[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Secure and Efficient Item Traceability for Cloud-Aided IIoT

Published: 29 November 2022 Publication History

Abstract

Cloud computing is an essential technique to provide item traceability for industrial internet of things (IIoT) systems by providing item data sharing services. However, a malicious cloud server may prevent industrial participants from acquiring accurate traceability of items by providing inconsistent item data. To fix this issue, we propose Acics, an item data consistency auditing scheme in untrusted cloud services for cloud-aided IIoT systems. Acics presents two variants named S-Acics and L-Acics. S-Acics enables industrial participants to audit item data consistency for each item and circularly play the auditing role. L-Acics further enables industrial participants to audit item data consistency for a sampled subset of items while resisting data selection attack via a new separated storage mechanism. Finally, Acics integrates a fair payment mechanism built on smart contract to incentivize the cloud server to provide consistent item data access service for industrial participants. The experiment results show that our solution can audit item data consistency with reasonable cost.

References

[1]
J. Cheng, S. Qi, W. Wang, Y. Yang, and Y. Qi. 2020. Fast consistency auditing for massive industrial data in untrusted cloud services. In Proceedings of the 2020 on Great Lakes Symposium on VLSI.
[2]
F. Dabbene, P. Gay, and C. Tortia. 2014. Traceability issues in food supply chain management: A review. Biosystems Engineering 120 (2014), 65–80.
[5]
A. Ghasempour. 2019. Internet of Things in smart grid: Architecture, applications, services, key technologies, and challenges. Inventions Journal 4, 1 (2019), 1–12.
[6]
M. Ma, D. He, N. Kumar, et al. 2018. Certificateless searchable public key encryption scheme for industrial Internet of Things[J]. IEEE Transactions on Industrial Informatics 14, 2 (2018), 759–767.
[7]
P. Popa, J. Lorch, and D. Molnar. 2010. Enabling security in cloud storage SLAs with CloudProof. In Proceedings of the Usenix Atc. 31–31.
[8]
S. Qi, Y. Lu, Y. Zheng, Y. Li, and X. Chen. 2021. Cpds: Enabling compressed and private data sharing for industrial IoT over blockchain. IEEE Transactions on Industrial Informatics 17, 4 (2021), 2376–2387.
[9]
S. Qi, Y. Lu, W. Wei, and X. Chen. 2021. Efficient data access control with fine-grained data protection in cloud-assisted IIoT. IEEE Internet of Things Journal 8, 4 (2021), 2886–2899.
[10]
S. Qi and Y. Zheng. 2021. Crypt-DAC: Cryptographically enforced dynamic access control in the cloud. IEEE Transactions on Dependable and Secure Computing 18, 2 (2021), 765–779.
[11]
S. Qi, S. Zheng, M. Li, Y. Liu, and J. Qiu. 2016. Scalable industry data access control in RFID-enabled supply chain. IEEE/ACM Transactions on Networking 24, 6 (2016), 3551–3564.
[12]
B. H. Kim and D. Lie. 2015. Caelus: Auditing the consistency of cloud services with battery-powered devices. In Proceedings of the 2015 IEEE Symposium on Security and Privacy. IEEE.
[13]
Y. Hu, S. Kumar, and R. A. Popa. 2020. Ghostor: Toward a secure data-sharing system from decentralized trust. In Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation.
[14]
Oded Goldreich R. O. Software Protection and Simulation on Oblivious RAMs[M]. Journal of the ACM (JACM) 43, 3 (1996), 431–473.
[15]
E. Stefanov, M. V. Dijk, E. Shi, T. H. H. Chan, C. Fletcher, L. Ren, X. Yu, and S. Devadas. 2018. Path ORAM: an extremely simple oblivious RAM protocol[J]. Journal of the ACM (JACM) 65, 4 (2018), 1–26.
[18]
A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten. 2010. SPORC: Group Collaboration using Untrusted Cloud Resources[C]. In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI’10).
[19]
A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y. Michalevsky, and D. Shaket. 2010. Venus: Auditing for untrusted cloud storage. In Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop. ACM.
[20]
P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. 2011. Depot: Cloud storage with minimal trust[J]. ACM Transactions on Computer Systems (TOCS) 29, 4 (2011), 1–38.
[21]
Christian Cachin, Idit Keidar, Alexander Shraer. Fail-Aware Untrusted Storage. In Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems & Networks. IEEE, 2009.
[22]
C. Cachin and O. Ohrimenko. 2018. Verifying the consistency of remote untrusted services with conflict-free operations. Information & Computation 260 (2018), 72–88.
[23]
M. T. Goodrich and M. Mitzenmacher. 2010. MapReduce Parallel Cuckoo Hashing and Oblivious RAM Simulations. CoRR, abs/1007.1259.
[24]
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. 2011. Privacy-preserving group data access via stateless oblivious RAM simulation[J]. In Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics. 157–167.
[25]
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. 2011. Oblivious RAM simulation with efficient worst-case access overhead[C]. In Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop. 95–100.
[26]
E. Kushilevitz, S. Lu, and R. Ostrovsky. 2012. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In Proceedings of the 23rd Annual ACM-SIAM Symposium on Discrete Algorithms.
[27]
P. Williams, R. Sion, and B. Carbunar. 2008. Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In Proceedings of the ACM Conference on Computer & Communications Security. ACM.
[28]
P. Williams, R. Sion, and A. Tomescu. 2012. PrivateFS: A parallel oblivious file system. In Proceedings of the ACM Conference on Computer & Communications Security. ACM.
[29]
P. Williams and R. Sion. 2012. Single round access privacy on outsourced storage. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM.
[30]
D. Yuan, X. Song, Q. Xu, M. Zhao, X. Wei, H. Wang, and H. Jiang. 2018. An ORAM-based privacy preserving data sharing scheme for cloud storage. Journal of Information Security and Applications 39 (2018), 1–9.
[31]
M. T. Goodrich. 2017. BIOS ORAM: Improved privacy-preserving data access for parameterized outsourced storage. In Proceedings of the 2017 on Workshop on Privacy in the Electronic Society.
[32]
Q. Ma, J. Zhang, Y. Peng, W. Zhang, and D. Qiao. 2016. SE-ORAM: A storage-efficient oblivious RAM for privacy-preserving access to cloud storage. In Proceedings of the 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing. IEEE, 20–25.
[33]
E. Boyle, K. M. Chung, and R. Pass. 2016. Oblivious parallel RAM and applications. In Proceedings of the Conference on Theory of Cryptography. Springer, Berlin.
[34]
M. Maffei, G. Malavolta, M. Reinert, and D. Schröder. 2015. Privacy and access control for outsourced personal records. In Proceedings of the 2015 IEEE Symposium on Security and Privacy. IEEE, 341–358.
[35]
Paolo Viotti, Dan Dobre, and Marko Vukolić. 2017. Hybris: Robust hybrid cloud storage. ACM Transactions on Storage 13, 3 (2017), 32 pages. DOI:
[36]
Marcus Brandenburger, Christian Cachin, and Nikola Knežević. 2017. Don’t trust the cloud, verify: Integrity and consistency for cloud object stores. ACM Transactions on Privacy and Security 20, 3 (2017), 30 pages. DOI:
[37]
J. Zhu, G. Sun, X. Zhang, C. Zhang, W. Zhang, Y. Liang, and J. Di. 2020. Fork path: Batching ORAM requests to remove redundant memory accesses. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 39, 10 (2020), 2279–2292.
[38]
T. Hoang, J. Guajardo, and A. Yavuz. 2020. MACAO: A maliciously-secure and client-efficient active ORAM framework. In Proceedings of the 27th Annual Network and Distributed System Security Symposium.
[39]
S. K. Haider and M. van Dijk. 2019. Flat ORAM: A simplified write-only oblivious RAM construction for secure processors. Cryptography 3, 1 (2019), 10.
[40]
A. Pal and K. Kant. Smart sensing, communication, and control in perishable food supply chain. ACM Transactions on Sensor Networks (TOSN), 16, 1 (2020), 1–41.
[41]
CDC. 2016. Estimates of Foodborne Illness in the United States. Retrieved Feb., 2020 from https://www.cdc.gov/foodborneburden/estimatesoverview.html.

Cited By

View all
  • (2024)2FAKA-C/S: A Robust Two-Factor Authentication and Key Agreement Protocol for C/S Data Transmission in Federated LearningApplied Sciences10.3390/app1415666414:15(6664)Online publication date: 30-Jul-2024
  • (2023)Deep Reinforcement Learning-Based Task Offloading and Resource Allocation for Industrial IoT in MEC Federation SystemIEEE Access10.1109/ACCESS.2023.330251811(83150-83170)Online publication date: 2023

Index Terms

  1. Secure and Efficient Item Traceability for Cloud-Aided IIoT

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Sensor Networks
    ACM Transactions on Sensor Networks  Volume 18, Issue 4
    November 2022
    619 pages
    ISSN:1550-4859
    EISSN:1550-4867
    DOI:10.1145/3561986
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 29 November 2022
    Online AM: 05 May 2022
    Accepted: 25 February 2022
    Revised: 05 January 2022
    Received: 23 September 2021
    Published in TOSN Volume 18, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Industrial Internet of Things
    2. untrusted cloud
    3. data consistency
    4. fair payment

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • National Nature Science Foundation of China
    • Blockchain Core Technology Strategic Research Program of Ministry of Education (China)
    • Natural Science Foundation of Shaanxi Province of China
    • Shaanxi Key Laboratory of Intelligent Processing for Big Energy Data
    • National Key Research and Development Program of China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)84
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)2FAKA-C/S: A Robust Two-Factor Authentication and Key Agreement Protocol for C/S Data Transmission in Federated LearningApplied Sciences10.3390/app1415666414:15(6664)Online publication date: 30-Jul-2024
    • (2023)Deep Reinforcement Learning-Based Task Offloading and Resource Allocation for Industrial IoT in MEC Federation SystemIEEE Access10.1109/ACCESS.2023.330251811(83150-83170)Online publication date: 2023

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media