Abstract
Manufacturing collaboration is dedicated to interconnecting formerly isolated factories under the drive of projects to enhance production efficiency. However, some data contains privacy concerns, and legal disputes among collaborating factories that are common. In this paper, we propose a searchable and privacy preserving data sharing scheme for manufacturing collaboration. Sensitive data is outsourced to a Cloud Service Provider (CSP), avoiding the need for multiple data encryption after the access control policy is updated. Blockchain replaces the trusted third-party for storing critical proofs due to its decentralized and tamper-resistant characteristics. Smart contracts, natively supported by blockchain, are employed for publicly trusted dispute judgement. The proposed scheme supports predicate hidden Boolean queries, while also reducing the communication overhead. Only the encrypted index fields are stored on the blockchain, ensuring traceability while minimizing storage and computational costs for resource-constrained blockchains. The CSP conducts massive matching over the ciphertext index records, providing integrity proofs. Security analysis affirms the scheme’s resilience against various potential attacks, and simulation results confirm its efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Technion - Israel Institute of Technology, Israel (1996)
Bellare, M., Miner, S.K.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_28
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (S &P 2007),, Oakland, California, USA 20–23 May 2007, pp. 321–334. IEEE Computer Society (2007). https://doi.org/10.1109/SP.2007.11
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003). https://doi.org/10.1137/S0097539701398521
Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: Thuraisingham, B., Evans, D., Malkin, T., Xu, D. (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, 30 October–03 November 2017, pp. 1465–1482. ACM (2017). https://doi.org/10.1145/3133956.3133980
Carstens, T.V., Ebrahimi, E., Tabia, G.N., Unruh, D.: On quantum indistinguishability under chosen plaintext attack. IACR Cryptol. ePrint Arch., 596 (2020)
Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, 10–15 June 2012, pp. 917–922. IEEE (2012). https://doi.org/10.1109/ICC.2012.6364125
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011). https://doi.org/10.3233/JCS-2011-0426
Dahlberg, R., Pulls, T., Peeters, R.: Efficient sparse merkle trees. In: Brumley, B.B., Röning, J. (eds.) NordSec 2016. LNCS, vol. 10014, pp. 199–215. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47560-8_13
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October–3 November 2006, pp. 89–98. ACM (2006). https://doi.org/10.1145/1180405.1180418
Hou, M., Zhao, K., Sun, R., Yuan, G.: A dynamic group signature scheme for blockchain-based traceability bulletin board. In: Dai, H.-N., Liu, X., Luo, D.X., Xiao, J., Chen, X. (eds.) BlockSys 2021. CCIS, vol. 1490, pp. 499–511. Springer, Singapore (2021). https://doi.org/10.1007/978-981-16-7993-3_39
Li, H., et al.: Blockchain-based searchable encryption with efficient result verification and fair payment. J. Inf. Secur. Appl. 58, 102791 (2021). https://doi.org/10.1016/J.JISA.2021.102791
Li, H., Zhang, F., He, J., Tian, H.: A searchable symmetric encryption scheme using blockchain. CoRR arxiv:1711.01030 (2017)
Liu, J., Wu, M., Sun, R., Du, X., Guizani, M.: BMDS: a blockchain-based medical data sharing scheme with attribute-based searchable encryption. In: ICC 2021 - IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021, pp. 1–6. IEEE (2021). https://doi.org/10.1109/ICC42927.2021.9500966
Liu, S., Yu, J., Xiao, Y., Wan, Z., Wang, S., Yan, B.: BC-SABE: blockchain-aided searchable attribute-based encryption for cloud-iot. IEEE Internet Things J. 7(9), 7851–7867 (2020). https://doi.org/10.1109/JIOT.2020.2993231
Ma, R., Zhang, L., Wu, Q., Mu, Y., Rezaeibagha, F.: BE-TRDSS: blockchain-enabled secure and efficient traceable-revocable data-sharing scheme in industrial internet of things. IEEE Trans. Ind. Inf. 19(11), 10821–10830 (2023). https://doi.org/10.1109/TII.2023.3241618
Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988). https://doi.org/10.1007/3-540-48184-2_32
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457–473. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00457-5_27
Sisinni, E., Saifullah, A., Han, S., Jennehag, U., Gidlund, M.: Industrial internet of things: challenges, opportunities, and directions. IEEE Trans. Ind. Inf. 14(11), 4724–4734 (2018). https://doi.org/10.1109/TII.2018.2852491
Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, 23–26 February 2014. The Internet Society (2014)
Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187–1198 (2016). https://doi.org/10.1109/TPDS.2014.2355202
Wang, C., Li, W., Li, Y., Xu, X.: A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 377–386. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-03584-0_28
Wang, H., Ning, J., Huang, X., Wei, G., Poh, G.S., Liu, X.: Secure fine-grained encrypted keyword search for e-healthcare cloud. IEEE Trans. Depend. Secur. Comput. 18(3), 1307–1319 (2021). https://doi.org/10.1109/TDSC.2019.2916569
Wang, M., et al.: Medshare: a privacy-preserving medical data sharing system by using blockchain. IEEE Trans. Serv. Comput. 16(1), 438–451 (2023). https://doi.org/10.1109/TSC.2021.3114719
Xu, C., Yu, L., Zhu, L., Zhang, C.: A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds. Peer-to-Peer Netw. Appl. 14(6), 3647–3659 (2021). https://doi.org/10.1007/S12083-021-01202-6
Yang, X., Tian, T., Wang, J., Wang, C.: Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing. Peer-to-Peer Netw. Appl. 15(5), 2270–2288 (2022). https://doi.org/10.1007/S12083-022-01345-0
Yu, J., Liu, S., Xu, M., Guo, H., Zhong, F., Cheng, W.: An efficient revocable and searchable MA-ABE scheme with blockchain assistance for c-iot. IEEE Internet Things J. 10(3), 2754–2766 (2023). https://doi.org/10.1109/JIOT.2022.3213829
Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, 27 April–2 May 2014, pp. 522–530. IEEE (2014). https://doi.org/10.1109/INFOCOM.2014.6847976
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant 62202090 and 62173101, by Liaoning Province Natural Science Foundation Medical-Engineering Cross Joint Fund under Grant 2022-YGJC-24, by This work was supported in part by the National Natural Science Foundation of China under Grant 62072090, 62202090, 62173101, and 61902057, by Liaoning Province Natural Science Foundation Medical-Engineering Cross Joint Fund under Grant 2022-YGJC-24, by Doctoral Scientific Research Foundation of Liaoning Province under Grant 2022-BS-077, and by the Fundamental Research Funds for the Central Universities under Grant N2417006, and by Liaoning Collaboration Innovation Center For CSLE under Grant XTCX2024-015.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jiao, Z., Zhou, F., Wang, Q., Sun, J. (2025). Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration. In: Chen, X., Huang, X., Yung, M. (eds) Data Security and Privacy Protection. DSPP 2024. Lecture Notes in Computer Science, vol 15215. Springer, Singapore. https://doi.org/10.1007/978-981-97-8540-7_1
Download citation
DOI: https://doi.org/10.1007/978-981-97-8540-7_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-8539-1
Online ISBN: 978-981-97-8540-7
eBook Packages: Computer ScienceComputer Science (R0)