2021
DOI: 10.1016/j.sysarc.2021.102104
|View full text |Cite
|
Sign up to set email alerts
|

A privacy-preserving resource trading scheme for Cloud Manufacturing with edge-PLCs in IIoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…Moreover, data security issues in intelligent manufacturing also pose potential hazards. [ 29 ] In intelligent manufacturing, a large amount of data is collected and stored, such as production data, worker data, and equipment data. If these data are attacked or leaked by hackers, it may cause serious impacts on a company business secrets and customer privacy, even leading to financial loss.…”
Section: Potential Hazards Of Artificial Intelligence In the Areas Of...mentioning
confidence: 99%
“…Moreover, data security issues in intelligent manufacturing also pose potential hazards. [ 29 ] In intelligent manufacturing, a large amount of data is collected and stored, such as production data, worker data, and equipment data. If these data are attacked or leaked by hackers, it may cause serious impacts on a company business secrets and customer privacy, even leading to financial loss.…”
Section: Potential Hazards Of Artificial Intelligence In the Areas Of...mentioning
confidence: 99%
“…Finally, the cloud server will match the searchable ciphertext with the query trapdoor one-by-one, and send the matching result to the data user. Since SE was proposed, it has been applied in many fields, such as online medical care [5,6], cloud manufacturing [7], etc.…”
Section: Introductionmentioning
confidence: 99%
“…In many instances of cloud storage applications, counting the frequency of keyword queries is important to improve the search experience of users. For example, in a cloud manufacturing system [7], an upstream supplying plant (the data owner) will encrypt some production data from its workshop and store the ciphertext on a cloud server. Subsequently, the service platform providing the ciphertext retrieval service can respond to the search request of the purchasing company (the data users), and provide the supply factory that meets their needs.…”
Section: Introductionmentioning
confidence: 99%
“…Then, this kind of data can be frequently uploaded to the cloud system by using the intermediate devices of servers/gateways that are located in the specified area. But, this type of communication system [10][11][12] is more susceptible to the security vulnerabilities, because the untrusted cloud may intend to access the large amount of private or confidential data. Hence, it is more essential to provide security to these systems for ensuring the privacy and confidentiality [13,14] of the industrial data.…”
Section: Introductionmentioning
confidence: 99%