A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace
Dixit, A. ORCID: 0000-0002-5476-0772, Zarpelao, B. B., Smith-Creasey, M. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2024). A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace. Computers & Security, 146, article number 104050. doi: 10.1016/j.cose.2024.104050
Abstract
Data is ubiquitous, powerful and valuable today. With vast instalments of Industrial Internet-of-Things (IIoT) infrastructure, data is in abundance albeit sitting in organizational silos. Data Marketplaces have emerged to allow monetization of data by trading it with interested buyers. While centralized marketplaces are common, they are controlled by few and are non-transparent. Decentralized data marketplaces allow the democratization of rates, trading terms and fine control to participants. However, in such a marketplace, ensuring privacy and security is crucial. Existing data exchange schemes depend on a trusted third party for key management during authentication and rely on a ‘one-time-off’ approach to authorization. This paper proposes a user-empowered, privacy-aware, authentication and usage-controlled access protocol for IIoT data marketplace. The proposed protocol leverages the concept of Self-Sovereign Identity (SSI) and is based on the standards of Decentralized Identifier (DID) and Verifiable Credential (VC). DIDs empower buyers and give them complete control over their identities. The buyers authenticate and prove claims to access data securely using VC. The proposed protocol also implements a dynamic user-revocation policy. Usage-controlled based access provides secure ongoing authorization during data exchange. A detailed performance and security analysis is provided to show its feasibility.
Publication Type: | Article |
---|---|
Additional Information: | This article is available under the Creative Commons CC-BY-NC license and permits non-commercial use, distribution and reproduction in any medium, provided the original work is properly cited. |
Publisher Keywords: | Data marketplace, Authentication, Usage control, Decentralized Identifiers (DID), Verifiable Credentials (VC), Privacy, User-revocation |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science T Technology > T Technology (General) |
Departments: | School of Science & Technology School of Science & Technology > Engineering |
SWORD Depositor: |
Available under License Creative Commons Attribution Non-commercial.
Download (2MB) | Preview
Export
Downloads
Downloads per month over past year