhua
    Zhang, Zhao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 471 - 484
  • [28] Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
    Dong, Qiuxiang
    Huang, Dijiang
    Luo, Jim
    Kang, Myong
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [29] Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation
    Zhou, Junwei
    Duan, Hui
    Liang, Kaitai
    Yan, Qiao
    Chen, Fei
    Yu, F. Richard
    Wu, Jieming
    Chen, Jianyong
    COMPUTER JOURNAL, 2017, 60 (08): : 1210 - 1222
  • [30] Secure Fine-Grained Access Control of Mobile User Data through Untrusted Cloud
    Zhou, Kai
    Ren, Jian
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,