BCTC-KSM: A blockchain-assisted threshold cryptography for key security management in power IoT data sharing
With the rapid advancement of the manufacturing industry from digital stage to network stage, the massive data generated by the production, consumption and other links in power IoT (PIoT) needs to be analyzed and processed urgently. However, due to the limited storage and computing capacity of PIoT...
Saved in:
Published in | Computers & electrical engineering Vol. 108; p. 108666 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.05.2023
|
Subjects | |
Online Access | Get full text |
ISSN | 0045-7906 |
DOI | 10.1016/j.compeleceng.2023.108666 |
Cover
Loading…
Abstract | With the rapid advancement of the manufacturing industry from digital stage to network stage, the massive data generated by the production, consumption and other links in power IoT (PIoT) needs to be analyzed and processed urgently. However, due to the limited storage and computing capacity of PIoT devices, the collected industrial data are usually encrypted and stored in the cloud. Data security will be highly dependent on key security, and it is crucial for data privacy protection in PIoT to securely manage keys. Therefore, this paper proposes a Blockchain-Assisted Threshold Cryptography for Key Security Management in Power IoT Data Sharing (BCTC-KSM). We use the Pedersen threshold secret sharing algorithm off-chain to split the symmetric keys used to encrypt cloud-outsourcing data in PIoT into multiple key fragments and publish them on-chain, and use the ledger technology of blockchain to record the rotation history of each key fragment and its access subjects, and then restrict the user access to the key fragments through attribute access control policies on-chain. Security analysis and experimental results show that the BCTC-KSM can significantly improve the security and availability in PIoT data sharing at a slightly higher time cost than the state-of-the-art cryptography scheme. |
---|---|
AbstractList | With the rapid advancement of the manufacturing industry from digital stage to network stage, the massive data generated by the production, consumption and other links in power IoT (PIoT) needs to be analyzed and processed urgently. However, due to the limited storage and computing capacity of PIoT devices, the collected industrial data are usually encrypted and stored in the cloud. Data security will be highly dependent on key security, and it is crucial for data privacy protection in PIoT to securely manage keys. Therefore, this paper proposes a Blockchain-Assisted Threshold Cryptography for Key Security Management in Power IoT Data Sharing (BCTC-KSM). We use the Pedersen threshold secret sharing algorithm off-chain to split the symmetric keys used to encrypt cloud-outsourcing data in PIoT into multiple key fragments and publish them on-chain, and use the ledger technology of blockchain to record the rotation history of each key fragment and its access subjects, and then restrict the user access to the key fragments through attribute access control policies on-chain. Security analysis and experimental results show that the BCTC-KSM can significantly improve the security and availability in PIoT data sharing at a slightly higher time cost than the state-of-the-art cryptography scheme. |
ArticleNumber | 108666 |
Author | He, Yi Wu, Di Hu, Qicong Deng, Song |
Author_xml | – sequence: 1 givenname: Song surname: Deng fullname: Deng, Song email: dengsong@njupt.edu.cn organization: Institute of Advanced Technology, Nanjing University Post & Telecommunication, 210003, Nanjing, China – sequence: 2 givenname: Qicong surname: Hu fullname: Hu, Qicong email: 1220055518@njupt.edu.cn organization: Institute of Advanced Technology, Nanjing University Post & Telecommunication, 210003, Nanjing, China – sequence: 3 givenname: Di orcidid: 0000-0002-7788-9202 surname: Wu fullname: Wu, Di email: wudi1986@swu.edu.cn organization: College of Computer and Information Science, Southwest University, 400715, Chongqing, China – sequence: 4 givenname: Yi surname: He fullname: He, Yi email: yihe@cs.odu.edu organization: Old Dominion University, Norfolk, VA, 23462, USA |
BookMark | eNqNkMtOwzAQRb0oEuXxD-YDUuykdRo2CCJeAsSCsrac8SRxm9iRbUD5e4LKArFCsxjNle6R5hyRmXUWCTnjbMEZF-fbBbh-wA4BbbNIWZpN-VoIMSNzxparJC-YOCRHIWzZdAu-npPuutyUyePr8wW9olXnYAetMjZRIZgQUdPYegyt6zQFPw7RNV4N7Uhr5-kORxoQ3r2JI-2VVQ32aCM1lg7uEz19cBuqVVQ0tMob25yQg1p1AU9_9jF5u73ZlPfJ08vdQ3n1lECW8pikleCgAVJYFnyaOi8ylue11prlGQidpvUSC7HmFepKrcRaoxKaKa5zqHidHZNizwXvQvBYy8GbXvlRcia_Vcmt_KVKfquSe1VT9_JPF0xU0TgbvTLdvwjlnoDTix8GvQxg0AJq4xGi1M78g_IFlbeUDQ |
CitedBy_id | crossref_primary_10_1002_spy2_448 crossref_primary_10_1016_j_aei_2024_103085 crossref_primary_10_3390_app14167034 crossref_primary_10_1007_s10586_024_04379_6 crossref_primary_10_32604_cmc_2024_052008 crossref_primary_10_3390_en17174380 crossref_primary_10_1016_j_adhoc_2023_103299 crossref_primary_10_1016_j_compeleceng_2023_108986 crossref_primary_10_1016_j_chaos_2023_114361 crossref_primary_10_1038_s41598_024_62435_y crossref_primary_10_1016_j_compeleceng_2024_109403 crossref_primary_10_1080_03772063_2025_2459791 crossref_primary_10_3390_math11143036 crossref_primary_10_1016_j_compeleceng_2023_109010 |
Cites_doi | 10.1109/TIFS.2017.2738601 10.1109/TETC.2019.2921113 10.23919/JCC.2020.01.006 10.1109/JIOT.2020.3030308 10.1109/TII.2022.3143619 10.1109/TSC.2018.2853167 10.1016/j.iot.2021.100364 10.1145/3190508.3190538 10.1109/JPROC.2011.2165269 10.1109/TVT.2020.3027568 10.1109/JIOT.2019.2904303 10.1109/JIOT.2020.3015432 10.1109/JIOT.2021.3077803 10.1145/501978.501980 10.1109/JIOT.2019.2941638 10.1109/TCYB.2020.3009004 10.1016/j.comnet.2021.108373 10.1109/SERP4IoT.2019.00011 10.1007/s11036-017-0932-8 10.1109/JAS.2021.1004204 10.1109/TBDATA.2017.2697448 10.1109/ACCESS.2020.3000716 10.1002/int.22371 10.1145/3477084.3484951 10.1016/j.jnca.2018.10.020 10.1109/JIOT.2017.2666799 10.1016/j.cose.2018.07.018 10.1109/BigData47090.2019.9046058 10.1007/s11277-020-07989-6 10.1109/TITS.2022.3153133 10.1109/JIOT.2020.3047640 10.1016/j.scs.2019.101995 |
ContentType | Journal Article |
Copyright | 2023 Elsevier Ltd |
Copyright_xml | – notice: 2023 Elsevier Ltd |
DBID | AAYXX CITATION |
DOI | 10.1016/j.compeleceng.2023.108666 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
ExternalDocumentID | 10_1016_j_compeleceng_2023_108666 S0045790623000903 |
GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AATTM AAXKI AAXUO AAYFN ABBOA ABEFU ABFNM ABJNI ABMAC ABWVN ABXDB ACDAQ ACGFO ACGFS ACNNM ACRLP ACRPL ACZNC ADBBV ADEZE ADJOM ADMUD ADNMO ADTZH AEBSH AECPX AEIPS AEKER AENEX AFFNX AFJKZ AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AKRWK ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC BNPGV CS3 DU5 EBS EFJIC EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ RXW SBC SDF SDG SDP SES SET SEW SPC SPCBC SSH SST SSV SSZ T5K TAE TN5 UHS VOH WH7 WUQ XPP ZMT ~G- ~S- AAYWO AAYXX ACVFH ADCNI AEUPX AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKYEP APXCP CITATION |
ID | FETCH-LOGICAL-c321t-2b61cdcc2c491919f793077fddd073c6d22f4e9681bedba568dea6d0a1d7cb1f3 |
IEDL.DBID | .~1 |
ISSN | 0045-7906 |
IngestDate | Tue Jul 01 01:45:56 EDT 2025 Thu Apr 24 23:02:27 EDT 2025 Sun Apr 06 06:54:51 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Power IoT Key management Threshold secret sharing Blockchain |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c321t-2b61cdcc2c491919f793077fddd073c6d22f4e9681bedba568dea6d0a1d7cb1f3 |
ORCID | 0000-0002-7788-9202 |
ParticipantIDs | crossref_primary_10_1016_j_compeleceng_2023_108666 crossref_citationtrail_10_1016_j_compeleceng_2023_108666 elsevier_sciencedirect_doi_10_1016_j_compeleceng_2023_108666 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | May 2023 2023-05-00 |
PublicationDateYYYYMMDD | 2023-05-01 |
PublicationDate_xml | – month: 05 year: 2023 text: May 2023 |
PublicationDecade | 2020 |
PublicationTitle | Computers & electrical engineering |
PublicationYear | 2023 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Aly, Khomh, Yacout (b11) 2021; 14 Solworth J, Sloan R. A Layered Design of Discretionary Access Controls with Decidable Safety Properties. In: IEEE symposium on security and privacy, 2004. proceedings. 2004. 2004, p. 56–67. Kashmar N, Adda M, Atieh M, Ibrahim H. A New Dynamic Smart-AC Model Methodology to Enforce Access Control Policy in IoT Layers. In: 2019 IEEE/ACM 1st international workshop on software engineering research practices for the internet of things. 2019, p. 21–4. Ning, Cao, Dong, Liang, Ma, Wei (b5) 2018; 13 Wodi BH, Leung CK, Cuzzocrea A, Sourav S. Fast Privacy-Preserving Keyword Search on Encrypted Outsourced Data. In: 2019 IEEE international conference on big data (big data). 2019, p. 1–10. Haseeb, Islam, Saba, Rehman, Mehmood (b17) 2020; 54 Zhou, Chen, Zhang, Su, James (b29) 2019; 80 Alwarafy, Al-Thelaya, Abdallah, Schneider, Hamdi (b3) 2021; 8 Ali, Hussain, Rehman, Munshi, Liaqat, Kumar (b34) 2020; 8 Yang, Guan, Wu, Du, Guizani (b2) 2021; 8 Zheng, Li, Yang, Lu (b13) 2022; 23 Avoine, Canard, Ferreira (b32) 2020 Li, Song, Mei, Li, Cheng, Sun (b14) 2019; 12 Sun, Wang, Cai, Liu, Tong, Jiang (b21) 2021; 36 Mothukuri, Khare, Parizi, Pouriyeh, Dehghantanha, Srivastava (b19) 2022; 9 Hui, Zhou, Xu, Lin (b15) 2020; 17 Sohal, Sharma (b33) 2022; 34 Lu, Li, Chen, Kim, Serikawa (b12) 2018; 23 Lu, Tang, Sun (b22) 2021; 8 Tan L, Yu K, Yang C, Bashir AK. A blockchain-based Shamir’s threshold cryptography for data protection in industrial internet of things of smart city. In: Proceedings of the 1st workshop on artificial intelligence and blockchain technologies for smart cities with 6G. 2021, p. 13–8. Xiong, Choo, Vasilakos (b24) 2022; 8 Chen, Wu, Kumar, Choo, He (b6) 2021; 9 Feng, He, Zeadally, Khan, Kumar (b20) 2019; 126 Qahtan, Sharif, Zaidan, Alsattar, Albahri, Zaidan (b10) 2022; 18 Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth eurosys conference. 2018, p. 1–15. Elkana Ebinazer, Savarimuthu, Mary Saira Bhanu (b31) 2021; 117 Munilla, Burmester, Barco (b30) 2021; 198 Feng, Yu, Aloqaily, Alazab, Lv, Mumtaz (b7) 2020; 69 Li, Asaeda, Li (b16) 2017; 4 Sridhar, Hahn, Govindarasu (b1) 2012; 100 Xia, Sifah, Obour Agyekum, Xia, Acheampong, Smahi (b4) 2019; 6 Xu, Lin, Gao, Lu, Shen, Li (b18) 2020; 52 Gai, Wu, Zhu, Xu, Zhang (b27) 2019; 6 Ferraiolo, Sandhu, Gavrila, Kuhn, Chandramouli (b25) 2001; 4 Bera, Saha, Das, Vasilakos (b28) 2021; 8 Pedersen (b9) 1992 Ferraiolo (10.1016/j.compeleceng.2023.108666_b25) 2001; 4 Gai (10.1016/j.compeleceng.2023.108666_b27) 2019; 6 Li (10.1016/j.compeleceng.2023.108666_b16) 2017; 4 Ali (10.1016/j.compeleceng.2023.108666_b34) 2020; 8 Zheng (10.1016/j.compeleceng.2023.108666_b13) 2022; 23 Munilla (10.1016/j.compeleceng.2023.108666_b30) 2021; 198 Avoine (10.1016/j.compeleceng.2023.108666_b32) 2020 Aly (10.1016/j.compeleceng.2023.108666_b11) 2021; 14 Xu (10.1016/j.compeleceng.2023.108666_b18) 2020; 52 Feng (10.1016/j.compeleceng.2023.108666_b20) 2019; 126 Mothukuri (10.1016/j.compeleceng.2023.108666_b19) 2022; 9 10.1016/j.compeleceng.2023.108666_b26 Sridhar (10.1016/j.compeleceng.2023.108666_b1) 2012; 100 Elkana Ebinazer (10.1016/j.compeleceng.2023.108666_b31) 2021; 117 Pedersen (10.1016/j.compeleceng.2023.108666_b9) 1992 Lu (10.1016/j.compeleceng.2023.108666_b12) 2018; 23 10.1016/j.compeleceng.2023.108666_b23 10.1016/j.compeleceng.2023.108666_b8 Sun (10.1016/j.compeleceng.2023.108666_b21) 2021; 36 Feng (10.1016/j.compeleceng.2023.108666_b7) 2020; 69 Alwarafy (10.1016/j.compeleceng.2023.108666_b3) 2021; 8 Bera (10.1016/j.compeleceng.2023.108666_b28) 2021; 8 Zhou (10.1016/j.compeleceng.2023.108666_b29) 2019; 80 Li (10.1016/j.compeleceng.2023.108666_b14) 2019; 12 Haseeb (10.1016/j.compeleceng.2023.108666_b17) 2020; 54 Lu (10.1016/j.compeleceng.2023.108666_b22) 2021; 8 Xiong (10.1016/j.compeleceng.2023.108666_b24) 2022; 8 Qahtan (10.1016/j.compeleceng.2023.108666_b10) 2022; 18 Sohal (10.1016/j.compeleceng.2023.108666_b33) 2022; 34 Yang (10.1016/j.compeleceng.2023.108666_b2) 2021; 8 Chen (10.1016/j.compeleceng.2023.108666_b6) 2021; 9 Hui (10.1016/j.compeleceng.2023.108666_b15) 2020; 17 10.1016/j.compeleceng.2023.108666_b36 Ning (10.1016/j.compeleceng.2023.108666_b5) 2018; 13 10.1016/j.compeleceng.2023.108666_b35 Xia (10.1016/j.compeleceng.2023.108666_b4) 2019; 6 |
References_xml | – volume: 126 start-page: 45 year: 2019 end-page: 58 ident: b20 article-title: A survey on privacy protection in blockchain system publication-title: J Netw Comput Appl – volume: 34 start-page: 1417 year: 2022 end-page: 1425 ident: b33 article-title: BDNA-a DNA inspired symmetric key cryptographic technique to secure cloud computing publication-title: J King Saud Univ-Comput Inform Sci – volume: 69 start-page: 13784 year: 2020 end-page: 13795 ident: b7 article-title: Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV publication-title: IEEE Trans Veh Technol – reference: Wodi BH, Leung CK, Cuzzocrea A, Sourav S. Fast Privacy-Preserving Keyword Search on Encrypted Outsourced Data. In: 2019 IEEE international conference on big data (big data). 2019, p. 1–10. – volume: 9 start-page: 2545 year: 2022 end-page: 2554 ident: b19 article-title: Federated-learning-based anomaly detection for IoT security attacks publication-title: IEEE Internet Things J – volume: 8 start-page: 4004 year: 2021 end-page: 4022 ident: b3 article-title: A survey on security and privacy issues in edge-computing-assisted Internet of Things publication-title: IEEE Internet Things J – volume: 4 start-page: 791 year: 2017 end-page: 803 ident: b16 article-title: A distributed publisher-driven secure data sharing scheme for information-centric IoT publication-title: IEEE Internet Things J – volume: 52 start-page: 3261 year: 2020 end-page: 3275 ident: b18 article-title: Learning cross-modal common representations by private-shared subspaces separation publication-title: IEEE Trans Cybern – volume: 13 start-page: 94 year: 2018 end-page: 105 ident: b5 article-title: Auditable publication-title: IEEE Trans Inf Forensics Secur – volume: 36 start-page: 2058 year: 2021 end-page: 2080 ident: b21 article-title: A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing publication-title: Int J Intell Syst – reference: Tan L, Yu K, Yang C, Bashir AK. A blockchain-based Shamir’s threshold cryptography for data protection in industrial internet of things of smart city. In: Proceedings of the 1st workshop on artificial intelligence and blockchain technologies for smart cities with 6G. 2021, p. 13–8. – reference: Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth eurosys conference. 2018, p. 1–15. – volume: 12 start-page: 762 year: 2019 end-page: 771 ident: b14 article-title: Blockchain for large-scale Internet of Things data storage and protection publication-title: IEEE Trans Serv Comput – reference: Solworth J, Sloan R. A Layered Design of Discretionary Access Controls with Decidable Safety Properties. In: IEEE symposium on security and privacy, 2004. proceedings. 2004. 2004, p. 56–67. – volume: 54 year: 2020 ident: b17 article-title: LSDAR: A light-weight structure based data aggregation routing protocol with secure Internet of Things integrated next-generation sensor networks publication-title: Sustainable Cities Soc – reference: Kashmar N, Adda M, Atieh M, Ibrahim H. A New Dynamic Smart-AC Model Methodology to Enforce Access Control Policy in IoT Layers. In: 2019 IEEE/ACM 1st international workshop on software engineering research practices for the internet of things. 2019, p. 21–4. – volume: 80 start-page: 14 year: 2019 end-page: 24 ident: b29 article-title: Security analysis and new models on the intelligent symmetric key encryption publication-title: Comput Secur – volume: 6 start-page: 10749 year: 2019 end-page: 10762 ident: b4 article-title: Secured fine-grained selective access to outsourced cloud data in IoT environments publication-title: IEEE Internet Things J – start-page: 129 year: 1992 end-page: 140 ident: b9 article-title: Non-interactive and information-theoretic secure verifiable secret sharing publication-title: Advances in Cryptology – CRYPTO ’91, Vol. 576 – volume: 8 start-page: 1868 year: 2021 end-page: 1876 ident: b22 article-title: DRRS-BC: Decentralized routing registration system based on blockchain publication-title: IEEE/CAA J Autom Sin – volume: 14 year: 2021 ident: b11 article-title: What do practitioners discuss about iot and industry 4.0 related technologies? characterization and identification of iot and industry 4.0 categories in stack overflow discussions publication-title: Internet Things – volume: 9 start-page: 1753 year: 2021 end-page: 1764 ident: b6 article-title: Lightweight searchable public-key encryption with forward privacy over IIoT outsourced data publication-title: IEEE Trans Emerg Top Comput – volume: 100 start-page: 210 year: 2012 end-page: 224 ident: b1 article-title: Cyber– physical system security for the electric power grid publication-title: Proc IEEE – volume: 8 start-page: 5744 year: 2021 end-page: 5761 ident: b28 article-title: Designing blockchain-based access control protocol in IoT-enabled smart-grid system publication-title: IEEE Internet Things J – volume: 4 start-page: 224 year: 2001 end-page: 274 ident: b25 article-title: Proposed NIST standard for role-based access control publication-title: ACM Trans Inform Syst Secur – volume: 8 start-page: 8632 year: 2021 end-page: 8643 ident: b2 article-title: Secure data access control with fair accountability in smart grid data sharing: An edge blockchain approach publication-title: IEEE Internet Things J – volume: 23 start-page: 22312 year: 2022 end-page: 22319 ident: b13 article-title: Global-PBNet: A novel point cloud registration for autonomous driving publication-title: IEEE Trans Intell Transp Syst – volume: 8 start-page: 1 year: 2022 end-page: 13 ident: b24 article-title: Revocable identity-based access control for big data with verifiable outsourced computing publication-title: IEEE Trans Big Data – volume: 23 start-page: 368 year: 2018 end-page: 375 ident: b12 article-title: Brain intelligence: Go beyond artificial intelligence publication-title: Mob Netw Appl – volume: 8 start-page: 107993 year: 2020 end-page: 108003 ident: b34 article-title: ITSSAKA-MS: An improved three-factor symmetric-key based secure AKA scheme for multi-server environments publication-title: IEEE Access – volume: 6 start-page: 7992 year: 2019 end-page: 8004 ident: b27 article-title: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks publication-title: IEEE Internet Things J – volume: 18 start-page: 6415 year: 2022 end-page: 6423 ident: b10 article-title: Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems publication-title: IEEE Trans Ind Inf – volume: 17 start-page: 73 year: 2020 end-page: 88 ident: b15 article-title: A novel secure data transmission scheme in industrial Internet of Things publication-title: China Commun – volume: 117 start-page: 3309 year: 2021 end-page: 3325 ident: b31 article-title: ESKEA: Enhanced symmetric key encryption algorithm based secure data storage in cloud networks with data deduplication publication-title: Wirel Pers Commun – start-page: 199 year: 2020 end-page: 224 ident: b32 article-title: Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy publication-title: Cryptographers’ track at the RSA conference – volume: 198 year: 2021 ident: b30 article-title: An enhanced symmetric-key based 5G-AKA protocol publication-title: Comput Netw – volume: 13 start-page: 94 issue: 1 year: 2018 ident: 10.1016/j.compeleceng.2023.108666_b5 article-title: Auditable σ -time outsourced attribute-based encryption for access control in cloud computing publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2017.2738601 – volume: 34 start-page: 1417 issue: 1 year: 2022 ident: 10.1016/j.compeleceng.2023.108666_b33 article-title: BDNA-a DNA inspired symmetric key cryptographic technique to secure cloud computing publication-title: J King Saud Univ-Comput Inform Sci – volume: 9 start-page: 1753 issue: 4 year: 2021 ident: 10.1016/j.compeleceng.2023.108666_b6 article-title: Lightweight searchable public-key encryption with forward privacy over IIoT outsourced data publication-title: IEEE Trans Emerg Top Comput doi: 10.1109/TETC.2019.2921113 – volume: 17 start-page: 73 issue: 1 year: 2020 ident: 10.1016/j.compeleceng.2023.108666_b15 article-title: A novel secure data transmission scheme in industrial Internet of Things publication-title: China Commun doi: 10.23919/JCC.2020.01.006 – volume: 8 start-page: 5744 issue: 7 year: 2021 ident: 10.1016/j.compeleceng.2023.108666_b28 article-title: Designing blockchain-based access control protocol in IoT-enabled smart-grid system publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.3030308 – start-page: 129 year: 1992 ident: 10.1016/j.compeleceng.2023.108666_b9 article-title: Non-interactive and information-theoretic secure verifiable secret sharing – start-page: 199 year: 2020 ident: 10.1016/j.compeleceng.2023.108666_b32 article-title: Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy – volume: 18 start-page: 6415 issue: 9 year: 2022 ident: 10.1016/j.compeleceng.2023.108666_b10 article-title: Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems publication-title: IEEE Trans Ind Inf doi: 10.1109/TII.2022.3143619 – ident: 10.1016/j.compeleceng.2023.108666_b23 – volume: 12 start-page: 762 issue: 5 year: 2019 ident: 10.1016/j.compeleceng.2023.108666_b14 article-title: Blockchain for large-scale Internet of Things data storage and protection publication-title: IEEE Trans Serv Comput doi: 10.1109/TSC.2018.2853167 – volume: 14 year: 2021 ident: 10.1016/j.compeleceng.2023.108666_b11 article-title: What do practitioners discuss about iot and industry 4.0 related technologies? characterization and identification of iot and industry 4.0 categories in stack overflow discussions publication-title: Internet Things doi: 10.1016/j.iot.2021.100364 – ident: 10.1016/j.compeleceng.2023.108666_b36 doi: 10.1145/3190508.3190538 – volume: 100 start-page: 210 issue: 1 year: 2012 ident: 10.1016/j.compeleceng.2023.108666_b1 article-title: Cyber– physical system security for the electric power grid publication-title: Proc IEEE doi: 10.1109/JPROC.2011.2165269 – volume: 69 start-page: 13784 issue: 11 year: 2020 ident: 10.1016/j.compeleceng.2023.108666_b7 article-title: Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV publication-title: IEEE Trans Veh Technol doi: 10.1109/TVT.2020.3027568 – volume: 6 start-page: 7992 issue: 5 year: 2019 ident: 10.1016/j.compeleceng.2023.108666_b27 article-title: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2019.2904303 – volume: 8 start-page: 4004 issue: 6 year: 2021 ident: 10.1016/j.compeleceng.2023.108666_b3 article-title: A survey on security and privacy issues in edge-computing-assisted Internet of Things publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.3015432 – volume: 9 start-page: 2545 issue: 4 year: 2022 ident: 10.1016/j.compeleceng.2023.108666_b19 article-title: Federated-learning-based anomaly detection for IoT security attacks publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2021.3077803 – volume: 4 start-page: 224 issue: 3 year: 2001 ident: 10.1016/j.compeleceng.2023.108666_b25 article-title: Proposed NIST standard for role-based access control publication-title: ACM Trans Inform Syst Secur doi: 10.1145/501978.501980 – volume: 6 start-page: 10749 issue: 6 year: 2019 ident: 10.1016/j.compeleceng.2023.108666_b4 article-title: Secured fine-grained selective access to outsourced cloud data in IoT environments publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2019.2941638 – volume: 52 start-page: 3261 issue: 5 year: 2020 ident: 10.1016/j.compeleceng.2023.108666_b18 article-title: Learning cross-modal common representations by private-shared subspaces separation publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2020.3009004 – volume: 198 year: 2021 ident: 10.1016/j.compeleceng.2023.108666_b30 article-title: An enhanced symmetric-key based 5G-AKA protocol publication-title: Comput Netw doi: 10.1016/j.comnet.2021.108373 – ident: 10.1016/j.compeleceng.2023.108666_b26 doi: 10.1109/SERP4IoT.2019.00011 – volume: 23 start-page: 368 issue: 2 year: 2018 ident: 10.1016/j.compeleceng.2023.108666_b12 article-title: Brain intelligence: Go beyond artificial intelligence publication-title: Mob Netw Appl doi: 10.1007/s11036-017-0932-8 – volume: 8 start-page: 1868 issue: 12 year: 2021 ident: 10.1016/j.compeleceng.2023.108666_b22 article-title: DRRS-BC: Decentralized routing registration system based on blockchain publication-title: IEEE/CAA J Autom Sin doi: 10.1109/JAS.2021.1004204 – volume: 8 start-page: 1 issue: 1 year: 2022 ident: 10.1016/j.compeleceng.2023.108666_b24 article-title: Revocable identity-based access control for big data with verifiable outsourced computing publication-title: IEEE Trans Big Data doi: 10.1109/TBDATA.2017.2697448 – volume: 8 start-page: 107993 year: 2020 ident: 10.1016/j.compeleceng.2023.108666_b34 article-title: ITSSAKA-MS: An improved three-factor symmetric-key based secure AKA scheme for multi-server environments publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3000716 – volume: 36 start-page: 2058 issue: 5 year: 2021 ident: 10.1016/j.compeleceng.2023.108666_b21 article-title: A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing publication-title: Int J Intell Syst doi: 10.1002/int.22371 – ident: 10.1016/j.compeleceng.2023.108666_b35 doi: 10.1145/3477084.3484951 – volume: 126 start-page: 45 year: 2019 ident: 10.1016/j.compeleceng.2023.108666_b20 article-title: A survey on privacy protection in blockchain system publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2018.10.020 – volume: 4 start-page: 791 issue: 3 year: 2017 ident: 10.1016/j.compeleceng.2023.108666_b16 article-title: A distributed publisher-driven secure data sharing scheme for information-centric IoT publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2017.2666799 – volume: 80 start-page: 14 year: 2019 ident: 10.1016/j.compeleceng.2023.108666_b29 article-title: Security analysis and new models on the intelligent symmetric key encryption publication-title: Comput Secur doi: 10.1016/j.cose.2018.07.018 – ident: 10.1016/j.compeleceng.2023.108666_b8 doi: 10.1109/BigData47090.2019.9046058 – volume: 117 start-page: 3309 issue: 4 year: 2021 ident: 10.1016/j.compeleceng.2023.108666_b31 article-title: ESKEA: Enhanced symmetric key encryption algorithm based secure data storage in cloud networks with data deduplication publication-title: Wirel Pers Commun doi: 10.1007/s11277-020-07989-6 – volume: 23 start-page: 22312 issue: 11 year: 2022 ident: 10.1016/j.compeleceng.2023.108666_b13 article-title: Global-PBNet: A novel point cloud registration for autonomous driving publication-title: IEEE Trans Intell Transp Syst doi: 10.1109/TITS.2022.3153133 – volume: 8 start-page: 8632 issue: 10 year: 2021 ident: 10.1016/j.compeleceng.2023.108666_b2 article-title: Secure data access control with fair accountability in smart grid data sharing: An edge blockchain approach publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.3047640 – volume: 54 year: 2020 ident: 10.1016/j.compeleceng.2023.108666_b17 article-title: LSDAR: A light-weight structure based data aggregation routing protocol with secure Internet of Things integrated next-generation sensor networks publication-title: Sustainable Cities Soc doi: 10.1016/j.scs.2019.101995 |
SSID | ssj0004618 |
Score | 2.4342434 |
Snippet | With the rapid advancement of the manufacturing industry from digital stage to network stage, the massive data generated by the production, consumption and... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 108666 |
SubjectTerms | Blockchain Key management Power IoT Threshold secret sharing |
Title | BCTC-KSM: A blockchain-assisted threshold cryptography for key security management in power IoT data sharing |
URI | https://dx.doi.org/10.1016/j.compeleceng.2023.108666 |
Volume | 108 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEF6KguhBfOKzrOB1bTbZ7DbipRalWtqLFXoL2ZfWRxraePDib3cnSWsFQcFjAsOG2dmZWfLN9yF0GjChg2bIidC-IYxrThJlAsKsp6kIfCkZzA73-rxzz26H4bCG2rNZGIBVVrm_zOlFtq7eNCpvNrLRCGZ8WSiAZjeARqFg_GRMQJSffdCF2UhaZmMG1IweX0EnXxgvgG2D3IxJH85AR7zQHSoIE3-oUQt153oDrVcNI26V37SJaibdQmsLNILb6OWyPWiT7l3vHLewdNXpWT26Cz9xfTFsosa527Ap_GfCavKe5RVLNXb9KnZnGE8rDTv8OsfC4FGKMxBQwzfjAQYYKZ4-JrDcDrq_vhq0O6RSUSAq8GlOfMmp0kr5ikXuchZZdyI9IazW2h1vxbXvW2Yi7vpXo2US8qY2CddeQrVQktpgFy2l49TsIRxqLlTIjVCRdXUsjBJLPWltKKSOTET3UXPmt1hVFOOgdPESz7BkT_GCy2NweVy6fB_5c9Os5Nn4i9HFbHPib0ETu3rwu_nB_8wP0So8lejHI7SUT97MsetQclkvQrCOlls33U7_E5Ls6RY |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1JSyNBFH5IBGc8iM6CzriUMNcae6klLV5iUBJjcpkI3pquzcSlE5Kew_x766UrmoGBEbx286jmVb2l6O99H8CPlEmTNrmg0iSWMmEELbRNKXORiWWaKMVwdrg_EJ0bdnXLb9egvZyFQVhlyP11Tl9k6_DkJHjzZDoe44wv4xJpdlNsFJDxcx3ZqXgD1lvdXmewMh4Z1wmZITtjJDbg-BXmhchtVJyx5d1PlBJfSA8tOBP_UaZWSs_lNmyFnpG06s_agTVbfoLNFSbBz_B43h62ae9X_5S0iPIF6kGP_J2f-tYY99GQyu_ZHH81ET37M60CUTXxLSvxYUzmQcaOPL3AYci4JFPUUCPdyZAgkpTMRwUu9wVuLi-G7Q4NQgpUp0lc0USJWButE80yfz_LnA_KSEpnjPERroVJEsdsJnwLa40quGgaWwgTFbGRWsUu_QqNclLaXSDcCKm5sFJnzpcynhUujpRzXCqT2Szeg-bSb7kOLOModvGYL-Fk9_mKy3N0eV67fA-SF9NpTbXxFqOz5ebkf52b3JeE_5t_e5_5EXzoDPvX-XV30PsOH_FNDYbch0Y1-20PfMNSqcNwIJ8BjLjrxw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=BCTC-KSM%3A+A+blockchain-assisted+threshold+cryptography+for+key+security+management+in+power+IoT+data+sharing&rft.jtitle=Computers+%26+electrical+engineering&rft.au=Deng%2C+Song&rft.au=Hu%2C+Qicong&rft.au=Wu%2C+Di&rft.au=He%2C+Yi&rft.date=2023-05-01&rft.issn=0045-7906&rft.volume=108&rft.spage=108666&rft_id=info:doi/10.1016%2Fj.compeleceng.2023.108666&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_compeleceng_2023_108666 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0045-7906&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0045-7906&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0045-7906&client=summon |