An effective privacy-preserving blockchain-assisted security protocol for cloud-based digital twin environment

Thakur, Garima, Kumar, Pankaj, Jangirala, Srinivas, Das, Ashok Kumar and Park, Youngho (2023) An effective privacy-preserving blockchain-assisted security protocol for cloud-based digital twin environment. IEEE Access. ISSN 2169-3536 (In Press)

[thumbnail of An_Effective_Privacy-Preserving_Blockchain-Assiste.pdf] Text
An_Effective_Privacy-Preserving_Blockchain-Assiste.pdf - Published Version

Download (3MB)

Abstract

Recently, the Digital Twin (DT) technology has procured a lot of attention because of its applicability in the manufacturing and space industries. The DT environment involves the formation of a clone of the tangible object to perform simulations in the virtual space. The combination of conceptual development, predictive maintenance, real-time monitoring, and simulation characteristics of DT has increased the utilization of DT in different scenarios, such as medical environments, healthcare, manufacturing industries, aerospace, etc. However, these utilizations have also brought serious security pitfalls in DT deployment. Towards this, several authentication protocols with different security and privacy features for DT environments have been proposed. In this article, we first review a recently proposed two-factor authentication protocol for DT environments that utilizes the blockchain technology. However, the analyzed scheme is unable to offer the desirable security and cannot withstand various security attacks like offline password-guessing attack, smart card stolen attack, anonymity property, and known session-specific temporary information attack. We also demonstrate that an attacker can impersonate the analyzed protocol’s legal user, owner, and cloud server. To mitigate these security loopholes, we devise an effective three-factor privacy-preserving authentication scheme for DT environments. The proposed work is demonstrated to be secure by performing the informal security analysis, the formal security analysis using the widely recognized Burrows-Abadi-Needham (BAN) logic, and the Real-or-Random (ROR) model. A detailed comparative study with the existing competing schemes including the analyzed scheme demonstrates that the devised framework furnishes better security features while also having lower computation costs and comparable communication costs than the existing schemes.

Item Type: Article
Keywords: Digital Twin | Blockchain | Authentication | Key Agreement | Security
Subjects: Physical, Life and Health Sciences > Engineering and Technology
JGU School/Centre: Jindal Global Business School
Depositing User: Amees Mohammad
Date Deposited: 28 Feb 2023 05:58
Last Modified: 28 Feb 2023 05:58
Official URL: https://doi.org/10.1109/ACCESS.2023.3249116
URI: https://pure.jgu.edu.in/id/eprint/5634

Downloads

Downloads per month over past year

Actions (login required)

View Item
View Item