{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:11:11Z","timestamp":1770844271208,"version":"3.50.1"},"reference-count":37,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>In the current context of the wide application of Internet of Things (IoT) technology, cross-domain data sharing based on industrial IoT (IIoT) has become the key to maximizing data value, but it also faces many challenges. In response to the security and privacy issues in cross-domain data sharing, we proposed a cross-domain secure data sharing scheme (CDAS) based on multiple blockchains. The scheme first designs the cross-domain blockchain in layers and assists the device in completing the data sharing on the chain through the blockchain layer close to the edge device. In addition, we combine smart contract design to implement attribute-based access control (ABAC) and anonymous identity registration. This method simplifies device resource access by minimizing middleware confirmation, double-checking device access rights, and preventing redundant requests caused by illegal access attempts. Finally, in terms of data privacy and security, IPFS is used to store confidential data. In terms of ensuring data sharing security, searchable encryption (SE) is applied to the overall data sharing and improved. Users can find the required data by searching the ciphertext links in the blockchain system to ensure the secure transmission of private data. Compared with the traditional ABAC scheme, we have added modules for data privacy protection and anonymous authentication to further protect user data privacy. At the same time, compared with the access control scheme based on attribute encryption, our scheme has certain advantages in the time complexity calculation of key algorithms such as policy matching and encryption algorithm. At the same time, with the assistance of the edge blockchain layer, it can reduce the burden of limited computing resources of the device. This scheme can solve the security and efficiency problems of cross-domain data sharing in the industrial Internet of Things through security and experimental analysis.<\/jats:p>","DOI":"10.3390\/info16050394","type":"journal-article","created":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T09:13:38Z","timestamp":1747041218000},"page":"394","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain"],"prefix":"10.3390","volume":"16","author":[{"given":"Jiahui","family":"Jiang","sequence":"first","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou 510632, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1205-5899","authenticated-orcid":false,"given":"Tingrui","family":"Pei","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou 510632, China"}]},{"given":"Jiahao","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou 510632, China"}]},{"given":"Zhiwen","family":"Hou","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou 510632, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,5,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.neucom.2021.01.147","article-title":"EdgeShare: A blockchain-based edge data-sharing framework for Industrial Internet of Things","volume":"485","author":"Yang","year":"2022","journal-title":"Neurocomputing"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1007\/s11276-014-0731-0","article-title":"Future internet of things: Open issues and challenges","volume":"20","author":"Tsai","year":"2014","journal-title":"Wirel. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1109\/TCSVT.2020.2981117","article-title":"Age estimation using aging\/rejuvenation features with device-edge synergy","volume":"31","author":"Duan","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","article-title":"Blockchain-assisted secure device authentication for cross-domain industrial IoT","volume":"38","author":"Shen","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"101898","DOI":"10.1016\/j.cose.2020.101898","article-title":"Towards multiple-mix-attack detection via consensus-based trust management in IoT networks","volume":"96","author":"Ma","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"102710","DOI":"10.1016\/j.jnca.2020.102710","article-title":"A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things","volume":"167","author":"Chi","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MCOM.001.1900094","article-title":"An intelligent robust networking mechanism for the Internet of Things","volume":"57","author":"Chen","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.jnca.2017.02.001","article-title":"Security and privacy challenges in mobile cloud computing: Survey and way ahead","volume":"84","author":"Mollah","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"103371","DOI":"10.1016\/j.jnca.2022.103371","article-title":"Blockchain for IoT access control: Recent trends and future research directions","volume":"203","author":"Pal","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bouras, M.A., Lu, Q., Dhelim, S., and Ning, H. (2021). A lightweight blockchain-based IoT identity management approach. Future Internet, 13.","DOI":"10.3390\/fi13020024"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"978","DOI":"10.1109\/TSC.2017.2762296","article-title":"Searchable encryption for healthcare clouds: A survey","volume":"11","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Sun, W., Yu, S., Lou, W., Hou, Y.T., and Li, H. (May, January 27). Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. Proceedings of the IEEE INFOCOM 2014\u2014IEEE Conference on Computer Communications, Toronto, ON, Canada.","DOI":"10.1109\/INFOCOM.2014.6847943"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2754","DOI":"10.1109\/JIOT.2022.3213829","article-title":"An efficient revocable and searchable MA-ABE scheme with blockchain assistance for C-IoT","volume":"10","author":"Yu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1771","DOI":"10.1109\/TIFS.2022.3172627","article-title":"Subversion-resistant and consistent attribute-based keyword search for secure cloud storage","volume":"17","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"102078","DOI":"10.1016\/j.cose.2020.102078","article-title":"A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities","volume":"100","author":"Dabbagh","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"36868","DOI":"10.1109\/ACCESS.2021.3059863","article-title":"Blockchain-based IoT access control system: Towards security, lightweight, and cross-domain","volume":"9","author":"Sun","year":"2021","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/COMST.2022.3141490","article-title":"A comprehensive survey on blockchain in industrial internet of things: Motivations, research progresses, and future challenges","volume":"24","author":"Huo","year":"2022","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Yu, X., Xie, Y., Xu, Q., Xu, Z., and Xiong, R. (2023, January 24\u201326). Secure Data Sharing for Cross-domain Industrial IoT Based on Consortium Blockchain. Proceedings of the 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Rio de Janeiro, Brazil.","DOI":"10.1109\/CSCWD57460.2023.10152584"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","article-title":"IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices","volume":"6","author":"Meneghello","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.jpdc.2021.05.007","article-title":"Cross-domain secure data sharing using blockchain for industrial IoT","volume":"156","author":"Singh","year":"2021","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12083-022-01376-7","article-title":"Smart contract and ipfs-based trustworthy secure data storage and device authentication scheme in fog computing environment","volume":"16","author":"Dwivedi","year":"2023","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"26778","DOI":"10.1109\/JIOT.2023.3329577","article-title":"Blockchain-Assisted Cross-Domain Data Sharing in Industrial IoT","volume":"11","author":"Zeng","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2961","DOI":"10.1007\/s12083-021-01150-1","article-title":"User authentication using Blockchain based smart contract in role-based access control","volume":"14","author":"Kamboj","year":"2021","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3530","DOI":"10.1109\/TII.2021.3114621","article-title":"A blockchain-based auditable access control system for private data in service-centric IoT environments","volume":"18","author":"Han","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wu, A., Zheng, D., Zhang, Y., and Yang, M. (2018). Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing. Sensors, 18.","DOI":"10.3390\/s18072158"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"7851","DOI":"10.1109\/JIOT.2020.2993231","article-title":"BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1109\/JIOT.2023.3290975","article-title":"A blockchain-based anonymous attribute-based searchable encryption scheme for data sharing","volume":"11","author":"Zhang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"36452","DOI":"10.1109\/ACCESS.2023.3257027","article-title":"DABAC: Smart contract-based spatio-temporal domain access control for the Internet of Things","volume":"11","author":"Guo","year":"2023","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"100067","DOI":"10.1016\/j.bcra.2022.100067","article-title":"A survey on blockchain technology and its security","volume":"3","author":"Guo","year":"2022","journal-title":"Blockchain Res. Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"100027","DOI":"10.1016\/j.bcra.2021.100027","article-title":"Blockchain technology applications for Industry 4.0: A literature-based review","volume":"2","author":"Javaid","year":"2021","journal-title":"Blockchain Res. Appl."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2901","DOI":"10.1007\/s12083-021-01127-0","article-title":"Blockchain smart contracts: Applications, challenges, and future trends","volume":"14","author":"Khan","year":"2021","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Zhang, F., Safavi-Naini, R., and Susilo, W. (2004, January 1\u20134). An efficient signature scheme from bilinear pairings and its applications. Proceedings of the Public Key Cryptography\u2013PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore.","DOI":"10.1007\/978-3-540-24632-9_20"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1109\/TR.2019.2948713","article-title":"Cryptographic attribute-based access control (ABAC) for secure decision making of dynamic policy with multiauthority attribute tokens","volume":"68","author":"Zhu","year":"2019","journal-title":"IEEE Trans. Reliab."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.future.2022.12.037","article-title":"A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control","volume":"142","author":"Li","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.jpdc.2022.03.009","article-title":"Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy","volume":"164","author":"Jayabalan","year":"2022","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Kang, P., Yang, W., and Zheng, J. (2022). Blockchain private file storage-sharing method based on IPFS. Sensors, 22.","DOI":"10.3390\/s22145100"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2850","DOI":"10.1007\/s12083-023-01570-1","article-title":"FIBPRO: Peer-to-peer data management and sharing cloud storage system based on blockchain","volume":"16","author":"Han","year":"2023","journal-title":"Peer-to-Peer Netw. Appl."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/5\/394\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:31:15Z","timestamp":1760031075000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/5\/394"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,12]]},"references-count":37,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["info16050394"],"URL":"https:\/\/doi.org\/10.3390\/info16050394","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,12]]}}}