BCTC-KSM: A blockchain-assisted threshold cryptography for key security management in power IoT data sharing

With the rapid advancement of the manufacturing industry from digital stage to network stage, the massive data generated by the production, consumption and other links in power IoT (PIoT) needs to be analyzed and processed urgently. However, due to the limited storage and computing capacity of PIoT...

Full description

Saved in:
Bibliographic Details
Published inComputers & electrical engineering Vol. 108; p. 108666
Main Authors Deng, Song, Hu, Qicong, Wu, Di, He, Yi
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.05.2023
Subjects
Online AccessGet full text
ISSN0045-7906
DOI10.1016/j.compeleceng.2023.108666

Cover

Loading…
Abstract With the rapid advancement of the manufacturing industry from digital stage to network stage, the massive data generated by the production, consumption and other links in power IoT (PIoT) needs to be analyzed and processed urgently. However, due to the limited storage and computing capacity of PIoT devices, the collected industrial data are usually encrypted and stored in the cloud. Data security will be highly dependent on key security, and it is crucial for data privacy protection in PIoT to securely manage keys. Therefore, this paper proposes a Blockchain-Assisted Threshold Cryptography for Key Security Management in Power IoT Data Sharing (BCTC-KSM). We use the Pedersen threshold secret sharing algorithm off-chain to split the symmetric keys used to encrypt cloud-outsourcing data in PIoT into multiple key fragments and publish them on-chain, and use the ledger technology of blockchain to record the rotation history of each key fragment and its access subjects, and then restrict the user access to the key fragments through attribute access control policies on-chain. Security analysis and experimental results show that the BCTC-KSM can significantly improve the security and availability in PIoT data sharing at a slightly higher time cost than the state-of-the-art cryptography scheme.
AbstractList With the rapid advancement of the manufacturing industry from digital stage to network stage, the massive data generated by the production, consumption and other links in power IoT (PIoT) needs to be analyzed and processed urgently. However, due to the limited storage and computing capacity of PIoT devices, the collected industrial data are usually encrypted and stored in the cloud. Data security will be highly dependent on key security, and it is crucial for data privacy protection in PIoT to securely manage keys. Therefore, this paper proposes a Blockchain-Assisted Threshold Cryptography for Key Security Management in Power IoT Data Sharing (BCTC-KSM). We use the Pedersen threshold secret sharing algorithm off-chain to split the symmetric keys used to encrypt cloud-outsourcing data in PIoT into multiple key fragments and publish them on-chain, and use the ledger technology of blockchain to record the rotation history of each key fragment and its access subjects, and then restrict the user access to the key fragments through attribute access control policies on-chain. Security analysis and experimental results show that the BCTC-KSM can significantly improve the security and availability in PIoT data sharing at a slightly higher time cost than the state-of-the-art cryptography scheme.
ArticleNumber 108666
Author He, Yi
Wu, Di
Hu, Qicong
Deng, Song
Author_xml – sequence: 1
  givenname: Song
  surname: Deng
  fullname: Deng, Song
  email: dengsong@njupt.edu.cn
  organization: Institute of Advanced Technology, Nanjing University Post & Telecommunication, 210003, Nanjing, China
– sequence: 2
  givenname: Qicong
  surname: Hu
  fullname: Hu, Qicong
  email: 1220055518@njupt.edu.cn
  organization: Institute of Advanced Technology, Nanjing University Post & Telecommunication, 210003, Nanjing, China
– sequence: 3
  givenname: Di
  orcidid: 0000-0002-7788-9202
  surname: Wu
  fullname: Wu, Di
  email: wudi1986@swu.edu.cn
  organization: College of Computer and Information Science, Southwest University, 400715, Chongqing, China
– sequence: 4
  givenname: Yi
  surname: He
  fullname: He, Yi
  email: yihe@cs.odu.edu
  organization: Old Dominion University, Norfolk, VA, 23462, USA
BookMark eNqNkMtOwzAQRb0oEuXxD-YDUuykdRo2CCJeAsSCsrac8SRxm9iRbUD5e4LKArFCsxjNle6R5hyRmXUWCTnjbMEZF-fbBbh-wA4BbbNIWZpN-VoIMSNzxparJC-YOCRHIWzZdAu-npPuutyUyePr8wW9olXnYAetMjZRIZgQUdPYegyt6zQFPw7RNV4N7Uhr5-kORxoQ3r2JI-2VVQ32aCM1lg7uEz19cBuqVVQ0tMob25yQg1p1AU9_9jF5u73ZlPfJ08vdQ3n1lECW8pikleCgAVJYFnyaOi8ylue11prlGQidpvUSC7HmFepKrcRaoxKaKa5zqHidHZNizwXvQvBYy8GbXvlRcia_Vcmt_KVKfquSe1VT9_JPF0xU0TgbvTLdvwjlnoDTix8GvQxg0AJq4xGi1M78g_IFlbeUDQ
CitedBy_id crossref_primary_10_1002_spy2_448
crossref_primary_10_1016_j_aei_2024_103085
crossref_primary_10_3390_app14167034
crossref_primary_10_1007_s10586_024_04379_6
crossref_primary_10_32604_cmc_2024_052008
crossref_primary_10_3390_en17174380
crossref_primary_10_1016_j_adhoc_2023_103299
crossref_primary_10_1016_j_compeleceng_2023_108986
crossref_primary_10_1016_j_chaos_2023_114361
crossref_primary_10_1038_s41598_024_62435_y
crossref_primary_10_1016_j_compeleceng_2024_109403
crossref_primary_10_1080_03772063_2025_2459791
crossref_primary_10_3390_math11143036
crossref_primary_10_1016_j_compeleceng_2023_109010
Cites_doi 10.1109/TIFS.2017.2738601
10.1109/TETC.2019.2921113
10.23919/JCC.2020.01.006
10.1109/JIOT.2020.3030308
10.1109/TII.2022.3143619
10.1109/TSC.2018.2853167
10.1016/j.iot.2021.100364
10.1145/3190508.3190538
10.1109/JPROC.2011.2165269
10.1109/TVT.2020.3027568
10.1109/JIOT.2019.2904303
10.1109/JIOT.2020.3015432
10.1109/JIOT.2021.3077803
10.1145/501978.501980
10.1109/JIOT.2019.2941638
10.1109/TCYB.2020.3009004
10.1016/j.comnet.2021.108373
10.1109/SERP4IoT.2019.00011
10.1007/s11036-017-0932-8
10.1109/JAS.2021.1004204
10.1109/TBDATA.2017.2697448
10.1109/ACCESS.2020.3000716
10.1002/int.22371
10.1145/3477084.3484951
10.1016/j.jnca.2018.10.020
10.1109/JIOT.2017.2666799
10.1016/j.cose.2018.07.018
10.1109/BigData47090.2019.9046058
10.1007/s11277-020-07989-6
10.1109/TITS.2022.3153133
10.1109/JIOT.2020.3047640
10.1016/j.scs.2019.101995
ContentType Journal Article
Copyright 2023 Elsevier Ltd
Copyright_xml – notice: 2023 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.compeleceng.2023.108666
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
ExternalDocumentID 10_1016_j_compeleceng_2023_108666
S0045790623000903
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AATTM
AAXKI
AAXUO
AAYFN
ABBOA
ABEFU
ABFNM
ABJNI
ABMAC
ABWVN
ABXDB
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACRPL
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADNMO
ADTZH
AEBSH
AECPX
AEIPS
AEKER
AENEX
AFFNX
AFJKZ
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
BNPGV
CS3
DU5
EBS
EFJIC
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LG9
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
RXW
SBC
SDF
SDG
SDP
SES
SET
SEW
SPC
SPCBC
SSH
SST
SSV
SSZ
T5K
TAE
TN5
UHS
VOH
WH7
WUQ
XPP
ZMT
~G-
~S-
AAYWO
AAYXX
ACVFH
ADCNI
AEUPX
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKYEP
APXCP
CITATION
ID FETCH-LOGICAL-c321t-2b61cdcc2c491919f793077fddd073c6d22f4e9681bedba568dea6d0a1d7cb1f3
IEDL.DBID .~1
ISSN 0045-7906
IngestDate Tue Jul 01 01:45:56 EDT 2025
Thu Apr 24 23:02:27 EDT 2025
Sun Apr 06 06:54:51 EDT 2025
IsPeerReviewed true
IsScholarly true
Keywords Power IoT
Key management
Threshold secret sharing
Blockchain
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c321t-2b61cdcc2c491919f793077fddd073c6d22f4e9681bedba568dea6d0a1d7cb1f3
ORCID 0000-0002-7788-9202
ParticipantIDs crossref_primary_10_1016_j_compeleceng_2023_108666
crossref_citationtrail_10_1016_j_compeleceng_2023_108666
elsevier_sciencedirect_doi_10_1016_j_compeleceng_2023_108666
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate May 2023
2023-05-00
PublicationDateYYYYMMDD 2023-05-01
PublicationDate_xml – month: 05
  year: 2023
  text: May 2023
PublicationDecade 2020
PublicationTitle Computers & electrical engineering
PublicationYear 2023
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Aly, Khomh, Yacout (b11) 2021; 14
Solworth J, Sloan R. A Layered Design of Discretionary Access Controls with Decidable Safety Properties. In: IEEE symposium on security and privacy, 2004. proceedings. 2004. 2004, p. 56–67.
Kashmar N, Adda M, Atieh M, Ibrahim H. A New Dynamic Smart-AC Model Methodology to Enforce Access Control Policy in IoT Layers. In: 2019 IEEE/ACM 1st international workshop on software engineering research practices for the internet of things. 2019, p. 21–4.
Ning, Cao, Dong, Liang, Ma, Wei (b5) 2018; 13
Wodi BH, Leung CK, Cuzzocrea A, Sourav S. Fast Privacy-Preserving Keyword Search on Encrypted Outsourced Data. In: 2019 IEEE international conference on big data (big data). 2019, p. 1–10.
Haseeb, Islam, Saba, Rehman, Mehmood (b17) 2020; 54
Zhou, Chen, Zhang, Su, James (b29) 2019; 80
Alwarafy, Al-Thelaya, Abdallah, Schneider, Hamdi (b3) 2021; 8
Ali, Hussain, Rehman, Munshi, Liaqat, Kumar (b34) 2020; 8
Yang, Guan, Wu, Du, Guizani (b2) 2021; 8
Zheng, Li, Yang, Lu (b13) 2022; 23
Avoine, Canard, Ferreira (b32) 2020
Li, Song, Mei, Li, Cheng, Sun (b14) 2019; 12
Sun, Wang, Cai, Liu, Tong, Jiang (b21) 2021; 36
Mothukuri, Khare, Parizi, Pouriyeh, Dehghantanha, Srivastava (b19) 2022; 9
Hui, Zhou, Xu, Lin (b15) 2020; 17
Sohal, Sharma (b33) 2022; 34
Lu, Li, Chen, Kim, Serikawa (b12) 2018; 23
Lu, Tang, Sun (b22) 2021; 8
Tan L, Yu K, Yang C, Bashir AK. A blockchain-based Shamir’s threshold cryptography for data protection in industrial internet of things of smart city. In: Proceedings of the 1st workshop on artificial intelligence and blockchain technologies for smart cities with 6G. 2021, p. 13–8.
Xiong, Choo, Vasilakos (b24) 2022; 8
Chen, Wu, Kumar, Choo, He (b6) 2021; 9
Feng, He, Zeadally, Khan, Kumar (b20) 2019; 126
Qahtan, Sharif, Zaidan, Alsattar, Albahri, Zaidan (b10) 2022; 18
Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth eurosys conference. 2018, p. 1–15.
Elkana Ebinazer, Savarimuthu, Mary Saira Bhanu (b31) 2021; 117
Munilla, Burmester, Barco (b30) 2021; 198
Feng, Yu, Aloqaily, Alazab, Lv, Mumtaz (b7) 2020; 69
Li, Asaeda, Li (b16) 2017; 4
Sridhar, Hahn, Govindarasu (b1) 2012; 100
Xia, Sifah, Obour Agyekum, Xia, Acheampong, Smahi (b4) 2019; 6
Xu, Lin, Gao, Lu, Shen, Li (b18) 2020; 52
Gai, Wu, Zhu, Xu, Zhang (b27) 2019; 6
Ferraiolo, Sandhu, Gavrila, Kuhn, Chandramouli (b25) 2001; 4
Bera, Saha, Das, Vasilakos (b28) 2021; 8
Pedersen (b9) 1992
Ferraiolo (10.1016/j.compeleceng.2023.108666_b25) 2001; 4
Gai (10.1016/j.compeleceng.2023.108666_b27) 2019; 6
Li (10.1016/j.compeleceng.2023.108666_b16) 2017; 4
Ali (10.1016/j.compeleceng.2023.108666_b34) 2020; 8
Zheng (10.1016/j.compeleceng.2023.108666_b13) 2022; 23
Munilla (10.1016/j.compeleceng.2023.108666_b30) 2021; 198
Avoine (10.1016/j.compeleceng.2023.108666_b32) 2020
Aly (10.1016/j.compeleceng.2023.108666_b11) 2021; 14
Xu (10.1016/j.compeleceng.2023.108666_b18) 2020; 52
Feng (10.1016/j.compeleceng.2023.108666_b20) 2019; 126
Mothukuri (10.1016/j.compeleceng.2023.108666_b19) 2022; 9
10.1016/j.compeleceng.2023.108666_b26
Sridhar (10.1016/j.compeleceng.2023.108666_b1) 2012; 100
Elkana Ebinazer (10.1016/j.compeleceng.2023.108666_b31) 2021; 117
Pedersen (10.1016/j.compeleceng.2023.108666_b9) 1992
Lu (10.1016/j.compeleceng.2023.108666_b12) 2018; 23
10.1016/j.compeleceng.2023.108666_b23
10.1016/j.compeleceng.2023.108666_b8
Sun (10.1016/j.compeleceng.2023.108666_b21) 2021; 36
Feng (10.1016/j.compeleceng.2023.108666_b7) 2020; 69
Alwarafy (10.1016/j.compeleceng.2023.108666_b3) 2021; 8
Bera (10.1016/j.compeleceng.2023.108666_b28) 2021; 8
Zhou (10.1016/j.compeleceng.2023.108666_b29) 2019; 80
Li (10.1016/j.compeleceng.2023.108666_b14) 2019; 12
Haseeb (10.1016/j.compeleceng.2023.108666_b17) 2020; 54
Lu (10.1016/j.compeleceng.2023.108666_b22) 2021; 8
Xiong (10.1016/j.compeleceng.2023.108666_b24) 2022; 8
Qahtan (10.1016/j.compeleceng.2023.108666_b10) 2022; 18
Sohal (10.1016/j.compeleceng.2023.108666_b33) 2022; 34
Yang (10.1016/j.compeleceng.2023.108666_b2) 2021; 8
Chen (10.1016/j.compeleceng.2023.108666_b6) 2021; 9
Hui (10.1016/j.compeleceng.2023.108666_b15) 2020; 17
10.1016/j.compeleceng.2023.108666_b36
Ning (10.1016/j.compeleceng.2023.108666_b5) 2018; 13
10.1016/j.compeleceng.2023.108666_b35
Xia (10.1016/j.compeleceng.2023.108666_b4) 2019; 6
References_xml – volume: 126
  start-page: 45
  year: 2019
  end-page: 58
  ident: b20
  article-title: A survey on privacy protection in blockchain system
  publication-title: J Netw Comput Appl
– volume: 34
  start-page: 1417
  year: 2022
  end-page: 1425
  ident: b33
  article-title: BDNA-a DNA inspired symmetric key cryptographic technique to secure cloud computing
  publication-title: J King Saud Univ-Comput Inform Sci
– volume: 69
  start-page: 13784
  year: 2020
  end-page: 13795
  ident: b7
  article-title: Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV
  publication-title: IEEE Trans Veh Technol
– reference: Wodi BH, Leung CK, Cuzzocrea A, Sourav S. Fast Privacy-Preserving Keyword Search on Encrypted Outsourced Data. In: 2019 IEEE international conference on big data (big data). 2019, p. 1–10.
– volume: 9
  start-page: 2545
  year: 2022
  end-page: 2554
  ident: b19
  article-title: Federated-learning-based anomaly detection for IoT security attacks
  publication-title: IEEE Internet Things J
– volume: 8
  start-page: 4004
  year: 2021
  end-page: 4022
  ident: b3
  article-title: A survey on security and privacy issues in edge-computing-assisted Internet of Things
  publication-title: IEEE Internet Things J
– volume: 4
  start-page: 791
  year: 2017
  end-page: 803
  ident: b16
  article-title: A distributed publisher-driven secure data sharing scheme for information-centric IoT
  publication-title: IEEE Internet Things J
– volume: 52
  start-page: 3261
  year: 2020
  end-page: 3275
  ident: b18
  article-title: Learning cross-modal common representations by private-shared subspaces separation
  publication-title: IEEE Trans Cybern
– volume: 13
  start-page: 94
  year: 2018
  end-page: 105
  ident: b5
  article-title: Auditable
  publication-title: IEEE Trans Inf Forensics Secur
– volume: 36
  start-page: 2058
  year: 2021
  end-page: 2080
  ident: b21
  article-title: A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing
  publication-title: Int J Intell Syst
– reference: Tan L, Yu K, Yang C, Bashir AK. A blockchain-based Shamir’s threshold cryptography for data protection in industrial internet of things of smart city. In: Proceedings of the 1st workshop on artificial intelligence and blockchain technologies for smart cities with 6G. 2021, p. 13–8.
– reference: Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth eurosys conference. 2018, p. 1–15.
– volume: 12
  start-page: 762
  year: 2019
  end-page: 771
  ident: b14
  article-title: Blockchain for large-scale Internet of Things data storage and protection
  publication-title: IEEE Trans Serv Comput
– reference: Solworth J, Sloan R. A Layered Design of Discretionary Access Controls with Decidable Safety Properties. In: IEEE symposium on security and privacy, 2004. proceedings. 2004. 2004, p. 56–67.
– volume: 54
  year: 2020
  ident: b17
  article-title: LSDAR: A light-weight structure based data aggregation routing protocol with secure Internet of Things integrated next-generation sensor networks
  publication-title: Sustainable Cities Soc
– reference: Kashmar N, Adda M, Atieh M, Ibrahim H. A New Dynamic Smart-AC Model Methodology to Enforce Access Control Policy in IoT Layers. In: 2019 IEEE/ACM 1st international workshop on software engineering research practices for the internet of things. 2019, p. 21–4.
– volume: 80
  start-page: 14
  year: 2019
  end-page: 24
  ident: b29
  article-title: Security analysis and new models on the intelligent symmetric key encryption
  publication-title: Comput Secur
– volume: 6
  start-page: 10749
  year: 2019
  end-page: 10762
  ident: b4
  article-title: Secured fine-grained selective access to outsourced cloud data in IoT environments
  publication-title: IEEE Internet Things J
– start-page: 129
  year: 1992
  end-page: 140
  ident: b9
  article-title: Non-interactive and information-theoretic secure verifiable secret sharing
  publication-title: Advances in Cryptology – CRYPTO ’91, Vol. 576
– volume: 8
  start-page: 1868
  year: 2021
  end-page: 1876
  ident: b22
  article-title: DRRS-BC: Decentralized routing registration system based on blockchain
  publication-title: IEEE/CAA J Autom Sin
– volume: 14
  year: 2021
  ident: b11
  article-title: What do practitioners discuss about iot and industry 4.0 related technologies? characterization and identification of iot and industry 4.0 categories in stack overflow discussions
  publication-title: Internet Things
– volume: 9
  start-page: 1753
  year: 2021
  end-page: 1764
  ident: b6
  article-title: Lightweight searchable public-key encryption with forward privacy over IIoT outsourced data
  publication-title: IEEE Trans Emerg Top Comput
– volume: 100
  start-page: 210
  year: 2012
  end-page: 224
  ident: b1
  article-title: Cyber– physical system security for the electric power grid
  publication-title: Proc IEEE
– volume: 8
  start-page: 5744
  year: 2021
  end-page: 5761
  ident: b28
  article-title: Designing blockchain-based access control protocol in IoT-enabled smart-grid system
  publication-title: IEEE Internet Things J
– volume: 4
  start-page: 224
  year: 2001
  end-page: 274
  ident: b25
  article-title: Proposed NIST standard for role-based access control
  publication-title: ACM Trans Inform Syst Secur
– volume: 8
  start-page: 8632
  year: 2021
  end-page: 8643
  ident: b2
  article-title: Secure data access control with fair accountability in smart grid data sharing: An edge blockchain approach
  publication-title: IEEE Internet Things J
– volume: 23
  start-page: 22312
  year: 2022
  end-page: 22319
  ident: b13
  article-title: Global-PBNet: A novel point cloud registration for autonomous driving
  publication-title: IEEE Trans Intell Transp Syst
– volume: 8
  start-page: 1
  year: 2022
  end-page: 13
  ident: b24
  article-title: Revocable identity-based access control for big data with verifiable outsourced computing
  publication-title: IEEE Trans Big Data
– volume: 23
  start-page: 368
  year: 2018
  end-page: 375
  ident: b12
  article-title: Brain intelligence: Go beyond artificial intelligence
  publication-title: Mob Netw Appl
– volume: 8
  start-page: 107993
  year: 2020
  end-page: 108003
  ident: b34
  article-title: ITSSAKA-MS: An improved three-factor symmetric-key based secure AKA scheme for multi-server environments
  publication-title: IEEE Access
– volume: 6
  start-page: 7992
  year: 2019
  end-page: 8004
  ident: b27
  article-title: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks
  publication-title: IEEE Internet Things J
– volume: 18
  start-page: 6415
  year: 2022
  end-page: 6423
  ident: b10
  article-title: Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems
  publication-title: IEEE Trans Ind Inf
– volume: 17
  start-page: 73
  year: 2020
  end-page: 88
  ident: b15
  article-title: A novel secure data transmission scheme in industrial Internet of Things
  publication-title: China Commun
– volume: 117
  start-page: 3309
  year: 2021
  end-page: 3325
  ident: b31
  article-title: ESKEA: Enhanced symmetric key encryption algorithm based secure data storage in cloud networks with data deduplication
  publication-title: Wirel Pers Commun
– start-page: 199
  year: 2020
  end-page: 224
  ident: b32
  article-title: Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy
  publication-title: Cryptographers’ track at the RSA conference
– volume: 198
  year: 2021
  ident: b30
  article-title: An enhanced symmetric-key based 5G-AKA protocol
  publication-title: Comput Netw
– volume: 13
  start-page: 94
  issue: 1
  year: 2018
  ident: 10.1016/j.compeleceng.2023.108666_b5
  article-title: Auditable σ -time outsourced attribute-based encryption for access control in cloud computing
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2017.2738601
– volume: 34
  start-page: 1417
  issue: 1
  year: 2022
  ident: 10.1016/j.compeleceng.2023.108666_b33
  article-title: BDNA-a DNA inspired symmetric key cryptographic technique to secure cloud computing
  publication-title: J King Saud Univ-Comput Inform Sci
– volume: 9
  start-page: 1753
  issue: 4
  year: 2021
  ident: 10.1016/j.compeleceng.2023.108666_b6
  article-title: Lightweight searchable public-key encryption with forward privacy over IIoT outsourced data
  publication-title: IEEE Trans Emerg Top Comput
  doi: 10.1109/TETC.2019.2921113
– volume: 17
  start-page: 73
  issue: 1
  year: 2020
  ident: 10.1016/j.compeleceng.2023.108666_b15
  article-title: A novel secure data transmission scheme in industrial Internet of Things
  publication-title: China Commun
  doi: 10.23919/JCC.2020.01.006
– volume: 8
  start-page: 5744
  issue: 7
  year: 2021
  ident: 10.1016/j.compeleceng.2023.108666_b28
  article-title: Designing blockchain-based access control protocol in IoT-enabled smart-grid system
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.3030308
– start-page: 129
  year: 1992
  ident: 10.1016/j.compeleceng.2023.108666_b9
  article-title: Non-interactive and information-theoretic secure verifiable secret sharing
– start-page: 199
  year: 2020
  ident: 10.1016/j.compeleceng.2023.108666_b32
  article-title: Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy
– volume: 18
  start-page: 6415
  issue: 9
  year: 2022
  ident: 10.1016/j.compeleceng.2023.108666_b10
  article-title: Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems
  publication-title: IEEE Trans Ind Inf
  doi: 10.1109/TII.2022.3143619
– ident: 10.1016/j.compeleceng.2023.108666_b23
– volume: 12
  start-page: 762
  issue: 5
  year: 2019
  ident: 10.1016/j.compeleceng.2023.108666_b14
  article-title: Blockchain for large-scale Internet of Things data storage and protection
  publication-title: IEEE Trans Serv Comput
  doi: 10.1109/TSC.2018.2853167
– volume: 14
  year: 2021
  ident: 10.1016/j.compeleceng.2023.108666_b11
  article-title: What do practitioners discuss about iot and industry 4.0 related technologies? characterization and identification of iot and industry 4.0 categories in stack overflow discussions
  publication-title: Internet Things
  doi: 10.1016/j.iot.2021.100364
– ident: 10.1016/j.compeleceng.2023.108666_b36
  doi: 10.1145/3190508.3190538
– volume: 100
  start-page: 210
  issue: 1
  year: 2012
  ident: 10.1016/j.compeleceng.2023.108666_b1
  article-title: Cyber– physical system security for the electric power grid
  publication-title: Proc IEEE
  doi: 10.1109/JPROC.2011.2165269
– volume: 69
  start-page: 13784
  issue: 11
  year: 2020
  ident: 10.1016/j.compeleceng.2023.108666_b7
  article-title: Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV
  publication-title: IEEE Trans Veh Technol
  doi: 10.1109/TVT.2020.3027568
– volume: 6
  start-page: 7992
  issue: 5
  year: 2019
  ident: 10.1016/j.compeleceng.2023.108666_b27
  article-title: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2019.2904303
– volume: 8
  start-page: 4004
  issue: 6
  year: 2021
  ident: 10.1016/j.compeleceng.2023.108666_b3
  article-title: A survey on security and privacy issues in edge-computing-assisted Internet of Things
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.3015432
– volume: 9
  start-page: 2545
  issue: 4
  year: 2022
  ident: 10.1016/j.compeleceng.2023.108666_b19
  article-title: Federated-learning-based anomaly detection for IoT security attacks
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2021.3077803
– volume: 4
  start-page: 224
  issue: 3
  year: 2001
  ident: 10.1016/j.compeleceng.2023.108666_b25
  article-title: Proposed NIST standard for role-based access control
  publication-title: ACM Trans Inform Syst Secur
  doi: 10.1145/501978.501980
– volume: 6
  start-page: 10749
  issue: 6
  year: 2019
  ident: 10.1016/j.compeleceng.2023.108666_b4
  article-title: Secured fine-grained selective access to outsourced cloud data in IoT environments
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2019.2941638
– volume: 52
  start-page: 3261
  issue: 5
  year: 2020
  ident: 10.1016/j.compeleceng.2023.108666_b18
  article-title: Learning cross-modal common representations by private-shared subspaces separation
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2020.3009004
– volume: 198
  year: 2021
  ident: 10.1016/j.compeleceng.2023.108666_b30
  article-title: An enhanced symmetric-key based 5G-AKA protocol
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2021.108373
– ident: 10.1016/j.compeleceng.2023.108666_b26
  doi: 10.1109/SERP4IoT.2019.00011
– volume: 23
  start-page: 368
  issue: 2
  year: 2018
  ident: 10.1016/j.compeleceng.2023.108666_b12
  article-title: Brain intelligence: Go beyond artificial intelligence
  publication-title: Mob Netw Appl
  doi: 10.1007/s11036-017-0932-8
– volume: 8
  start-page: 1868
  issue: 12
  year: 2021
  ident: 10.1016/j.compeleceng.2023.108666_b22
  article-title: DRRS-BC: Decentralized routing registration system based on blockchain
  publication-title: IEEE/CAA J Autom Sin
  doi: 10.1109/JAS.2021.1004204
– volume: 8
  start-page: 1
  issue: 1
  year: 2022
  ident: 10.1016/j.compeleceng.2023.108666_b24
  article-title: Revocable identity-based access control for big data with verifiable outsourced computing
  publication-title: IEEE Trans Big Data
  doi: 10.1109/TBDATA.2017.2697448
– volume: 8
  start-page: 107993
  year: 2020
  ident: 10.1016/j.compeleceng.2023.108666_b34
  article-title: ITSSAKA-MS: An improved three-factor symmetric-key based secure AKA scheme for multi-server environments
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3000716
– volume: 36
  start-page: 2058
  issue: 5
  year: 2021
  ident: 10.1016/j.compeleceng.2023.108666_b21
  article-title: A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing
  publication-title: Int J Intell Syst
  doi: 10.1002/int.22371
– ident: 10.1016/j.compeleceng.2023.108666_b35
  doi: 10.1145/3477084.3484951
– volume: 126
  start-page: 45
  year: 2019
  ident: 10.1016/j.compeleceng.2023.108666_b20
  article-title: A survey on privacy protection in blockchain system
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2018.10.020
– volume: 4
  start-page: 791
  issue: 3
  year: 2017
  ident: 10.1016/j.compeleceng.2023.108666_b16
  article-title: A distributed publisher-driven secure data sharing scheme for information-centric IoT
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2017.2666799
– volume: 80
  start-page: 14
  year: 2019
  ident: 10.1016/j.compeleceng.2023.108666_b29
  article-title: Security analysis and new models on the intelligent symmetric key encryption
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2018.07.018
– ident: 10.1016/j.compeleceng.2023.108666_b8
  doi: 10.1109/BigData47090.2019.9046058
– volume: 117
  start-page: 3309
  issue: 4
  year: 2021
  ident: 10.1016/j.compeleceng.2023.108666_b31
  article-title: ESKEA: Enhanced symmetric key encryption algorithm based secure data storage in cloud networks with data deduplication
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-020-07989-6
– volume: 23
  start-page: 22312
  issue: 11
  year: 2022
  ident: 10.1016/j.compeleceng.2023.108666_b13
  article-title: Global-PBNet: A novel point cloud registration for autonomous driving
  publication-title: IEEE Trans Intell Transp Syst
  doi: 10.1109/TITS.2022.3153133
– volume: 8
  start-page: 8632
  issue: 10
  year: 2021
  ident: 10.1016/j.compeleceng.2023.108666_b2
  article-title: Secure data access control with fair accountability in smart grid data sharing: An edge blockchain approach
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.3047640
– volume: 54
  year: 2020
  ident: 10.1016/j.compeleceng.2023.108666_b17
  article-title: LSDAR: A light-weight structure based data aggregation routing protocol with secure Internet of Things integrated next-generation sensor networks
  publication-title: Sustainable Cities Soc
  doi: 10.1016/j.scs.2019.101995
SSID ssj0004618
Score 2.4342434
Snippet With the rapid advancement of the manufacturing industry from digital stage to network stage, the massive data generated by the production, consumption and...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 108666
SubjectTerms Blockchain
Key management
Power IoT
Threshold secret sharing
Title BCTC-KSM: A blockchain-assisted threshold cryptography for key security management in power IoT data sharing
URI https://dx.doi.org/10.1016/j.compeleceng.2023.108666
Volume 108
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEF6KguhBfOKzrOB1bTbZ7DbipRalWtqLFXoL2ZfWRxraePDib3cnSWsFQcFjAsOG2dmZWfLN9yF0GjChg2bIidC-IYxrThJlAsKsp6kIfCkZzA73-rxzz26H4bCG2rNZGIBVVrm_zOlFtq7eNCpvNrLRCGZ8WSiAZjeARqFg_GRMQJSffdCF2UhaZmMG1IweX0EnXxgvgG2D3IxJH85AR7zQHSoIE3-oUQt153oDrVcNI26V37SJaibdQmsLNILb6OWyPWiT7l3vHLewdNXpWT26Cz9xfTFsosa527Ap_GfCavKe5RVLNXb9KnZnGE8rDTv8OsfC4FGKMxBQwzfjAQYYKZ4-JrDcDrq_vhq0O6RSUSAq8GlOfMmp0kr5ikXuchZZdyI9IazW2h1vxbXvW2Yi7vpXo2US8qY2CddeQrVQktpgFy2l49TsIRxqLlTIjVCRdXUsjBJLPWltKKSOTET3UXPmt1hVFOOgdPESz7BkT_GCy2NweVy6fB_5c9Os5Nn4i9HFbHPib0ETu3rwu_nB_8wP0So8lejHI7SUT97MsetQclkvQrCOlls33U7_E5Ls6RY
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1JSyNBFH5IBGc8iM6CzriUMNcae6klLV5iUBJjcpkI3pquzcSlE5Kew_x766UrmoGBEbx286jmVb2l6O99H8CPlEmTNrmg0iSWMmEELbRNKXORiWWaKMVwdrg_EJ0bdnXLb9egvZyFQVhlyP11Tl9k6_DkJHjzZDoe44wv4xJpdlNsFJDxcx3ZqXgD1lvdXmewMh4Z1wmZITtjJDbg-BXmhchtVJyx5d1PlBJfSA8tOBP_UaZWSs_lNmyFnpG06s_agTVbfoLNFSbBz_B43h62ae9X_5S0iPIF6kGP_J2f-tYY99GQyu_ZHH81ET37M60CUTXxLSvxYUzmQcaOPL3AYci4JFPUUCPdyZAgkpTMRwUu9wVuLi-G7Q4NQgpUp0lc0USJWButE80yfz_LnA_KSEpnjPERroVJEsdsJnwLa40quGgaWwgTFbGRWsUu_QqNclLaXSDcCKm5sFJnzpcynhUujpRzXCqT2Szeg-bSb7kOLOModvGYL-Fk9_mKy3N0eV67fA-SF9NpTbXxFqOz5ebkf52b3JeE_5t_e5_5EXzoDPvX-XV30PsOH_FNDYbch0Y1-20PfMNSqcNwIJ8BjLjrxw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=BCTC-KSM%3A+A+blockchain-assisted+threshold+cryptography+for+key+security+management+in+power+IoT+data+sharing&rft.jtitle=Computers+%26+electrical+engineering&rft.au=Deng%2C+Song&rft.au=Hu%2C+Qicong&rft.au=Wu%2C+Di&rft.au=He%2C+Yi&rft.date=2023-05-01&rft.issn=0045-7906&rft.volume=108&rft.spage=108666&rft_id=info:doi/10.1016%2Fj.compeleceng.2023.108666&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_compeleceng_2023_108666
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0045-7906&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0045-7906&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0045-7906&client=summon