2020
DOI: 10.1002/int.22293
|View full text |Cite
|
Sign up to set email alerts
|

Data security sharing model based on privacy protection for blockchain‐enabled industrial Internet of Things

Abstract: With the widespread application of Industrial Internet of Things (IIoT) technology in the industry, the security threats are also increasing. To ensure the safe sharing of resources in IIoT, this paper proposes a data security sharing model based on privacy protection (DSS-PP) for blockchain-enabled IIoT. Compared with previous works, DSS-PP has obvious advantages in several important aspects: (1) In the process of identity authentication, it protects users' personal information by using authentication technol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 39 publications
(20 citation statements)
references
References 32 publications
0
17
0
Order By: Relevance
“…It is necessary to limit and distinguish the applicable conditions of the data structure and model in some aspects, and carry out reasonable error analysis and data evaluation on the data structure and model on a certain basis. e corresponding in-depth data analysis and processing correlation analysis model is obtained, and its application level is more in depth [28].…”
Section: Deviation Analysis and Application Of Data Structure And Dat...mentioning
confidence: 99%
“…It is necessary to limit and distinguish the applicable conditions of the data structure and model in some aspects, and carry out reasonable error analysis and data evaluation on the data structure and model on a certain basis. e corresponding in-depth data analysis and processing correlation analysis model is obtained, and its application level is more in depth [28].…”
Section: Deviation Analysis and Application Of Data Structure And Dat...mentioning
confidence: 99%
“…It also proposes a specific conversion from AGKA without certificate authentication to AGKA without identity authentication based on session key. Group key agreement among intelligent terminals in intelligent system are proposed in Zhang et al 23,24 A scalable GKA protocol is proposed in Naresh et al 25 The flexible architecture proposed by the protocol not only reduces the process of cryptographic calculations, but also reduces the workload. The protocol adopts a hybrid and hierarchical approach to clusters, and the workload of key update is reduced without affecting other groups.…”
Section: Related Workmentioning
confidence: 99%
“…There are limited works on distributed data storage on edge and fog resources, as reviewed and classified in Moyasiadis et al 13 We describe the decentralized storage solution from the perspectives of fog/edge computing. 7,9,11,3,14 FogStore 7 proposes a distributed key-value store on fog resources with replication and differential consistency. vStore 9 supports context-aware placement of data on fog and cloud resources, with mobile devices generating and consuming these data.…”
Section: Related Workmentioning
confidence: 99%