Role-Based Access Control in Cybershield Cloud: Safeguarding Industry 4.0 Applications
Keywords:
Industry 4.0, Industrial Internet of Things (IIoT), Cloud Computing, Role-Based Access Control (RBAC), Homomorphic Encryption.Abstract
The advent of Industry 4.0 has revolutionized industrial operations through the integration of the Industrial Internet of Things (IIoT), enabling unprecedented levels of data collection, analysis, and automation. Central to these advancements is cloud computing, which offers scalable storage and processing capabilities essential for managing the vast and continuous data streams generated by IIoT devices. However, the security and privacy of this data remain paramount concerns, as the potential for data breaches and unauthorized access poses significant risks to industrial operations. This paper introduces CyberShield Cloud, a robust data storage and sharing system designed to secure Industry 4.0 applications through Role-Based Access Control (RBAC) and advanced encryption techniques. CyberShield Cloud employs a novel symmetric homomorphic encryption scheme that not only ensures data confidentiality but also supports analytics on encrypted time-series data without compromising security. The system facilitates fine-grained access control, allowing data owners to define specific access permissions based on user roles and temporal requirements. Comprehensive simulations demonstrate that CyberShield Cloud achieves a 17% reduction in query time and a 9% improvement in throughput compared to existing benchmark schemes. These results underscore the system’s efficacy in enhancing data security while maintaining high performance in IIoT environments. CyberShield Cloud represents a significant step forward in safeguarding industrial data, ensuring both security and operational efficiency in the era of smart manufacturing.
Downloads
References
A. Babar, M. A. AlZain, A. Alghamdi, and M. I. Zawoad, “A survey of security issues in industrial internet of things,” IEEE Internet Things J., vol. 2, no. 4, pp. 388–400, Aug. 2015.
S. Bandyopadhyay and D. Sen, “Internet of Things: Applications and challenges in technology and standardization,” Wireless Personal Communications, vol. 81, pp. 1901–1920, 2014.
P. A. Heimes and M. A. AlZain, “Cloud computing and security: A survey,” IEEE International Conference on Cloud Computing Technology and Science, pp. 1–8, 2013.
M. Conti, S. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Future Generation Computer Systems, vol. 78, pp. 544–546, Jan. 2017.
Sivananda Reddy Julakanti. (2021). Implementing Spark Data Frames for Advanced Data Analysis. International Journal of Intelligent Systems and Applications in Engineering, 9(1), 62–66. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7086
Julakanti, S. R., Sattiraju, N. S. K., & Julakanti, R. (2022). Transforming Data in SAP HANA: From Raw Data to Actionable Insights. NeuroQuantology, 19(11), 854-861. Retrieved from https://www.neuroquantology.com/open-access/Transforming+Data+in+SAP+HANA%253A+From+Raw+Data+to+Actionable+Insights_14495/
Julakanti, S. R., Sattiraju, N. S. K., & Julakanti, R. (2021). Creating high-performance data workflows with Hadoop components. NeuroQuantology, 19(11), 1097–1105. Retrieved from https://www.neuroquantology.com/open-access/Creating+High-Performance+Data+Workflows+with+Hadoop+Components_14496/
Sivananda Reddy Julakanti, Naga Satya Kiranmayee Sattiraju, & Rajeswari Julakanti. (2023). Data Protection through Governance Frameworks. Journal of Computational Analysis and Applications (JoCAAA), 31(1), 158–162. Retrieved from https://www.eudoxuspress.com/index.php/pub/article/view/1525
Sivananda Reddy Julakanti. (2021). Optimizing Storage Formats for Data Warehousing Efficiency. International Journal on Recent and Innovation Trends in Computing and Communication, 9(5), 71–78. Retrieved from https://ijritcc.org/index.php/ijritcc/article/view/11291
Y. K. Dwivedi, H. A. Ismagilova, A. Weerakkody, M. S. Weerakkody, and N. Irani, “Understanding the social media landscape: A holistic literature review of the different types of data and the various analytical methods,” Information Systems Frontiers, vol. 19, no. 3, pp. 535–556, 2017.
H. Huang, Y. Li, Z. Liu, and Y. Wang, “A review on encryption techniques for the internet of things,” IEEE Access, vol. 6, pp. 68609–68620, 2018.
M. M. Hassan, A. U. Khan, M. Zaheer, and R. V. Aquino, “Enabling secure, trustworthy and private access to data in cloud computing environments,” Proceedings of the IEEE, vol. 105, no. 1, pp. 113–127, Jan. 2017.
Sivananda Reddy Julakanti, Naga Satya Kiranmayee Sattiraju, Rajeswari Julakanti. (2022). Security by Design: Integrating Governance into Data Systems. International Journal of Communication Networks and Information Security (IJCNIS), 14(2), 393–399. Retrieved from https://www.ijcnis.org/index.php/ijcnis/article/view/7756
Julakanti, S. R., Sattiraju, N. S. K., & Julakanti, R. (2022). Governance Meets Security Safeguarding Data and Systems. NeuroQuantology, 20(7), 4847-4855. Retrieved from https://www.neuroquantology.com/open-access/Governance+Meets+Security+Safeguarding+Data+and+Systems_14526/
Julakanti, S. R., Sattiraju, N. S. K., & Julakanti, R. (2022). Incremental Load and Dedup Techniques in Hadoop Data Warehouses. NeuroQuantology, 20(5), 5626-5636. Retrieved from https://www.neuroquantology.com/open-access/Incremental+Load+and+Dedup+Techniques+in+Hadoop+Data+Warehouses_14518/
Julakanti, S. R., Sattiraju, N. S. K., & Julakanti, R. (2022). Securing the Cloud: Strategies for Data and Application Protection. NeuroQuantology, 20(9), 8062–8073. Retrieved from https://www.neuroquantology.com/open-access/Securing+the+Cloud%253A+Strategies+for+Data+and+Application+Protection_14532/
Julakanti, S. R., Sattiraju, N. S. K., & Julakanti, R. (2022). Multi-Cloud Security: Strategies for Managing Hybrid Environments. NeuroQuantology, 20(11), 10063–10074. Retrieved from https://www.neuroquantology.com/open-access/Multi-Cloud+Security%253A+Strategies+for+Managing+Hybrid+Environments_14543/
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, “Role-based access control models,” IEEE Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996.
Reddy Julakanti, S. (2023). AI Techniques to Counter Information Security Attacks. International Journal on Recent and Innovation Trends in Computing and Communication, 11(5), 518–527. https://doi.org/10.17762/ijritcc.v11i5.11368
C. Paar and J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, 2nd ed., Springer, 2010.
J. C. Chen, Y. Zhao, and T. Li, “A review on secure data sharing in cloud computing,” IEEE Access, vol. 7, pp. 130888–130904, 2019.
T. Shafiq, W. Lin, and M. S. Hossain, “A survey on security in wireless sensor networks,” Computer Networks, vol. 58, no. 10, pp. 2263–2282, 2014.
M. Abadi and B. C. Pierce, “A security framework for cloud computing,” Proceedings of the IEEE International Conference on Cloud Computing, pp. 535–542, 2010.
L. A. Grubbs, “Hierarchical key management schemes for secure multicast in mobile ad hoc networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 4, pp. 455–468, Apr. 2004.
K. Ren, C. Wang, and K. Ren, “Security and privacy in the Internet of Things: Current status and open issues,” IEEE Internet of Things Journal, vol. 1, no. 2, pp. 87–98, Jun. 2014.
C. Papadimitratos, J. Du, J. Liu, D. Zhao, and Y. Lee, “Comet: A system for internet-scale resource discovery and autonomous network configuration,” Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, pp. 125–140, 2012.
B. Zhou, X. Chen, and L. Wang, “Secure and efficient data storage and sharing in cloud computing,” IEEE Transactions on Cloud Computing, vol. 1, no. 1, pp. 12–24, 2013.
A. Aloul, “Internet of things for smart cities: Issues, challenges, and opportunities,” Proceedings of the International Conference on Information Systems Security and Privacy, pp. 3–9, 2015.
P. R. Kumar, S. Prabhakar, and S. Panwar, “IoT and security issues: A review,” 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 1170–1174, 2016.
M. S. Hossain, M. Muhammad, G. Inayat, and A. Ghoneim, “Security for the internet of things: Perspectives, challenges and directions,” Future Generation Computer Systems, vol. 78, pp. 68–80, Jan. 2018.
C. N. Martinho, L. Machado, M. Garrido, and M. J. Ferreira, “Data protection in the internet of things: A survey,” Computers & Security, vol. 87, pp. 101596, 2019.
S. H. Yousuf, M. T. Khan, K. Rahman, M. M. Hassan, and M. Atiquzzaman, “A survey of big data and IoT-based models for smart agriculture,” IEEE Access, vol. 7, pp. 38384–38413, 2019.
F. R. Yu, H. Liang, L. R. Xing, and J. He, “Blockchain-based secure and efficient data sharing for IIoT,” IEEE Communications Magazine, vol. 58, no. 3, pp. 60–66, 2020.
A. A. Hassan, N. U. Khan, M. F. Khan, and S. A. Madani, “Big data security: A survey,” IEEE Access, vol. 8, pp. 74566–74582, 2020.
J. R. Douceur, “An overview of security issues in wireless sensor networks,” Proceedings of the 1st International Workshop on Information Security and Privacy in Ad Hoc Networks, pp. 1–7, 2002.
M. S. Hossain and K. Muhammad, “Cloud-assisted IoT mobile sensing framework for smart cities,” Future Generation Computer Systems, vol. 78, pp. 544–546, Jan. 2018.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.