Document Type
Article
Publication Date
2018
DOI
10.4018/IJISP.2018100105
Publication Title
International Journal of Information Security and Privacy
Volume
12
Issue
4
Pages
68-81
Abstract
Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate and feed different information retrieval requests using tokens specifically generated for each type of request. Providing both traceability of data operations, and unlinkability of end user activities, a robust blockchain-based CPS is prototyped. Evaluation indicates the architecture is capable of assured data provenance validation and user privacy preservation at a low overhead.
Original Publication Citation
Liang, X., Shetty, S., Tosh, D., K., Zhao, J., Li, D., & Liu, J. (2018). A reliable data provenance and privacy preservation architecture for business-driven cyber-physical systems using blockchain. International Journal of Information Security and Privacy, 12(4), 68-81. doi:10.4018/IJISP.2018100105
ORCID
0000-0002-8789-0610 (Shetty)
Repository Citation
Liang, Xueping; Shetty, Sachin; Tosh, Deepak K.; Zhao, Juan; Li, Danyi; and Liu, Jihong, "A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain" (2018). VMASC Publications. 39.
https://digitalcommons.odu.edu/vmasc_pubs/39
Included in
Computer and Systems Architecture Commons, Digital Communications and Networking Commons, Information Security Commons
Comments
"IGI GLOBAL AUTHORS, UNDER FAIR USE CAN:
•Post the final typeset PDF (which includes the title page, table of contents and other front materials, and the copyright statement) of their chapter or article (NOT THE ENTIRE BOOK OR JOURNAL ISSUE), on the author or editor's secure personal website and/or their university repository site."
Copyright © 2018, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.