Searchable Encryption with Access Control in Industrial Internet of Things (IIoT)
نویسندگان
چکیده
The technological advancements in the Internet of Things (IoT) and related technologies lead to revolutionary many sectors. One these sectors, is industrial sector red that leverages IoT forming Industrial (IIoT). IIoT has potential enhance manufacturing process by improving quality, trace-ability, integrity processes. enhancement achieved deploying devices (sensors) across facilities; therefore, monitoring systems are required collect (from multiple locations) analyse data, most likely cloud. As a result, should be secure, preserve privacy, provide real-time responses for critical decision-making. In this review, we identified gap state-of-the-art secure propose set criteria privacy preserving efficiency deliver better applications.
منابع مشابه
Searchable Encryption with Access Control ∗ Nils Löken
Outsourcing data to the cloud is becoming increasingly prevalent. To ensure data confidentiality, encrypting the data before outsourcing it is advised. While encryption protects the secrets in the data, it also prevents operations on the data. For example in a multi-user setting, data is often accessed via search, but encryption prevents search. Searchable encryption solves this dilemma. Howeve...
متن کاملIndustrial Analytics: Methodiken und Datensysteme für das Industrial Internet (IIoT)
An einem breiten Spektrum von Kundenbeispielen vom Schifsdiesel über Kafeemaschinen bis hin zum Industrieroboter wird aufgezeigt, dass im Bereich Analytics von Industrial Internet of Things (IIoT) Anwendungen der Data Scientist ohne den Domainexperten nicht zu befriedigenden Ergebnissen kommen kann. Die Kundenbeispiele lassen sich im Kern in sechs unterschiedliche Use Cases unterteilen: Root-Ca...
متن کاملCloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring
The promising potential of the emerging Internet of Things (IoT) technologies for interconnected medical devices and sensors has played an important role in the next-generation healthcare industry for quality patient care. Because of the increasing number of elderly and disabled people, there is an urgent need for a real-time health monitoring infrastructure for analyzing patients’ healthcare d...
متن کاملMulti-level Access in Searchable Symmetric Encryption
Remote storage delivers a cost effective solution for data storage. If data is of a sensitive nature, it should be encrypted prior to outsourcing to ensure confidentiality; however, searching then becomes challenging. Searchable encryption is a well-studied solution to this problem. Many schemes only consider the scenario where users can search over the entirety of the encrypted data. In practi...
متن کاملAccess Control in Internet of Things: A Survey
Cheating is a real problem in the Internet of Things. The fundamental question that needs to be answered is how we can trust the validity of the data being generated in the first place. The problem, however, isnt inherent in whether or not to embrace the idea of an open platform and open-source software, but to establish a methodology to verify the trustworthiness and control any access. This p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2021
ISSN: ['1530-8669', '1530-8677']
DOI: https://doi.org/10.1155/2021/5555362