scholarly journals Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Teng Li ◽  
Jiawei Zhang ◽  
Yangxu Lin ◽  
Shengkai Zhang ◽  
Jianfeng Ma

Cloud-based Internet of Things, which is considered as a promising paradigm these days, can provide various applications for our society. However, as massive sensitive and private data in IoT devices are collected and outsourced to cloud for data storage, processing, or sharing for cost saving, the data security has become a bottleneck for its further development. Moreover, in many large-scale IoT systems, multiple group data sharing is practical for users. Thus, how to ensure data security in multiple group data sharing remains an open problem, especially the fine-grained access control and data integrity verification with public auditing. Therefore, in this paper, we propose a blockchain-based fine-grained data sharing scheme for multiple groups in cloud-based IoT systems. In particular, we design a novel multiauthority large universe CP-ABE scheme to guarantee the fine-grained access control and data integrity across multiple groups by integrating group signature into our scheme. Moreover, to ease the need for a trusted third auditor in traditional data public auditing schemes, we introduce blockchain technique to enable a distributed data public auditing. In addition, with the group signature, our scheme also realizes anonymity and traitor tracing. The security analysis and performance evaluation show that our scheme is practical for large-scale IoT systems.

Author(s):  
Jiawei Zhang ◽  
Teng Li ◽  
Qi Jiang ◽  
Jianfeng Ma

AbstractWith the assistance of emerging techniques, such as cloud computing, fog computing and Internet of Things (IoT), smart city is developing rapidly into a novel and well-accepted service pattern these days. The trend also facilitates numerous relevant applications, e.g., smart health care, smart office, smart campus, etc., and drives the urgent demand for data sharing. However, this brings many concerns on data security as there is more private and sensitive information contained in the data of smart city applications. It may incur disastrous consequences if the shared data are illegally accessed, which necessitates an efficient data access control scheme for data sharing in smart city applications with resource-poor user terminals. To this end, we proposes an efficient traceable and revocable time-based CP-ABE (TR-TABE) scheme which can achieve time-based and fine-grained data access control over large attribute universe for data sharing in large-scale smart city applications. To trace and punish the malicious users that intentionally leak their keys to pursue illicit profits, we design an efficient user tracing and revocation mechanism with forward and backward security. For efficiency improvement, we integrate outsourced decryption and verify the correctness of its result. The proposed scheme is proved secure with formal security proof and is demonstrated to be practical for data sharing in smart city applications with extensive performance evaluation.


2021 ◽  
Vol 18 (1) ◽  
pp. 58-69
Author(s):  
Ting Cai ◽  
Yuxin Wu ◽  
Hui Lin ◽  
Yu Cai

A recent study predicts that by 2025, up to 75 billion internet of things (IoT) devices will be connected to the internet, in which data sharing is increasingly needed by massive IoT applications as a major driver of the IoT market. However, how to meet the interests of all participants in complex multi-party interactive data sharing while providing secure data control and management is the main challenge in building an IoT data sharing ecosystem. In this article, the authors propose a blockchain-empowered data sharing architecture that supports secure data monitoring and manageability in complex multi-party interactions of IoT systems. First, to build trust among different data sharing parties, the authors apply blockchain technologies to IoT data sharing. In particular, on-chain/off-chain collaboration and sharding consensus process are used to improve the efficiency and scalability of the large-scale blockchain-empowered data sharing systems. In order to encourage IoT parties to actively participate in the construction of shared ecology, the authors use an iterative double auction mechanism in the proposed architecture to maximize the social welfare of all parties as a case-study. Finally, simulation results show that the proposed incentive algorithm can optimize data allocations for each party and maximize the social welfare while protecting the privacy of all parties.


Author(s):  
Kannadhasan S. ◽  
R. Nagarajan

The exponential development of the internet and the internet of things (IoT) applies to the next step of the information transition, which entails billions of integrated smart devices and sensors to enable the speedy sharing of information and data under soft real-time restrictions. Significant improvements in data sharing also sparked the digital information movement. This transmission of data can include private, reliable, and often private communication. The exponential development of the internet and the internet of things (IoT) applies to the next step of the information transition, which entails billions of integrated smart devices and sensors to enable the speedy sharing of information and data under soft real-time restrictions. Significant improvements in data sharing also sparked the digital information movement. This transmission of data can include private, reliable, and often private communication.


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


2019 ◽  
Vol 22 (3) ◽  
pp. 365-380 ◽  
Author(s):  
Matthias Olthaar ◽  
Wilfred Dolfsma ◽  
Clemens Lutz ◽  
Florian Noseleit

In a competitive business environment at the Bottom of the Pyramid smallholders supplying global value chains may be thought to be at the whims of downstream large-scale players and local market forces, leaving no room for strategic entrepreneurial behavior. In such a context we test the relationship between the use of strategic resources and firm performance. We adopt the Resource Based Theory and show that seemingly homogenous smallholders deploy resources differently and, consequently, some do outperform others. We argue that the ‘resource-based theory’ results in a more fine-grained understanding of smallholder performance than approaches generally applied in agricultural economics. We develop a mixed-method approach that allows one to pinpoint relevant, industry-specific resources, and allows for empirical identification of the relative contribution of each resource to competitive advantage. The results show that proper use of quality labor, storage facilities, time of selling, and availability of animals are key capabilities.


2021 ◽  
Vol 113 (7-8) ◽  
pp. 2395-2412
Author(s):  
Baudouin Dafflon ◽  
Nejib Moalla ◽  
Yacine Ouzrout

AbstractThis work aims to review literature related to the latest cyber-physical systems (CPS) for manufacturing in the revolutionary Industry 4.0 for a comprehensive understanding of the challenges, approaches, and used techniques in this domain. Different published studies on CPS for manufacturing in Industry 4.0 paradigms through 2010 to 2019 were searched and summarized. We, then, analyzed the studies at a different granularity level inspecting the title, abstract, and full text to include in the prospective study list. Out of 626 primarily extracted relevant articles, we scrutinized 78 articles as the prospective studies on CPS for manufacturing in Industry 4.0. First, we analyzed the articles’ context to identify the major components along with their associated fine-grained constituents of Industry 4.0. Then, we reviewed different studies through a number of synthesized matrices to narrate the challenges, approaches, and used techniques as the key-enablers of the CPS for manufacturing in Industry 4.0. Although the key technologies of Industry 4.0 are the CPS, Internet of Things (IoT), and Internet of Services (IoS), the human component (HC), cyber component (CC), physical component (PC), and their HC-CC, CC-PC, and HC-PC interfaces need to be standardized to achieve the success of Industry 4.0.


Sign in / Sign up

Export Citation Format

Share Document