2020
DOI: 10.1155/2020/2017930
|View full text |Cite
|
Sign up to set email alerts
|

Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage

Abstract: Industrial Internet technology has developed rapidly, and the security of industrial data has received much attention. At present, industrial enterprises lack a safe and professional data security system. Thus, industries urgently need a complete and effective data protection scheme. This study develops a three-layer framework with local/fog/cloud storage for protecting sensitive industrial data and defines a threat model. For real-time sensitive industrial data, we use the improved local differential privacy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 26 publications
0
0
0
Order By: Relevance
“…Advantages Limitations [190] Hybrid AES-RSA Confidentiality, secure data sharing It efficiently protects the secrecy of the data and enables devices to recover the data in a secure manner It relies on RSA (i.e., an asymmetric encryption method), which is slow [191] Hierarchical and distributed Secure data at rest, while providing IIoT devices with status updates…”
Section: Ref Methods Characteristics Provided Security Requirementmentioning
confidence: 99%
See 1 more Smart Citation
“…Advantages Limitations [190] Hybrid AES-RSA Confidentiality, secure data sharing It efficiently protects the secrecy of the data and enables devices to recover the data in a secure manner It relies on RSA (i.e., an asymmetric encryption method), which is slow [191] Hierarchical and distributed Secure data at rest, while providing IIoT devices with status updates…”
Section: Ref Methods Characteristics Provided Security Requirementmentioning
confidence: 99%
“…Liu et al [190] introduced a framework to preserve data storage security utilizing a privacy algorithm known as local differential and a combined AES-RSA encryption technique. The authors adopted the encryption technique to jointly and efficiently protect the secrecy of the data while making it possible to recover the data in a secure manner (i.e., an entity with the appropriate key can recover the data).…”
Section: Perception Layer Securitymentioning
confidence: 99%