A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain

Author:

Liang Xueping1ORCID,Shetty Sachin2,Tosh Deepak K.3,Zhao Juan4,Li Danyi5,Liu Jihong5

Affiliation:

1. Institute of Information Engineering, Chinese Academy of Sciences, China & School of Cyber Security, University of Chinese Academy of Sciences, China & Old Dominion University, USA

2. Old Dominion University, USA

3. Department of Computer Science, University of Texas at El Paso, USA

4. Tennessee State University, USA

5. Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

Abstract

Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate and feed different information retrieval requests using tokens specifically generated for each type of request. Providing both traceability of data operations, and unlinkability of end user activities, a robust blockchain-based CPS is prototyped. Evaluation indicates the architecture is capable of assured data provenance validation and user privacy preservation at a low overhead.

Publisher

IGI Global

Subject

Information Systems

Reference33 articles.

1. User-centric distributed solutions for privacy-preserving analytics

2. Bichsel, P., Binding, C., Camenisch, J., Groß, T., Heydt-Benjamin, T., Sommer, D., et al. (2009). Cryptographic protocols of the identity mixer library. Tech. Rep. RZ 3730, Tech. Rep.

3. Brewster, C. (2015). Semantic blockchains in the supply chain. Academic Press.

4. Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees

5. Buldas, A., Laanoja, R., & Truu, A. (2014). Efficient Implementation of Keyless Signatures with Hash Sequence Authentication. IACR Cryptology ePrint Archive, 2014, 689.

Cited by 11 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Enhancing Cyber-Physical Systems Security: A Review of Deep Learning and Blockchain Integration;2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN);2024-07-03

2. Traceability and Prevention System Construction of Network Attacks Driven by Big Data;2023 IEEE International Conference on Paradigm Shift in Information Technologies with Innovative Applications in Global Scenario (ICPSITIAGS);2023-12-28

3. Internet of Medical Things Privacy and Security: Challenges, Solutions, and Future Trends from a New Perspective;Sustainability;2023-02-10

4. Hierarchical blockchain-based data provenance in IoT;APPLIED DATA SCIENCE AND SMART SYSTEMS;2023

5. Thinking Technology: Integrating Blockchain Technology into Accounting Curricula;SSRN Electronic Journal;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3