Secure and Privacy-preserving Data-sharing Framework Based on Blockchain Technology for Al-Najaf/Iraq Oil Refinery
Samir M. Umran,Songfeng Lu,Zaid Ameen Abduljabbar,Zhi Lu,Bingyan Feng,Lu Zheng
DOI: https://doi.org/10.1109/smartworld-uic-atc-scalcom-digitaltwin-pricomp-metaverse56740.2022.00325
2022-01-01
Abstract:The Industrial Internet of Things or Industry 4.0 efficiently enhances the manufacturing process in terms of raising productivity, system performance, cost reduction, and building large-scale systems. It enables the connection of numerous heterogeneous devices and sensors into the internet network through the utilization of revolutionary techniques that transfer the manufacturing paradigm to intelligent processes. The traditional industrial internet of things adopts centralized architectures and complex encryption algorithms that suffer from several cyber-security threats and lead to data leakage, privacy disclosure, and high computational and communicational costs. In our work, we proposed a decentralized, efficient, low-power, scalable, secure, privacy-preserving, and trusting architecture based on a private blockchain network/smart contract and interplanetary file system technology for the Al-NajafyIraq oil refinery factory. That enables autonomous working and provides a high level of security authentication and privacy preservation, P2P communication, remote access, immutability and information backtracking. Traditional blockchain technology has storage limitation issues, most recent works adopted external servers or the cloud for storage purposes. Our proposed scheme addresses the limitations of blockchain data storage by adopting an interplanetary file system (IPFS) network; provides an efficient data encryption mechanism at the perceptual layer by adopting a lightweight encryption algorithm, high-performance, and ultra-low-power consumption ARM Cortex-M microcontroller. In addition, our architecture succeeds in merging blockchain technology, IoTs, and an IPFS with the oil refinery as an industrial application area. Moreover, it provides an efficient framework that resists common cyber-security attacks and realizes cyber-security requirements represented by data availability, integrity, and confidentiality.