End to End Secure Data Exchange in Value Chains with Dynamic Policy Updates

Data exchange among value chain partners provides them with a competitive advantage, but the risk of exposing sensitive data is ever-increasing. Information must be protected in storage and transmission to reduce this risk, so only the data producer and the final consumer can access or modify it. End-to-end (E2E) security mechanisms address this challenge, protecting companies from data breaches resulting from value chain attacks. Moreover, value chain particularities must also be considered. Multiple entities are involved in dynamic environments like these, both in data generation and consumption. Hence, a flexible generation of access policies is required to ensure that they can be updated whenever needed. This paper presents a CP-ABE-reliant data exchange system for value chains with E2E security. It considers the most relevant security and industrial requirements for value chains. The proposed solution can protect data according to access policies and update those policies without breaking E2E security or overloading field devices. In most cases, field devices are IIoT devices, limited in terms of processing and memory capabilities. The experimental evaluation has shown the proposed solution's feasibility for IIoT platforms.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/14/2023

Communication Security in the Internet of Vehicles based Industrial Value Chain

The Internet of Vehicles (IoV) is formed by connecting vehicles to Inter...
research
07/13/2022

Optimal entanglement distribution policies in homogeneous repeater chains with cutoffs

We study the limits of bipartite entanglement distribution using a chain...
research
11/11/2022

Blockchain Technology to Secure Bluetooth

Bluetooth is a communication technology used to wirelessly exchange data...
research
08/19/2020

Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values

Attribute-Based Access Control (ABAC) and Relationship-based access cont...
research
11/16/2020

TDACS: an ABAC and Trust-based Dynamic Access Control Scheme in Hadoop

The era of big data has promoted the vigorous development of many indust...
research
03/22/2021

The IoT Exchange

The IoT ecosystem suffers from a variety of problems around security, id...
research
05/02/2022

Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies

Modern software systems rely on mining insights from business sensitive ...

Please sign up or login with your details

Forgot password? Click here to reset