Review on Verifiable Outsourcing of Industrial Internet Data in Securely Shared

Authors

  • Yafeng Wang
  • Qingtao Wu

DOI:

https://doi.org/10.54097/3tahzd45

Keywords:

Industrial Internet Data; Outsourced Computing; Cloud Servers; Verifiable.

Abstract

With the rapid development of information technology, industrial Internet has also entered a rapid development stage. As cloud servers have huge storage space as well as powerful computing power, more and more resource-constrained factories outsource their data to cloud servers for computation and storage to reduce the burden of data owners. Industrial data contains information about industrially produced products, and the high value of such information attracts attacks from illegal users, which may lead to data leakage. In addition, cloud servers are not fully trustworthy; therefore, it is important to ensure the security and correctness of industrial Internet data during outsourced computation and storage for the healthy development of the industrial Internet. In this paper, we explore technical solutions to guarantee the security and correctness of industrial Internet data when outsourcing computation, to achieve the privacy protection of industrial Internet data.

Downloads

Download data is not yet available.

References

Bao Y, Zhang X, Wang C, et al. Further expansion from smart manufacturing system to social smart manufacturing system based on industrial internet [J]. Computers Industrial Engineering, 2024, 191110119-.

Dück J. Digitalization of production systems: getting smart while keeping out of harm's way? [J]. Automotive Industries, 2021, 200(1): 82-84.

Pankesh P, Intizar M A, Amit S. From raw data to smart manufacturing: AI and semantic web of things for industry 4.0 [J]. IEEE Intelligent Systems, 2018, 33(4): 79-86.

Huo Y, Xiong J, Guo Z, et al. A collaboration approach for cloud factories based on Kuhn–Munkras algorithm [J]. International Journal of Computer Integrated Manufacturing, 2022, 35(9): 972-988.

Rajesh B, S. J, N. S. Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment [J]. Information Security Journal: A Global Perspective, 2024, 33(1): 1-15.

Gao Z, Xu F, Zhou C, et al. Critical procedure identification method considering the key quality characteristics of the product manufacturing process [J]. Processes, 2022, 10(7): 1343-1343.

Hui H, Zhou C, Xu S, et al. A novel secure data transmission scheme in industrial internet of things [J]. China Communications, 2020,17(1):73-88.

Amalie D, Michael P, Stephanie C, et al. Differential privacy for public health data: An innovative tool to optimize information sharing while protecting data confidentiality [J]. Patterns, 2021, 2(12): 100366-100366.

Ermetic: Nearly 100% of Companies Experienced a Cloud Data Breach in Past 18 Months [J]. Wireless News, 2021.

In L. An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling [J]. Information Security Journal: A Global Perspective, 2022, 31(3): 346-358.

Zhao Z, Xu X. Research on the application of computer data encryption technology in cloud security [J]. International Journal of Engineering and Technology, 2022.

Madhu G, Kumar V P. A survey and analysis of different lightweight block cipher techniques for resource-constrained devices [J]. International Journal of Electronic Security and Digital Forensics, 2022, 14(1): 96-110.

Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [C]. 2007 IEEE symposium on security and privacy (SP'07). IEEE, 2007: 321-334.

Li W, Xu L, Wen Y, et al. Conjunctive Multi-key searchable encryption with attribute-based access control for EHR systems [J]. Computer Standards Interfaces, 2021.

Chinnasamy P, Deepalakshmi P, Dutta A K, et al. Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system [J]. Mathematics, 2021, 10(1): 68.

Saidi A, Nouali O, Amira A. SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing [J]. Cluster Computing, 2022, 25(1): 167-185.

Zhang L, You W, Mu Y. Secure outsourced attribute-based sharing framework for lightweight devices in smart health systems [J]. IEEE Transactions on Services Computing, 2021, 15(5): 3019-3030.

Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts [C]. Proceedings of the 20th USENIX Security Symposium (USENIX Security). San Francisco, USA: IEEE, 2011: 34.

El Gafif H, Toumanari A. Efficient ciphertext-policy attribute-based encryption constructions with outsourced encryption and decryption [J]. Security and Communication Networks, 2021, 2021: 1-17.

Han X, Yuan Y, Wang F. Security problems on blockchain: the state of the art and future trends. Acta Automatica Sinica, 2019, 45(1): 206−225.

Zeng S, Yuan Y, Ni X, et al. Scaling blockchain towards bitcoin: key technologies, constraints and related issues. Acta Automatica Sinica, 2019, 45(6): 1015−1030.

Ma Z, Wang J, Gai K, et al. Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network [J]. Journal of Systems Architecture, 2023.

Xie C, Shi R H, Zhang X, et al. Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments [J]. Journal of Information Security and Applications, 2023(Aug.): 76.

Downloads

Published

12-06-2024

Issue

Section

Articles

How to Cite

Review on Verifiable Outsourcing of Industrial Internet Data in Securely Shared . (2024). Academic Journal of Science and Technology, 11(2), 96-98. https://doi.org/10.54097/3tahzd45

Similar Articles

1-10 of 352

You may also start an advanced similarity search for this article.