Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts

نویسندگان

چکیده

The sharing of data is becoming increasingly important for the process and manufacturing industries that are using data-driven models advanced analysis to assess production performance make predictions, e.g., on wear tear. In such environments, access needs be accurately controlled prevent leakage unauthorized users while providing easy manage policies. Data should further shared with outside trusted domains encryption. Finally, means revoking needed. This paper provides a survey attribute-based approaches control data, focusing policy management enforcement. We aim identify key properties provided by (ABAC) encryption (ABE) can combined used meet abovementioned needs. describe possible combinations in context proposed architecture secure sharing. concludes identifying knowledge gaps provide direction future research industrial contexts.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Model For Secure Data Sharing Using Attribute Based Encryption

The data security concerns and requirements are very essential for social networks or for cloud computing where individuals, organizations, and businesses may outsource their various types of data, including highly sensitive data into the cloud. Always people would like to make their sensitive or private data only accessible to authorized people having some access policies. So in order to share...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing

A Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) employs the PRE technology in the attribute-based encryption cryptographic setting, in which the proxy is allowed to convert an encryption under an access policy to another encryption under a new access policy. CP-ABPRE is applicable to many real world applications, such as network data sharing. The existing CP-ABPRE systems, ho...

متن کامل

Secure Contexts for Confidential Data

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be too demanding when some knowledge about the environment (context) in which the process is going to run is available. To deal with these situations we introduce the notion of secure c...

متن کامل

Secure Data Sharing in Cloud Environment Using Multi Authority Attribute Based Encryption

Cloud computing, as associate rising computing paradigm, permits users to remotely store their knowledge during a cloud, thus on relish services on-demand. With fast development of cloud computing, additional and additional enterprises can source their sensitive knowledge for sharing during a cloud. To stay the shared knowledge confidential against untrusted cloud service suppliers (CSPs), a na...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3240000