Reference Hub10
A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain

A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain

Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu
Copyright: © 2018 |Volume: 12 |Issue: 4 |Pages: 14
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522543091|DOI: 10.4018/IJISP.2018100105
Cite Article Cite Article

MLA

Liang, Xueping, et al. "A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain." IJISP vol.12, no.4 2018: pp.68-81. http://doi.org/10.4018/IJISP.2018100105

APA

Liang, X., Shetty, S., Tosh, D. K., Zhao, J., Li, D., & Liu, J. (2018). A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain. International Journal of Information Security and Privacy (IJISP), 12(4), 68-81. http://doi.org/10.4018/IJISP.2018100105

Chicago

Liang, Xueping, et al. "A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain," International Journal of Information Security and Privacy (IJISP) 12, no.4: 68-81. http://doi.org/10.4018/IJISP.2018100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate and feed different information retrieval requests using tokens specifically generated for each type of request. Providing both traceability of data operations, and unlinkability of end user activities, a robust blockchain-based CPS is prototyped. Evaluation indicates the architecture is capable of assured data provenance validation and user privacy preservation at a low overhead.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.