Skip to main content

Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration

  • Conference paper
  • First Online:
Data Security and Privacy Protection (DSPP 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15215))

Included in the following conference series:

  • 138 Accesses

Abstract

Manufacturing collaboration is dedicated to interconnecting formerly isolated factories under the drive of projects to enhance production efficiency. However, some data contains privacy concerns, and legal disputes among collaborating factories that are common. In this paper, we propose a searchable and privacy preserving data sharing scheme for manufacturing collaboration. Sensitive data is outsourced to a Cloud Service Provider (CSP), avoiding the need for multiple data encryption after the access control policy is updated. Blockchain replaces the trusted third-party for storing critical proofs due to its decentralized and tamper-resistant characteristics. Smart contracts, natively supported by blockchain, are employed for publicly trusted dispute judgement. The proposed scheme supports predicate hidden Boolean queries, while also reducing the communication overhead. Only the encrypted index fields are stored on the blockchain, ensuring traceability while minimizing storage and computational costs for resource-constrained blockchains. The CSP conducts massive matching over the ciphertext index records, providing integrity proofs. Security analysis affirms the scheme’s resilience against various potential attacks, and simulation results confirm its efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Technion - Israel Institute of Technology, Israel (1996)

    Google Scholar 

  2. Bellare, M., Miner, S.K.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_28

    Chapter  Google Scholar 

  3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (S &P 2007),, Oakland, California, USA 20–23 May 2007, pp. 321–334. IEEE Computer Society (2007). https://doi.org/10.1109/SP.2007.11

  4. Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003). https://doi.org/10.1137/S0097539701398521

    Article  MathSciNet  Google Scholar 

  5. Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: Thuraisingham, B., Evans, D., Malkin, T., Xu, D. (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, 30 October–03 November 2017, pp. 1465–1482. ACM (2017). https://doi.org/10.1145/3133956.3133980

  6. Carstens, T.V., Ebrahimi, E., Tabia, G.N., Unruh, D.: On quantum indistinguishability under chosen plaintext attack. IACR Cryptol. ePrint Arch., 596 (2020)

    Google Scholar 

  7. Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, 10–15 June 2012, pp. 917–922. IEEE (2012). https://doi.org/10.1109/ICC.2012.6364125

  8. Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011). https://doi.org/10.3233/JCS-2011-0426

    Article  Google Scholar 

  9. Dahlberg, R., Pulls, T., Peeters, R.: Efficient sparse merkle trees. In: Brumley, B.B., Röning, J. (eds.) NordSec 2016. LNCS, vol. 10014, pp. 199–215. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47560-8_13

    Chapter  Google Scholar 

  10. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October–3 November 2006, pp. 89–98. ACM (2006). https://doi.org/10.1145/1180405.1180418

  11. Hou, M., Zhao, K., Sun, R., Yuan, G.: A dynamic group signature scheme for blockchain-based traceability bulletin board. In: Dai, H.-N., Liu, X., Luo, D.X., Xiao, J., Chen, X. (eds.) BlockSys 2021. CCIS, vol. 1490, pp. 499–511. Springer, Singapore (2021). https://doi.org/10.1007/978-981-16-7993-3_39

    Chapter  Google Scholar 

  12. Li, H., et al.: Blockchain-based searchable encryption with efficient result verification and fair payment. J. Inf. Secur. Appl. 58, 102791 (2021). https://doi.org/10.1016/J.JISA.2021.102791

    Article  Google Scholar 

  13. Li, H., Zhang, F., He, J., Tian, H.: A searchable symmetric encryption scheme using blockchain. CoRR arxiv:1711.01030 (2017)

  14. Liu, J., Wu, M., Sun, R., Du, X., Guizani, M.: BMDS: a blockchain-based medical data sharing scheme with attribute-based searchable encryption. In: ICC 2021 - IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021, pp. 1–6. IEEE (2021). https://doi.org/10.1109/ICC42927.2021.9500966

  15. Liu, S., Yu, J., Xiao, Y., Wan, Z., Wang, S., Yan, B.: BC-SABE: blockchain-aided searchable attribute-based encryption for cloud-iot. IEEE Internet Things J. 7(9), 7851–7867 (2020). https://doi.org/10.1109/JIOT.2020.2993231

    Article  Google Scholar 

  16. Ma, R., Zhang, L., Wu, Q., Mu, Y., Rezaeibagha, F.: BE-TRDSS: blockchain-enabled secure and efficient traceable-revocable data-sharing scheme in industrial internet of things. IEEE Trans. Ind. Inf. 19(11), 10821–10830 (2023). https://doi.org/10.1109/TII.2023.3241618

    Article  Google Scholar 

  17. Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988). https://doi.org/10.1007/3-540-48184-2_32

    Chapter  Google Scholar 

  18. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  19. Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457–473. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00457-5_27

    Chapter  Google Scholar 

  20. Sisinni, E., Saifullah, A., Han, S., Jennehag, U., Gidlund, M.: Industrial internet of things: challenges, opportunities, and directions. IEEE Trans. Ind. Inf. 14(11), 4724–4734 (2018). https://doi.org/10.1109/TII.2018.2852491

    Article  Google Scholar 

  21. Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, 23–26 February 2014. The Internet Society (2014)

    Google Scholar 

  22. Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187–1198 (2016). https://doi.org/10.1109/TPDS.2014.2355202

    Article  Google Scholar 

  23. Wang, C., Li, W., Li, Y., Xu, X.: A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 377–386. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-03584-0_28

    Chapter  Google Scholar 

  24. Wang, H., Ning, J., Huang, X., Wei, G., Poh, G.S., Liu, X.: Secure fine-grained encrypted keyword search for e-healthcare cloud. IEEE Trans. Depend. Secur. Comput. 18(3), 1307–1319 (2021). https://doi.org/10.1109/TDSC.2019.2916569

    Article  Google Scholar 

  25. Wang, M., et al.: Medshare: a privacy-preserving medical data sharing system by using blockchain. IEEE Trans. Serv. Comput. 16(1), 438–451 (2023). https://doi.org/10.1109/TSC.2021.3114719

    Article  Google Scholar 

  26. Xu, C., Yu, L., Zhu, L., Zhang, C.: A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds. Peer-to-Peer Netw. Appl. 14(6), 3647–3659 (2021). https://doi.org/10.1007/S12083-021-01202-6

    Article  Google Scholar 

  27. Yang, X., Tian, T., Wang, J., Wang, C.: Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing. Peer-to-Peer Netw. Appl. 15(5), 2270–2288 (2022). https://doi.org/10.1007/S12083-022-01345-0

    Article  Google Scholar 

  28. Yu, J., Liu, S., Xu, M., Guo, H., Zhong, F., Cheng, W.: An efficient revocable and searchable MA-ABE scheme with blockchain assistance for c-iot. IEEE Internet Things J. 10(3), 2754–2766 (2023). https://doi.org/10.1109/JIOT.2022.3213829

    Article  Google Scholar 

  29. Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, 27 April–2 May 2014, pp. 522–530. IEEE (2014). https://doi.org/10.1109/INFOCOM.2014.6847976

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 62202090 and 62173101, by Liaoning Province Natural Science Foundation Medical-Engineering Cross Joint Fund under Grant 2022-YGJC-24, by This work was supported in part by the National Natural Science Foundation of China under Grant 62072090, 62202090, 62173101, and 61902057, by Liaoning Province Natural Science Foundation Medical-Engineering Cross Joint Fund under Grant 2022-YGJC-24, by Doctoral Scientific Research Foundation of Liaoning Province under Grant 2022-BS-077, and by the Fundamental Research Funds for the Central Universities under Grant N2417006, and by Liaoning Collaboration Innovation Center For CSLE under Grant XTCX2024-015.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fucai Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jiao, Z., Zhou, F., Wang, Q., Sun, J. (2025). Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration. In: Chen, X., Huang, X., Yung, M. (eds) Data Security and Privacy Protection. DSPP 2024. Lecture Notes in Computer Science, vol 15215. Springer, Singapore. https://doi.org/10.1007/978-981-97-8540-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-8540-7_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-8539-1

  • Online ISBN: 978-981-97-8540-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics