You are currently viewing a new version of our website. To view the old version click .
Journal of Cybersecurity and Privacy
  • Article
  • Open Access

3 October 2025

Blockchain-Enabled GDPR Compliance Enforcement for IIoT Data Access

,
and
1
Department of Computer Algebra, ELTE Eotvos Lorand University, 1053 Budapest, Hungary
2
School of Electrical and Electronic Engineering, Technological University Dublin, D07 EWV4 Dublin, Ireland
3
Institute for Data Science, Cloud Computing and IT Security (IDACUS), 78054 Furtwangen im Schwarzwald, Germany
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Data Protection and Privacy

Abstract

The General Data Protection Regulation (GDPR) imposes additional demands and obligations on service providers that handle and process personal data. In this paper, we examine how advanced cryptographic techniques can be employed to develop a privacy-preserving solution for ensuring GDPR compliance in Industrial Internet of Things (IIoT) systems. The primary objective is to ensure that sensitive data from IIoT devices is encrypted and accessible only to authorized entities, in accordance with Article 32 of the GDPR. The proposed system combines Decentralized Attribute-Based Encryption (DABE) with smart contracts on a blockchain to create a decentralized way of managing access to IIoT systems. The proposed system is used in an IIoT use case where industrial sensors collect operational data that is encrypted according to DABE. The encrypted data is stored in the IPFS decentralized storage system. The access policy and IPFS hash are stored in the blockchain’s smart contracts, allowing only authorized and compliant entities to retrieve the data based on matching attributes. This decentralized system ensures that information is stored encrypted and secure until it is retrieved by legitimate entities, whose access rights are automatically enforced by smart contracts. The implementation and evaluation of the proposed system have been analyzed and discussed, showing the promising achievement of the proposed system.

1. Introduction

The Industrial Internet of Things (IIoT) revolutionized industries by empowering machines, sensors, and other equipment to collect and exchange vast amounts of sensitive data [1]. However, with such additional connectivity come numerous security and privacy challenges, especially with the increasing importance of data coming from IIoT devices in supporting the functionality of industrial systems [2]. One of the most significant problems with IIoT systems is that sensitive information must be stored securely and access to it strictly controlled, in accordance with data protection laws, such as the General Data Protection Regulation (GDPR) [3]. Traditional security solutions, which typically rely on centralized models of access control, cannot serve in IIoT contexts due to the volume and nature of the network, which does not support maintaining control at its center. Never before have more robust, yet flexible and decentralized, security requirements been felt. Revolutionary cryptographic techniques, such as Attribute-Based Encryption (ABE) and the use of blockchain technology, are significant solutions. ABE is an encryption that allows data to be securely stored and transmitted, with users being granted access based on pre-specified properties [4]. This means that sensitive information can be encrypted until it reaches the intended person or device, making unauthorized access impossible.
Decentralized Attribute-Based Encryption (DABE) [5] replaces the single managing entity with a set of distributed, independent attribute authorities. By integrating DABE with blockchain technology, it becomes possible to decentralize access control operations, ensuring that no single organization has complete control over who should access what data. Decentralization enhances transparency, security, and the robustness of the system. This paper aims to develop a privacy-preserving solution that utilizes DABE and blockchain technology to ensure IIoT systems are GDPR-compliant, specifically Article 32 [3], which requires organizations to implement appropriate technical and organizational measures to ensure the confidentiality of personal data. The primary objective is to enforce security policies within IIoT systems automatically, with minimal human interaction, and to minimize the potential for compliance errors or security breaches. We also fill a significant gap by exploring how advanced cryptographic techniques are applied in IIoT systems, presenting a scalable, secure, and efficient method for protecting sensitive data and meeting regulatory requirements. The ultimate aim is to enhance the security, privacy, and trust of IIoT systems while enabling organizations to meet their legal obligations under GDPR [3].
With the above context in mind, the main contributions of this paper are as follows:
  • We design a framework that utilizes DABE and blockchain technology, offering GDPR-compliant data access control for IIoT systems.
  • We utilize the blockchain architecture to ensure transparency and traceability of data access events, with automatic enforcement of data access policies by smart contracts. This eliminates the need for a central authority, enhancing system security and privacy.
  • We utilize smart contracts to automate the enforcement of GDPR compliance, thereby reducing human error and enhancing the visibility and auditability of regulatory compliance.
The rest of the paper is organised as follows. Section 2 introduces various GDPR management techniques from the literature. Article 32 of the GDPR is briefly described in Section 3. The proposed framework is presented in Section 4. Section 5 presents the experimental procedure and the implementation details. Section 6 presents the observed results and their evaluation. Finally, a summary of this paper is provided in Section 7, along with some future directions.

3. GDPR Article 32

When an entity (e.g., a company branch) aims to access IIoT-generated private data, Article 32 of the GDPR (https://gdpr-info.eu/art-32-gdpr/ accessed on 27 April 2025) requires that the user has implemented “appropriate technical and organisational measures to ensure a level of security appropriate to the risk.” This meant that the user had ensured “the ongoing confidentiality, integrity, availability and resilience of processing systems and services.” In practical terms, this can be achieved through measures such as encryption, access control, authentication, and logging. Article 32 sets out four main requirements, which can be translated into the following attributes:
  • Attribute 1: Pseudonymization and encryption of personal data.
  • Attribute 2: Ensuring ongoing confidentiality, integrity, availability, and resilience of processing systems and services.
  • Attribute 3: The ability to restore availability and access to personal data quickly after a physical or technical incident.
  • Attribute 4: A process for regularly testing, assessing, and evaluating the effectiveness of security measures.
Before an entity, such as a company branch, is granted access, the data owner must be assured that the entity can “regularly test, assess and evaluate the effectiveness of technical and organisational measures for ensuring the security of the processing.” Evidence such as security policies, contractual data processing agreements, or recognised certifications would serve to demonstrate compliance. The roles of controller and processor also must be clearly established, as responsibility for maintaining “a level of security appropriate to the risk” rests with both parties. In short, Article 32 requires that access is conditional upon provable safeguards being in place. The primary objective of this paper is to automate and integrate access control with GDPR compliance verification.

4. The Proposed Framework

The proposed framework combines the most advanced cryptographic techniques, such as DABE, blockchain technology, and smart contracts, to enable GDPR-compliant access control on IIoT platforms. DABE is used to facilitate fine-grained encryption of personal data, where the access policies are represented in ciphertext directly and are expressed in terms of attributes extracted from GDPR Article 32 requirements, such as encryption, pseudonymization, access control, and integrity mechanisms for data. By integrating these technologies, the framework guarantees greater confidentiality, integrity, and availability of IIoT data while being strictly compliant with GDPR regulations, particularly ensuring security, accountability, and user data protection.

4.1. Framework Architecture

The architecture of the proposed framework integrates several aspects that collaborate to offer secure and GDPR-compliant access control. It starts with IIoT devices, which collect information from the real world and encrypt it to protect confidentiality. The encrypted data is stored securely via decentralized storage, ensuring its safety even in the event of system failure. The data is accessed by regulating it with smart contracts on a blockchain in such a way that only GDPR-compliant entities can access it based on their attributes. All elements of the system are structured to exchange information securely and efficiently, thereby safeguarding the information throughout the process. All these elements together constitute a secure environment that is GDPR-compliant in terms of security, transparency, and data privacy. An overview of the system architecture is presented in Figure 1.
Figure 1. The architecture of the proposed system.
The sensors constantly collect real-time data, for instance, diagnostics data, location, velocity, and other operational parameters, which are required for controlling and monitoring. Due to data sensitivity, encryption is immediately applied once the data is collected to protect it against unauthorized use or interference. The encryption mechanism follows access rules that are customized according to the GDPR Article 32 characteristics; thus, only users possessing the required security set of properties can successfully decrypt and access the data. Such fidelity-based access ensures confidentiality and data integrity throughout their lifespan. Once encrypted, the information is stored in the distributed storage network, providing a decentralized, tamper-proof repository to enhance immunity to single points of failure. The blockchain is also an open and unalterable record containing metadata about every attempt to access the data, including user attributes, request date and time, and the success or failure of the request. This logging process not only enables real-time monitoring and audit capabilities but also enhances traceability and accountability, both of which are required under GDPR compliance regulations.

4.2. Integration with DABE

DABE is used for encrypting IIoT data. The encryption process ensures that only those entities who satisfy a defined set of attributes (aligned with GDPR requirements) can access the encrypted data. The DABE encryption mechanism is defined as follows:
Let M represent the data to be encrypted. In DABE, the encryption of M is performed based on a policy P that specifies the required compliance attributes for decryption. The encryption process is
E P K ( M , P )
where E P K is the encryption function, P K is the public key of the system, and P is the set of compliance attributes that define the decryption policy. A user can decrypt the data only if their attributes match the compliance policy P. Decryption is performed using the user’s secret key S K u , which various service providers generate based on the user’s attributes. The decryption function is
D S K u ( C ) = M if A u P
where D S K u is the decryption function, and C is the ciphertext.

4.3. Blockchain Integration

Blockchain technology is incorporated into the proposed framework to ensure that access requests are logged in a secure, decentralized, and immutable ledger. Each access request, along with its associated metadata, including timestamp, user attributes, and access status, is recorded on the Blockchain. The ledger provides transparency, ensuring that every access attempt is publicly verifiable and traceable. A typical transaction on the Blockchain can be represented as
T = ( U , A , T s , P , Status )
where U represents the anonymized identifier of the user making the request, A represents the user’s compliance attributes, T s represents the timestamp of the request, P represents the compliance policy associated with the requested data and Status indicates whether the access was approved or denied. IPFS and Ethereum work together by storing encrypted data on IPFS and recording its unique Content Identifier (CID) on the Blockchain.

4.4. Smart Contract

The smart contract is deployed on the blockchain to enforce access control policies automatically. The contract is written in Solidity using the Foundry framework and implements authorization checks against attribute policies, emitting audit events. More specifically, it is an access-control contract that verifies the compliance attribute satisfaction and logs decisions (AccessLogged with user address, timestamp, policy, and result).
The CID on IPFS ensures data integrity, while the smart contract manages access and rules, together creating a secure and decentralized system for handling encrypted information. When a user attempts to access encrypted data, the contract verifies whether the user’s attributes satisfy the conditions specified by the compliance policy. Formally, the smart contract function is defined as
S ( U , A , P ) = Approve if A u P Deny otherwise
where U is the user, A is the set of compliance attributes associated with the user, and P is the compliance policy defined during encryption. The encrypted CID of IPFS is recorded in the smart contract. When the user U requests access to the data, the contract checks whether the user’s compliance attributes meet the defined policy. If they do, the encrypted CID is returned, allowing the user to retrieve the ciphertext from IPFS; if not, access is denied.

4.5. Cryptographic Protocol Design

This section describes the cryptographic components used in the proposed framework, with a particular focus on DABE encryption, key management, and access control mechanisms.
The core of the encryption process is based on DABE [5], where the data is encrypted based on a set of attributes. Key management in DABE involves an unlimited number of trusted and independent authorities that are authorized to generate compliance tokens for users. Upon joining the framework for the first time, an authority such as a cloud service provider generates its own public and private keys. The public key will later be used to create the ciphertext.
A user U, using its anonymized identity I u , requests a compliance ticket S K u for each attribute i by contacting the corresponding service provider. The service provider then generates the user’s tickets, that is, the secret keys linked to those attributes. Each ticket associated with a given attribute serves as proof of possession of that attribute. This ticketing mechanism defines the role of the secret key as evidence of compliance with the corresponding regulatory requirement.
The decentralized design of the protocol assigns different service provider nodes the responsibility for generating different sets of tickets. This distribution of authorities across multiple service providers reduces reliance on a single central entity and significantly mitigates the risks typically found in centralized systems. Additionally, the system is fully aligned with the lightweight generation of the ciphertext by utilizing and integrating the sharing of the encryption process [16] or outsourcing the heavy computations [17], making it suitable for the resource-constrained nodes with low computation power.

4.6. GDPR Article 32 Compliance Mechanisms

The proposed framework ensures adherence to the GDPR in terms of secure data handling and access permissions in IIoT systems. The framework meets the GDPR’s requirements for confidentiality, integrity, and user rights, with a focus on protecting data in smart manufacturing system applications.
To check compliance with Article 32, each attribute must be verified. A user (e.g., a company branch) is considered compliant only if it meets all four attributes. In practice, this means the user requesting the data access must receive four validation tickets (secret keys for each attribute) from the Issuers (e.g., cloud providers). The compliance logic for each attribute can be defined as follows:
  • Attribute 1: Pseudonymization and Encryption
  • Pseudonymization technique: must be tokenization or masking.
  • Encryption algorithm: must be an approved option such as AES, RSA, or ChaCha20.
  • Key length: must meet minimum security standards, e.g., at least 128 bits for symmetric encryption or 2048 bits for asymmetric encryption.
  • Attribute 2: Confidentiality, Integrity, Availability, and Resilience
  • Security measures: must include mandatory items such as a firewall.
  • Assessment frequency: at least quarterly.
  • Vulnerabilities found: must remain below a set threshold (e.g., fewer than 5).
  • Vulnerability severity: must not exceed acceptable levels (e.g., low or medium).
  • Attribute 3: Data Restoration Capabilities
  • Backup type: must be incremental or full.
  • Backup frequency: must be daily or weekly.
  • Recovery Time Objective (RTO): no more than 8 h.
  • Recovery Point Objective (RPO): no more than 4 h.
  • Attribute 4: Regular Testing and Evaluation
  • Assessment frequency: must be monthly, quarterly, or yearly.
  • Assessment type: must be an accepted method, such as vulnerability scanning, penetration testing, or a security audit.
  • Assessment status: must be marked as passed.
  • Last assessment date: must be within the last 18 months.

5. Implementation

To implement the proposed framework, and without loss of generality, the FABEO scheme introduced by Riepel and Wee was employed [18]. It provides efficient, pairing-based CP-ABE with optimal adaptive security and support for expressive access control policies. Based on that, we assumed one service provider that issues the four compliance tokens. In future implementations, these ABE implementations can be replaced by a DABE implementation. The deployment was carried out with the open-source code provided by the authors (https://github.com/DoreenRiepel/FABEO accessed on 3 February 2025), which served as a working and effective base to construct and test the encryption facilities within IIoT applications. To further enhance the security and scalability of the system, we augment this ABE solution with a decentralized storage network, utilizing IPFS to store the encrypted data.
Decentralized storage removes risks associated with centralized storage systems by offering enhanced resilience and availability. Additionally, data stored in IPFS remains completely encrypted, ensuring that even if the storage network is compromised, malicious nodes cannot access the confidential information. The data can only be retrieved by limiting the encrypted data, and this can only be carried out by the intended parties whose attributes satisfy the pre-configured requirements, through the use of the DABE scheme.
Currently, the system prototype (https://github.com/elte-cybersec/gdpr-compliant-IIoT accessed on 20 September 2025) encompasses four main components: (1) the ABE scheme that uses attributes to control access to encrypted data based on the GDPR Article 32 compliance, (2) encryption and decryption to secure data and ensure authorized decryption based on user attributes, (3) smart contracts to manage user access based on attributes stored on the blockchain, and (4) IPFS integration to store encrypted data off-chain for secure and decentralized access.
IPFS and Ethereum complement each other by combining decentralized storage with verifiable smart contract logic. Since storing ciphertext data directly on the blockchain is costly and inefficient, compared to storing it on IPFS, the encrypted and serialized ciphertext ( c i p h e r _ m s g ) is uploaded to IPFS, which returns a unique CID. This CID, a lightweight cryptographic reference, is then encrypted based on the compliance policy and stored in an Ethereum smart contract. The smart contract regulates the access, verification, and usage policies, while IPFS ensures decentralized and tamper-resistant storage. Together, this integration enables scalable, secure, and decentralized management of encrypted data.
Figure 2 illustrates an overview of the framework architecture and the used technologies. The compliance token is generated by the service provider. To conduct the process of both encryption and decryption, we implemented Algorithms 1 and 2, respectively. We start by outlining some of the notations we use in the rest of the paper, as shown in Table 2.
Figure 2. The main components of the proposed framework.
Table 2. List of notations.
On the one hand, Algorithm 1 illustrates the operation of the storage, where the essential inputs are the original IIoT data, p k , and the p o l i c y . The resulting c i p h e r c i d is structured with various cryptographic components such as C0, which enforce the access control policy. The e n c r y p t function encrypts the original IIoT data (msg) under the provided policy. The encryption ensures that only GDPR-compliant users with the right attributes can decrypt the data. After serialization, the c i p h e r m s g is uploaded to IPFS for decentralized storage. Each element of the c i p h e r m s g is serialized using the group.serialize function to enable it to be stored on IPFS.
Algorithm 1 Encryption Process
Require: 
m s g , p k , p o l i c y
Ensure: 
c i p h e r m s g { C 0 , }
1:
c i p h e r m s g e n c r y p t ( m s g , p k , p o l i c y )
2:
s e r i a l i z e ( c i p h e r m s g )
3:
I P F S c i p h e r m s g
4:
B C c i p h e r c i d
On the other hand, Algorithm 2 illustrates the operation of data access, where the essential inputs are the encrypted data c i p h e r m s g , c i p h e r c i d , and the secret key s k u . The decrypt function checks if the set of attributes of a user matches the policy that is embedded in the c i p h e r m s g . If the attributes meet the conditions, the c i p h e r c i d is first decrypted to the CID of the stored c i p h e r m s g , which is then decrypted. As a result, the original IIoT data will be recovered. To validate, we compare the decrypted message and the original message to verify successful decryption.
Algorithm 2 Decryption Process
Require: 
c i p h e r c i d , c i p h e r m s g , s k u
Ensure: 
m s g p l a i n m s g
1:
if  a t t r i b u t e s is met then
2:
     c i d d e c r y p t ( c i p h e r c i d , s k u )
3:
     c i p h e r m s g I P F S ( c i d )
4:
     P l a i n m s g d e c r y p t ( c i p h e r m s g , s k u )
5:
    if  p l a i n m s g = = m s g  then
6:
         S u c c e s s                 ▹ This is a validation process
7:
    else
8:
         F a i l
9:
    end if
10:
end if
The access control in the system is governed by the user’s attributes. These attributes determine whether a user can decrypt a message. Each user has a set of attributes, and the system checks if these attributes match the policy embedded in the ciphertext. A list of attributes is associated with each user. These attributes are used to generate a secret key for the user and are the basis for access control. Here is an example of a list of attributes: [‘DATACONTROLLER’, ‘ENCRYPTIONENABLED’, ‘ACCESSCONTROLENFORCED’, ‘PSEUDONYMIZATIONAPPLIED’, ‘TESTEDSECURITY’, ‘GDPRCOMPLIANT’]. The user’s secret key is generated based on their specific attributes, ensuring that only users with the right attributes can decrypt messages. In terms of the access control policy, a logical policy defines the required attributes for accessing a message. For example, a policy could specify that a user must have GDPRCOMPLIANT and ENCRYPTIONENABLED attributes to access the data.
To manage and enforce the access control policies on the blockchain, smart contracts are used. These contracts validate if a user has the required attributes and log access requests.

6. Evaluation

The system’s functionality and security are verified by testing the key generation, encryption, decryption, and compliant-based access control processes. Unit tests ensure that the system correctly handles various scenarios, including valid and invalid attributes, as well as correct logging of access attempts. The smart contract’s authorization functionality is tested using unit tests written in Solidity, utilizing the Foundry testing framework. These tests are essential to ensure that the access control logic correctly authorizes or denies entities based on their compliance tokens. The testing process validates the following key scenarios:
  • Positive Authorization Test: ensures that users such as company branches possessing all required compliance tokens, such as GDPRCOMPLIANT, ENCRYPTIONENABLED, and ACCESSCONTROLENFORCED, are successfully authorized by the smart contract.
  • Negative Authorization Test: validates that users missing critical attributes (e.g., only having ENCRYPTIONENABLED and ACCESSCONTROLENFORCED but lacking GDPRCOMPLIANT) are denied access, thus verifying the strict enforcement of attribute-based policies.
  • Attribute Validation Logic: tests the validateUserAttributes function to confirm that string matching using the keccak256 hash function is accurate and prevents bypassing the policy through minor string variations.
  • Access Event Logging: verifies that the AccessLogged event is emitted correctly with the user address, timestamp, policy description, and authorization result.

6.1. System Performance

To measure the performance of the proposed system, we implemented the system components in a Linux Ubuntu v24.04 with Intel Core i7 CPU and 16 GB RAM. On the one hand, Figure 3 provides an example result from running the unit tests on the smart contract, demonstrating correct behavior for both successful and failed authorization attempts. These unit tests not only confirm the correctness of the authorization logic but also increase the overall trustworthiness of the decentralized access control model applied in the IIoT environment.
Figure 3. Solidity test results using Foundry.
On the other hand, we collected a real-time performance measurement for the system at 30 and 60 s, respectively. Psrecord 1.4, which is a small Python utility library, was used to monitor both the CPU and memory activities of the system application and poll statistics from the Linux/proc file system. Figure 4 shows the obtained results, which reveal the trade-off between the speed and the memory consumption. Additionally, we measured the time required for processing Algorithms 1 and 2. The result shows a promising achievement since ∼ 0.4 s (on average) is what the system requires to conduct both the encryption and the decryption operations.
Figure 4. Total memory and processing load of the real-time deployment of the proposed system.

6.2. Security Analysis

In this section, we discuss the security of the proposed system and evaluate its resilience against common attacks, including Man-in-the-Middle (MITM) attacks, impersonation attacks, and collision attacks. These types of attacks are particularly relevant in IIoT environments, where ensuring the integrity, confidentiality, and compliant processing of sensitive data is essential. The goal is to verify that the system can resist these threats while remaining compliant with the GDPR.

6.2.1. Man-in-the-Middle (MITM) Attack

An MITM attack involves an adversary intercepting communication between two legitimate parties. The attacker might attempt to read or manipulate the data in transit. In the proposed system, sensitive messages are encrypted using DABE, where the encryption function is defined as
Encrypt ( msg , pk , policy ) ct
Here, msg is the plaintext data, pk is the public key, and policy defines the access structure. The ciphertext ct can only be decrypted by a user who possesses a key key such that their attribute set S satisfies
S policy
Without a valid key , it is computationally infeasible for an attacker to derive the original message. Even if an attacker intercepts ct via network sniffing or packet injection, the semantic security of the underlying DABE scheme ensures
Pr [ Adv decrypts ct ] ϵ ( negligible )
Additionally, storing encrypted data on IPFS and logging access through blockchain smart contracts adds tamper evidence and prevents data manipulation. The decentralized nature of IPFS also reduces the single point of failure that typically enables successful MITM attacks.

6.2.2. Impersonation Attack

Impersonation attacks occur when a malicious party impersonates a legitimate user to gain unauthorized access to protected data. In the proposed system, a user’s decryption capability is based on their attribute set S, not their identity alone. The key generation algorithm works as follows:
KeyGen ( sk , S ) key S
The attacker must obtain a secret key key S matching the attribute set required by the policy. This is only possible through access to the trusted authority that holds the private key, or by stealing the key. Both these cases are assumed to be infeasible in the model. The probability of successful impersonation, assuming secure key storage and distribution, is
Pr [ Adv impersonates User ] ϵ
Furthermore, incorporating external countermeasures such as multi-factor authentication (MFA) and access logging on the blockchain increases resistance to impersonation by adding a second layer of identity verification.

6.2.3. Collision Attack

A collision attack occurs when two users attempt to combine their attributes to decrypt a ciphertext that neither can decrypt individually. Let user A have the attribute set S A and user B have the attribute set S B . They merge their attributes into S A B = S A S B and use
key S A B ? access granted
However, in DABE, secret keys are generated with bound identities and cannot be arbitrarily combined. The encryption enforces policy evaluation at the key level:
S A B ¬ policy ( unless valid )
Even if S A B satisfies the policy, attacker cannot construct key S A B of two different entities:
Pr [ key S A B is valid ] ϵ
Moreover, unauthorized key generation or data access attempts are logged via smart contracts on the blockchain, ensuring traceability and accountability. These logs act as audit trails to identify malicious behaviors, providing GDPR-aligned transparency.
Table 3 illustrates the system’s resistance to common security threats and attacks, including MITM, impersonation, and token collision attacks. Each attack is assessed on how well the system can detect, mitigate, and resist such threats.
Table 3. Security analysis of the proposed system.

7. Conclusions

This paper proposes a framework that ensures secure, GDPR-compliant data access in IIoT environments. By utilizing smart contracts for access control and IPFS for decentralized storage, the framework provides a robust solution for securing sensitive data while enabling flexible, policy-based access. The encryption and decryption processes, along with rigorous attribute validation, ensure that only GDPR-compliant entities (such as company branches) can access protected data, thereby meeting privacy and security requirements. Future work can include deep analysis of various blockchain implementations, consensus protocols, and other distributed parameters. Additionally, further formal studies can be performed on the attacks pertinent specifically to blockchain-enabled IIoT, such as request replay, front-running, attribute escalation or tampering with on-chain metadata.

Author Contributions

Conceptualization, M.B.A.; methodology, M.B.A.; software, A.I.; validation, A.I., A.M. and M.B.A.; formal analysis, A.M. and M.B.A.; resources, A.I., A.M. and M.B.A.; writing—original draft preparation, A.I. and M.B.A.; writing—review and editing, A.M. and M.B.A.; visualization, A.I. and M.B.A.; funding acquisition, M.B.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research has been supported by the EKÖP-24 University Excellence Scholarship Program of the Ministry for Culture and Innovation from the national research, development and innovation fund.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial internet of things: Challenges, opportunities, and directions. IEEE Trans. Ind. Inform. 2018, 14, 4724–4734. [Google Scholar] [CrossRef]
  2. Gebremichael, T.; Ledwaba, L.P.I.; Eldefrawy, M.H.; Hancke, G.P.; Pereira, N.; Gidlund, M.; Akerberg, J. Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges. IEEE Access 2020, 8, 152351–152366. [Google Scholar] [CrossRef]
  3. European Commission Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation). 2016. Available online: https://eur-lex.europa.eu/eli/reg/2016/679/oj (accessed on 26 February 2023).
  4. Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006; ACM: New York, NY, USA, 2006; pp. 89–98. [Google Scholar] [CrossRef]
  5. Lewko, A.; Waters, B. Decentralizing attribute-based encryption. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, 15–19 May 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 568–588. [Google Scholar]
  6. Jhanjhi, N.; Humayun, M.; Almuayqil, S.N. Cyber security and privacy issues in industrial internet of things. Comput. Syst. Sci. Eng. 2021, 37, 361–380. [Google Scholar] [CrossRef]
  7. Valadares, D.C.G.; Perkusich, A.; Martins, A.F.; Alshawki, M.B.; Seline, C. Privacy-preserving blockchain technologies. Sensors 2023, 23, 7172. [Google Scholar] [CrossRef] [PubMed]
  8. Hu, C.; Luo, J.; Pu, Y.; Yu, J.; Zhao, R.; Huang, H.; Xiang, T. An efficient privacy-preserving data aggregation scheme for IoT. In Proceedings of the Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, 20–22 June 2018; Proceedings 13. Springer: Berlin/Heidelberg, Germany, 2018; pp. 164–176. [Google Scholar] [CrossRef]
  9. Hu, C.; Huo, Y.; Ma, L.; Liu, H.; Deng, S.; Feng, L. An attribute-based secure and scalable scheme for data communications in smart grids. In Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, Guilin, China, 19–21 June 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 469–482. [Google Scholar] [CrossRef]
  10. Sasikumar, A.; Ravi, L.; Devarajan, M.; Selvalakshmi, A.; Almaktoom, A.T.; Almazyad, A.S.; Xiong, G.; Mohamed, A.W. Blockchain-assisted hierarchical attribute-based encryption scheme for secure information sharing in industrial internet of things. IEEE Access 2024, 12, 12586–12601. [Google Scholar] [CrossRef]
  11. Hussain, H.; Mansor, Z.; Shukur, Z.; Jafar, U. Ether-IoT: A Realtime Lightweight and Scalable Blockchain-Enabled Cache Algorithm for IoT Access Control. Comput. Mater. Contin. 2023, 75, 3797–3815. [Google Scholar] [CrossRef]
  12. Lee, J.; Kim, M.; Park, K.; Noh, S.; Bisht, A.; Das, A.K.; Park, Y. Blockchain-Based Data Access Control and Key Agreement System in IoT Environment. Sensors 2023, 23, 5173. [Google Scholar] [CrossRef] [PubMed]
  13. Roy, S.; Ghosh, S. BloAC: A Blockchain-Based Secure Access Control Management System for IoT. TechRxiv 2023. [Google Scholar] [CrossRef]
  14. Zaidi, S.Y.A.; Shah, M.A.; Khattak, H.A.; Maple, C.; Rauf, H.T.; El-Sherbeeny, A.M.; El-Meligy, M.A. An attribute-based access control for IoT using blockchain and smart contracts. Sustainability 2021, 13, 10556. [Google Scholar] [CrossRef]
  15. Morello, M.; Sainio, P.; Alshawki, M. Regulatory Compliance Verification: A Privacy Preserving Approach. In Proceedings of the 2024 8th Cyber Security in Networking Conference (CSNet), Paris, France, 4–6 December 2024; pp. 263–267. [Google Scholar] [CrossRef]
  16. Alshawki, M.B.; Ligeti, P.; Reich, C. Sdabe: Efficient encryption in decentralized cp-abe using secret sharing. In Proceedings of the 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), Prague, Czech Republic, 20–22 July 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–6. [Google Scholar] [CrossRef]
  17. Alshawki, M.B.; Ligeti, P.; Reich, C. Poster: ODABE: Outsourced Decentralized CP-ABE in Internet of Things. In Proceedings of the International Conference on Applied Cryptography and Network Security, Rome, Italy, 20–23 June 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 611–615. [Google Scholar] [CrossRef]
  18. Riepel, D.; Wee, H. FABEO: Fast Attribute-Based Encryption with Optimal Security. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS ’22), Los Angeles, CA, USA, 7–11 November 2022; ACM: New York, NY, USA, 2022; pp. 1195–1210. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.