4.7 Article

TIIA: A blockchain-enabled Threat Intelligence Integrity Audit scheme for IIoT

出版社

ELSEVIER
DOI: 10.1016/j.future.2022.02.023

关键词

Blockchain; Threat intelligence; Integrity audit; Paillier; Searchable encryption

向作者/读者索取更多资源

This paper proposes a blockchain-enabled Threat Intelligence Integrity Audit (TIIA) scheme for IIoT, which ensures the confidentiality protection requirements of threat intelligence on the blockchain and has high audit efficiency.
With the widespread deployment of the Industrial Internet of Things technology (IIoT), the cyber security threats of IIoT systems are increasing. Threat intelligence sharing is an effective way to resist cyber security threats. However, there is a contradiction between information integrity and the requirement of building a complete attack chain in the threat intelligence sharing and utilization. Due to the limited capacity of block storage pattern, it can be found that threat intelligence is prone to fragmentation on blockchain. In this paper, a blockchain-enabled Threat Intelligence Integrity Audit (TIIA) scheme for IIoT is proposed. This scheme can audit the integrity of threat intelligence in ciphertext state to ensure the confidentiality protection requirements of threat intelligence on blockchain. A double chain structure is presented in the TIIA scheme. The storage-chain is used to store threat intelligence ciphertext, while the audit-chain is designed to achieve the integrity audit of the corresponding fragment on the storage-chain. In addition, Paillier homomorphic encryption and searchable encryption are used to realize the confidentiality and ciphertext retrieval of threat intelligence on the storage-chain. A redundant block deletion algorithm is designed to reduce the audit-chain load and improve audit efficiency. The performance analysis shows that the proposed scheme can effectively reduce the computational and communication costs, and has a high audit efficiency. (C)& nbsp;2022 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据