Luyao Yang , Weiming Tong , Zhongwei Li , Jinxiao Zhao , Feng Pan , Xianji Jin
{"title":"PECD-DSIIoT:用于工业物联网的隐私增强跨域数据共享方案","authors":"Luyao Yang , Weiming Tong , Zhongwei Li , Jinxiao Zhao , Feng Pan , Xianji Jin","doi":"10.1016/j.jisa.2025.104128","DOIUrl":null,"url":null,"abstract":"<div><div>With the rapid development of the Industrial Internet of Things (IIoT) under emerging manufacturing paradigms, the demand for cross-domain data interaction has significantly increased. However, challenges related to cross-domain trust management and data privacy protection remain key obstacles to achieving efficient data sharing. Existing solutions primarily focus on identity authentication and data sharing within a single management domain. The limited number of cross-domain approaches available tend to either emphasize authentication alone or adopt a single-chain architecture, which fails to meet the complex trust requirements in IIoT environments. To address these challenges, we propose a Privacy-Enhanced Cross-Domain Data Sharing Scheme for IIoT (PECD-DSIIoT). First, the proposed scheme adopts a dual-chain architecture that integrates a consortium blockchain and a private blockchain, enabling secure and controlled cross-domain data sharing. In this architecture, the consortium blockchain is responsible for cross-domain identity authentication, ensuring secure authentication across different management domains, while the private blockchain is used for storing sensitive data, enabling controlled data sharing. Additionally, the scheme employs an attribute obfuscation function to conceal access policies, preventing the exposure of access control rules. A verifiable pre-decryption mechanism is incorporated to ensure the integrity and correctness of data before decryption. Moreover, a non-interactive zero-knowledge proof is used to enable privacy-preserving identity authentication. Finally, a hybrid on-chain and off-chain storage strategy is adopted to alleviate blockchain storage overhead. Theoretical analysis and experimental results demonstrate that the proposed scheme not only enhances system security and privacy protection but also achieves low computational overhead and efficient data sharing, making it a highly feasible and practical solution.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104128"},"PeriodicalIF":3.7000,"publicationDate":"2025-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"PECD-DSIIoT: Privacy-enhanced cross-domain data sharing scheme for IIoT\",\"authors\":\"Luyao Yang , Weiming Tong , Zhongwei Li , Jinxiao Zhao , Feng Pan , Xianji Jin\",\"doi\":\"10.1016/j.jisa.2025.104128\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>With the rapid development of the Industrial Internet of Things (IIoT) under emerging manufacturing paradigms, the demand for cross-domain data interaction has significantly increased. However, challenges related to cross-domain trust management and data privacy protection remain key obstacles to achieving efficient data sharing. Existing solutions primarily focus on identity authentication and data sharing within a single management domain. The limited number of cross-domain approaches available tend to either emphasize authentication alone or adopt a single-chain architecture, which fails to meet the complex trust requirements in IIoT environments. To address these challenges, we propose a Privacy-Enhanced Cross-Domain Data Sharing Scheme for IIoT (PECD-DSIIoT). First, the proposed scheme adopts a dual-chain architecture that integrates a consortium blockchain and a private blockchain, enabling secure and controlled cross-domain data sharing. In this architecture, the consortium blockchain is responsible for cross-domain identity authentication, ensuring secure authentication across different management domains, while the private blockchain is used for storing sensitive data, enabling controlled data sharing. Additionally, the scheme employs an attribute obfuscation function to conceal access policies, preventing the exposure of access control rules. A verifiable pre-decryption mechanism is incorporated to ensure the integrity and correctness of data before decryption. Moreover, a non-interactive zero-knowledge proof is used to enable privacy-preserving identity authentication. Finally, a hybrid on-chain and off-chain storage strategy is adopted to alleviate blockchain storage overhead. Theoretical analysis and experimental results demonstrate that the proposed scheme not only enhances system security and privacy protection but also achieves low computational overhead and efficient data sharing, making it a highly feasible and practical solution.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"93 \",\"pages\":\"Article 104128\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-06-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625001656\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001656","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
PECD-DSIIoT: Privacy-enhanced cross-domain data sharing scheme for IIoT
With the rapid development of the Industrial Internet of Things (IIoT) under emerging manufacturing paradigms, the demand for cross-domain data interaction has significantly increased. However, challenges related to cross-domain trust management and data privacy protection remain key obstacles to achieving efficient data sharing. Existing solutions primarily focus on identity authentication and data sharing within a single management domain. The limited number of cross-domain approaches available tend to either emphasize authentication alone or adopt a single-chain architecture, which fails to meet the complex trust requirements in IIoT environments. To address these challenges, we propose a Privacy-Enhanced Cross-Domain Data Sharing Scheme for IIoT (PECD-DSIIoT). First, the proposed scheme adopts a dual-chain architecture that integrates a consortium blockchain and a private blockchain, enabling secure and controlled cross-domain data sharing. In this architecture, the consortium blockchain is responsible for cross-domain identity authentication, ensuring secure authentication across different management domains, while the private blockchain is used for storing sensitive data, enabling controlled data sharing. Additionally, the scheme employs an attribute obfuscation function to conceal access policies, preventing the exposure of access control rules. A verifiable pre-decryption mechanism is incorporated to ensure the integrity and correctness of data before decryption. Moreover, a non-interactive zero-knowledge proof is used to enable privacy-preserving identity authentication. Finally, a hybrid on-chain and off-chain storage strategy is adopted to alleviate blockchain storage overhead. Theoretical analysis and experimental results demonstrate that the proposed scheme not only enhances system security and privacy protection but also achieves low computational overhead and efficient data sharing, making it a highly feasible and practical solution.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.