Abstract
With the development of Cloud Computing, which is applying to Industrial Internet of Things, the security of industrial data is confronting enormous risk. Unfortunately, existing data sharing schemes are not suitable for the industry control system because of the heavy computation operations, latency-sensitive service, and resource-limited devices. Also, since the data is stored on the cloud, the data integrity are crucial issues related to privacy and trust. In order to protect the confidentiality and integrity of data in such an environment, we propose a secure and efficient data sharing scheme by employing Ciphertext-Policy Attribute Based Encryption (CP-ABE), which integrates data encryption, access control, decryption outsourcing and data integrity verification. Moreover, the length of ciphertext is fixed. The scheme is analyzed in detail from security, efficiency and computation cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553–572. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_28
Trautman, L.J.: Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things. Social Science Electronic Publishing (2017)
Babu, B., Ijyas, T., Muneer, P., et al.: Security issues in SCADA based industrial control systems. In: International Conference on Anti-Cyber Crimes, pp. 47–51. IEEE, Saudi Arabia (2017)
Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., et al.: A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Saf. 139, 156–178 (2015)
Zhou, X.F., Chen, X.Z.: Gray analytical hierarchical assessment model for industry control system security. Netinfo Secur. 1, 15–20 (2014)
Halas, M., Bestak, I., Kovac, M.: Performance measurement of encryption algorithms and their effect on real running in PLC networks. In: International Conference on Telecommunications and Signal Processing, pp. 161–164. IEEE, Prague (2012)
Li, X., Liu, M., Zhang, R., et al.: Demo abstract: an industrial control system testbed for the encrypted controller. In: 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS), pp. 343–344. IEEE, Porto (2018)
Li, X.: Research on experimental platform and method of industrial control system encryption controller. Zhejiang University, Monster (2018)
Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Ind. Inform. 9(1), 277–293 (2013)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE, Oakland (2007)
Ruj, S., Nayak, A., Stojmenovic, I.: A security architecture for data aggregation and access control in smart grids. IEEE Trans. Smart Grid 4(1), 196–205 (2013)
Das, P.K., Narayanan, S., Sharma, N.K., et al.: Context-sensitive policy based security in Internet of Things. In: IEEE International Conference on Smart Computing, pp. 1–6. IEEE, Louis (2016)
Aujla, G.S., Chaudhary, R., Garg, S., et al.: SDN-enabled multi-attribute-based secure communication for smart grid in IIoT environment. IEEE Trans. Indu. Inform. 14(6), 2629–2640 (2018)
Guan, Z., Jing, L., Wu, L., et al.: Achieving efficient and secure data acquisition for cloud-supported Internet of Things in smart grid. IEEE Internet Things J. 4(6), 1934–1944 (2017)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute based encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321–334. IEEE, Oakland (2007)
Doshi, N., Jinwala, D.: Constant Ciphertext Length in CP-ABE. https://eprint.iacr.org/2012/500.pdf. Accessed 29 Aug 2012
Qin, B., Deng, R.H., Liu, S., et al.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384–1393 (2015)
Yang, Y., Liu, X., Deng, R.H.: Lightweight break-glass access control system for healthcare Internet-of-Things. IEEE Trans. Indu. Inform. 14(8), 3610–3617 (2017)
Ren, K., Zeng, K., Lou, W., Moran, P.J.: On broadcast authentication in wireless sensor networks. In: Cheng, X., Li, W., Znati, T. (eds.) Wireless Algorithms Systems and Applications WASA 2006. LNCS, vol. 4138, pp. 502–514. Springer, Heidelberg (2006). https://doi.org/10.1007/11814856_48
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tu, Y., Su, Q., Geng, Y. (2020). Enabling Secure and Efficient Data Sharing and Integrity Auditing for Cloud-Assisted Industrial Control System. In: Tian, Y., Ma, T., Khan, M. (eds) Big Data and Security. ICBDS 2019. Communications in Computer and Information Science, vol 1210. Springer, Singapore. https://doi.org/10.1007/978-981-15-7530-3_39
Download citation
DOI: https://doi.org/10.1007/978-981-15-7530-3_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7529-7
Online ISBN: 978-981-15-7530-3
eBook Packages: Computer ScienceComputer Science (R0)