TY - GEN
T1 - A Security Data Exchange Mechanism for IIoT Based on Blockchain
AU - Liu, Yang
AU - Huo, Ru
AU - Gao, Ningjie
AU - Chi, Cheng
AU - Huang, Tao
N1 - Publisher Copyright:
© 2025 Copyright held by the owner/author(s).
PY - 2025/4/23
Y1 - 2025/4/23
N2 - In order to address the challenges encountered in the current Industrial Internet of Things scenarios, such as single points of failure, difficulties in ensuring data privacy and integrity, and a lack of access control, a blockchain-based data security exchange architecture was proposed. To ensure the privacy of industrial data, a data exchange process based on public key encryption and keyword search was introduced. Industrial data is encrypted multiple times and uploaded to the blockchain network. Users retrieve ciphertext from the cloud server after obtaining the key through the blockchain and then decrypt it. To achieve flexible access control, a zero-knowledge proof-based access control mechanism was proposed, utilizing Pedersen commitments and zero-knowledge proofs for access permission issuance, validation, and revocation. Additionally, various forms of smart contracts were proposed for secure data exchange, user authentication, access authorization, and data integrity verification. Finally, a system prototype was built and experimental results confirmed the superiority of the proposed approach.
AB - In order to address the challenges encountered in the current Industrial Internet of Things scenarios, such as single points of failure, difficulties in ensuring data privacy and integrity, and a lack of access control, a blockchain-based data security exchange architecture was proposed. To ensure the privacy of industrial data, a data exchange process based on public key encryption and keyword search was introduced. Industrial data is encrypted multiple times and uploaded to the blockchain network. Users retrieve ciphertext from the cloud server after obtaining the key through the blockchain and then decrypt it. To achieve flexible access control, a zero-knowledge proof-based access control mechanism was proposed, utilizing Pedersen commitments and zero-knowledge proofs for access permission issuance, validation, and revocation. Additionally, various forms of smart contracts were proposed for secure data exchange, user authentication, access authorization, and data integrity verification. Finally, a system prototype was built and experimental results confirmed the superiority of the proposed approach.
KW - Blockchain
KW - Industrial Internet of Things
KW - Public-Key Encryption with Keyword Search
KW - Smart Contract
KW - Zero-Knowledge Proofs of Knowledge
UR - http://www.scopus.com/pages/publications/105009998352
U2 - 10.1145/3723890.3723905
DO - 10.1145/3723890.3723905
M3 - Conference contribution
AN - SCOPUS:105009998352
T3 - Proceedings of 2025 4th International Conference on Cryptography, Network Security and Communication Technology, CNSCT 2025
SP - 86
EP - 92
BT - Proceedings of 2025 4th International Conference on Cryptography, Network Security and Communication Technology, CNSCT 2025
PB - Association for Computing Machinery, Inc
T2 - 4th International Conference on Cryptography, Network Security and Communication Technology, CNSCT 2025
Y2 - 17 January 2025 through 19 January 2025
ER -