Your browser doesn't support javascript.
loading
Enhancing Security and Flexibility in the Industrial Internet of Things: Blockchain-Based Data Sharing and Privacy Protection.
Tong, Weiming; Yang, Luyao; Li, Zhongwei; Jin, Xianji; Tan, Liguo.
Afiliação
  • Tong W; Laboratory for Space Environment and Physical Sciences, Harbin Institute of Technology, Harbin 150001, China.
  • Yang L; School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin 150001, China.
  • Li Z; School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin 150001, China.
  • Jin X; School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin 150001, China.
  • Tan L; Laboratory for Space Environment and Physical Sciences, Harbin Institute of Technology, Harbin 150001, China.
Sensors (Basel) ; 24(3)2024 Feb 05.
Article em En | MEDLINE | ID: mdl-38339751
ABSTRACT
To address the complexities, inflexibility, and security concerns in traditional data sharing models of the Industrial Internet of Things (IIoT), we propose a blockchain-based data sharing and privacy protection (BBDSPP) scheme for IIoT. Initially, we characterize and assign values to attributes, and employ a weighted threshold secret sharing scheme to refine the data sharing approach. This enables flexible combinations of permissions, ensuring the adaptability of data sharing. Subsequently, based on non-interactive zero-knowledge proof technology, we design a lightweight identity proof protocol using attribute values. This protocol pre-verifies the identity of data accessors, ensuring that only legitimate terminal members can access data within the system, while also protecting the privacy of the members. Finally, we utilize the InterPlanetary File System (IPFS) to store encrypted shared resources, effectively addressing the issue of low storage efficiency in traditional blockchain systems. Theoretical analysis and testing of the computational overhead of our scheme demonstrate that, while ensuring performance, our scheme has the smallest total computational load compared to the other five schemes. Experimental results indicate that our scheme effectively addresses the shortcomings of existing solutions in areas such as identity authentication, privacy protection, and flexible combination of permissions, demonstrating a good performance and strong feasibility.
Palavras-chave

Texto completo: 1 Base de dados: MEDLINE Idioma: En Ano de publicação: 2024 Tipo de documento: Article

Texto completo: 1 Base de dados: MEDLINE Idioma: En Ano de publicação: 2024 Tipo de documento: Article