Skip to main content

Enabling Secure and Efficient Data Sharing and Integrity Auditing for Cloud-Assisted Industrial Control System

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1210))

Included in the following conference series:

  • 1089 Accesses

Abstract

With the development of Cloud Computing, which is applying to Industrial Internet of Things, the security of industrial data is confronting enormous risk. Unfortunately, existing data sharing schemes are not suitable for the industry control system because of the heavy computation operations, latency-sensitive service, and resource-limited devices. Also, since the data is stored on the cloud, the data integrity are crucial issues related to privacy and trust. In order to protect the confidentiality and integrity of data in such an environment, we propose a secure and efficient data sharing scheme by employing Ciphertext-Policy Attribute Based Encryption (CP-ABE), which integrates data encryption, access control, decryption outsourcing and data integrity verification. Moreover, the length of ciphertext is fixed. The scheme is analyzed in detail from security, efficiency and computation cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553–572. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_28

    Chapter  MATH  Google Scholar 

  2. Trautman, L.J.: Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things. Social Science Electronic Publishing (2017)

    Google Scholar 

  3. Babu, B., Ijyas, T., Muneer, P., et al.: Security issues in SCADA based industrial control systems. In: International Conference on Anti-Cyber Crimes, pp. 47–51. IEEE, Saudi Arabia (2017)

    Google Scholar 

  4. Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., et al.: A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Saf. 139, 156–178 (2015)

    Article  Google Scholar 

  5. Zhou, X.F., Chen, X.Z.: Gray analytical hierarchical assessment model for industry control system security. Netinfo Secur. 1, 15–20 (2014)

    Google Scholar 

  6. Halas, M., Bestak, I., Kovac, M.: Performance measurement of encryption algorithms and their effect on real running in PLC networks. In: International Conference on Telecommunications and Signal Processing, pp. 161–164. IEEE, Prague (2012)

    Google Scholar 

  7. Li, X., Liu, M., Zhang, R., et al.: Demo abstract: an industrial control system testbed for the encrypted controller. In: 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS), pp. 343–344. IEEE, Porto (2018)

    Google Scholar 

  8. Li, X.: Research on experimental platform and method of industrial control system encryption controller. Zhejiang University, Monster (2018)

    Google Scholar 

  9. Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Ind. Inform. 9(1), 277–293 (2013)

    Article  Google Scholar 

  10. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  11. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE, Oakland (2007)

    Google Scholar 

  12. Ruj, S., Nayak, A., Stojmenovic, I.: A security architecture for data aggregation and access control in smart grids. IEEE Trans. Smart Grid 4(1), 196–205 (2013)

    Article  Google Scholar 

  13. Das, P.K., Narayanan, S., Sharma, N.K., et al.: Context-sensitive policy based security in Internet of Things. In: IEEE International Conference on Smart Computing, pp. 1–6. IEEE, Louis (2016)

    Google Scholar 

  14. Aujla, G.S., Chaudhary, R., Garg, S., et al.: SDN-enabled multi-attribute-based secure communication for smart grid in IIoT environment. IEEE Trans. Indu. Inform. 14(6), 2629–2640 (2018)

    Article  Google Scholar 

  15. Guan, Z., Jing, L., Wu, L., et al.: Achieving efficient and secure data acquisition for cloud-supported Internet of Things in smart grid. IEEE Internet Things J. 4(6), 1934–1944 (2017)

    Article  Google Scholar 

  16. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute based encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321–334. IEEE, Oakland (2007)

    Google Scholar 

  17. Doshi, N., Jinwala, D.: Constant Ciphertext Length in CP-ABE. https://eprint.iacr.org/2012/500.pdf. Accessed 29 Aug 2012

  18. Qin, B., Deng, R.H., Liu, S., et al.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384–1393 (2015)

    Article  Google Scholar 

  19. Yang, Y., Liu, X., Deng, R.H.: Lightweight break-glass access control system for healthcare Internet-of-Things. IEEE Trans. Indu. Inform. 14(8), 3610–3617 (2017)

    Article  Google Scholar 

  20. Ren, K., Zeng, K., Lou, W., Moran, P.J.: On broadcast authentication in wireless sensor networks. In: Cheng, X., Li, W., Znati, T. (eds.) Wireless Algorithms Systems and Applications WASA 2006. LNCS, vol. 4138, pp. 502–514. Springer, Heidelberg (2006). https://doi.org/10.1007/11814856_48

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuanfei Tu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tu, Y., Su, Q., Geng, Y. (2020). Enabling Secure and Efficient Data Sharing and Integrity Auditing for Cloud-Assisted Industrial Control System. In: Tian, Y., Ma, T., Khan, M. (eds) Big Data and Security. ICBDS 2019. Communications in Computer and Information Science, vol 1210. Springer, Singapore. https://doi.org/10.1007/978-981-15-7530-3_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7530-3_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-7529-7

  • Online ISBN: 978-981-15-7530-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics