{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T13:31:03Z","timestamp":1707226263460},"reference-count":48,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T00:00:00Z","timestamp":1699488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Blockchain"],"abstract":"Provenance blockchain is an evolving concept for protection of production, logistics, and supply chain networks from rogue Industrial Internet of Things (IIoT) devices. Such rogue IIoT devices are a recognized threat in the cloud manufacturing networks. In extreme cases, they can be used to cause industrial accidents. A brief version of provenance is about end-to-end tracking and tracing of data and the nodes involved in creating, modifying, transmitting, storing, and deleting it at specific times and locations. It provides an end-to-end verifiable and controlled computation for ensuring trustworthiness, quality, reliability, and validity of data. Provenance has existed in computing using logging software systems. This research is focused on threats to food supply chains between two countries. A scenario for protecting food supply chain from India to UAE has been modeled. This research recognized the threat of harmful food items getting mixed with flow of genuine products in a supply chain. The IIoT devices used to control the flow can be authenticated using the evolving provenance blockchain technology. With the help of recent design recommendations in the literature, a model design has been created and simulated in this research. Observations from the simulation revealed that TCP congestions and unpredictable turnaround time for assigning cryptographic keys to IIoT device sessions may have to be explored in future. A collaborative design between the two nations has been proposed. All IIoT devices not supporting cryptography will be eliminated from the cloud manufacturing and supply chain networks. Currently, this design may be used for one time registration only. Future studies may provide improved versions in which, repeated authentication and keys replacements may be implemented.<\/jats:p>","DOI":"10.3389\/fbloc.2023.1273314","type":"journal-article","created":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T18:00:08Z","timestamp":1699639208000},"update-policy":"http:\/\/dx.doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Provenance blockchain for ensuring IT security in cloud manufacturing"],"prefix":"10.3389","volume":"6","author":[{"given":"Mifta Ahmed","family":"Umer","sequence":"first","affiliation":[]},{"given":"Luis Borges","family":"Gouveia","sequence":"additional","affiliation":[]},{"given":"Elefelious Getachew","family":"Belay","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2023,11,9]]},"reference":[{"key":"B1","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-3-030-32530-5_2","article-title":"The technology, protocols, and new innovations in industrial Internet of Things (IIoT)","volume-title":"Internet of Things for industry 4.0: design, challenges and solutions","author":"Aileni","year":"2020"},{"key":"B2","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/j.procs.2022.12.247","article-title":"A review of supply chain 4IR management strategy for appraising the manufacturing industry's potentials and shortfalls in the 21st century","volume":"217","author":"Ajayi","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"B3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-57870-5_4","article-title":"Maturity and readiness model for industry 4.0 strategy","volume-title":"Industry 4.0 - managing the digital transformation","author":"Akdil","year":"2018"},{"key":"B4","doi-asserted-by":"crossref","DOI":"10.1109\/SmartWorld.2018.00175","article-title":"Secure data provenance in cloud-centric Internet of Things via blockchain smart contracts","author":"Ali","year":"2018"},{"key":"B5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/eng2.12578","article-title":"The role of intelligent manufacturing systems in the implementation of Industry 4.0 by small and medium enterprises in developing countries","volume":"5","author":"Atieh","year":"2023","journal-title":"Eng. Rep."},{"key":"B6","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1007\/s10845-020-01735-2","article-title":"A blockchain technology based trust system for cloud manufacturing","volume":"33","author":"Barenji","year":"2022","journal-title":"J. Intelligent Manuf."},{"key":"B7","doi-asserted-by":"publisher","first-page":"102471","DOI":"10.1016\/j.jisa.2020.102471","article-title":"Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies","volume":"52","author":"Barrere","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"B8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-57870-5_16","article-title":"Overview of cyber security in the industry 4.0 era","volume-title":"Industry 4.0 - managing the digital transformation","author":"Eruvural","year":"2018"},{"key":"B9","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1080\/09537287.2020.1810765","article-title":"The impact of Industry 4.0 on the reconciliation of dynamic capabilities: evidence from the European manufacturing industries","volume":"33","author":"Felsberger","year":"2022","journal-title":"Prod. Plan. Control"},{"key":"B10","doi-asserted-by":"publisher","first-page":"3115","DOI":"10.3390\/math11143115","article-title":"Advanced persistent threats and their defense methods in industrial Internet of Things: a survey","volume":"11","author":"Gan","year":"2023","journal-title":"Mathematics"},{"key":"B11","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1007\/s00170-019-03398-7","article-title":"Cloud manufacturing: challenges, recent advances, open research issues, and future trends","volume":"102","author":"Ghomi","year":"2019","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"B12","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-33-4320-7_10","article-title":"Security in manufacturing systems in the age of industry 4.0: pitfalls and possibilities","volume-title":"Advances in industrial and production engineering. LNME: 105-113","author":"Gupta","year":"2021"},{"key":"B13","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1007\/s00170-021-08436-x","article-title":"From IoT-based cloud manufacturing approach to intelligent additive manufacturing: industrial Internet of Things\u2014an overview","volume":"119","author":"Haghnegahdar","year":"2022","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"B14","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1016\/j.promfg.2021.06.060","article-title":"Hybrid blockchain architecture for cloud manufacturing-as-a-service (CMaaS) platforms with improved data storage and transaction efficiency","volume":"53","author":"Hasan","year":"2021","journal-title":"Procedia Manuf."},{"key":"B15","doi-asserted-by":"crossref","DOI":"10.1109\/ISSC49989.2020.9180208","article-title":"Cyber-security considerations for domestic-level automated demand-response systems utilizing public-key infrastructure and ISO\/IEC 20922","author":"Hastings","year":"2020"},{"key":"B16","doi-asserted-by":"publisher","first-page":"102050","DOI":"10.1016\/j.rcim.2020.102050","article-title":"Cloud manufacturing ecosystem analysis and design","volume":"67","author":"Helo","year":"2021","journal-title":"Cloud Manuf. Ecosyst. analysis Des."},{"key":"B17","doi-asserted-by":"publisher","first-page":"3368","DOI":"10.1080\/03772063.2021.1912651","article-title":"MQTT vulnerabilities, attack vectors and solutions in the Internet of Things (IoT)","volume":"69","author":"Hintaw","year":"2023","journal-title":"IETE J. Res."},{"key":"B18","doi-asserted-by":"publisher","first-page":"463","DOI":"10.12720\/jcm.14.6.463-469","article-title":"A brief review on MQTT\u2019s security issues within the Internet of Things (IoT)","volume":"14","author":"Hintaw","year":"2019","journal-title":"J. Commun."},{"key":"B49","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1007\/s11280-019-00746-1","article-title":"A survey on data provenance in IoT","volume":"23","author":"Hu","year":"2020","journal-title":"World Wide Web"},{"key":"B19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3282278.3282281","article-title":"Blockchain based Data provenance and Integrity for Secure IoT Environments","volume-title":"BlockSys\u2019","author":"Javaid","year":"2018"},{"key":"B20","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1007\/s11276-022-02924-y","article-title":"A blockchain and smart contract-based data provenance collection and storing in cloud environment","volume":"28","author":"Jyoti","year":"2022","journal-title":"Wirel. Netw."},{"key":"B21","first-page":"225","article-title":"Prov-Trust: Towards a Trustworthy SGX-based Data provenance System","author":"Kaaniche","year":"2020"},{"key":"B22","doi-asserted-by":"publisher","first-page":"122204","DOI":"10.1016\/j.techfore.2022.122204","article-title":"Industry 4.0: a tertiary literature review","volume":"186","author":"Lemstra","year":"2023","journal-title":"Technol. Forecast. Soc. Change"},{"key":"B23","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1108\/imds-12-2020-0726","article-title":"Cloud manufacturing architecture: a critical analysis of its development, characteristics and future agenda to support its adoption","volume":"121","author":"Lim","year":"2021","journal-title":"Industrial Manag. Data Syst."},{"key":"B24","doi-asserted-by":"publisher","first-page":"4069","DOI":"10.1080\/00207543.2021.1969462","article-title":"Digitalisation and servitisation of machine tools in the era of Industry 4.0: a review","volume":"61","author":"Liu","year":"2023","journal-title":"Int. J. Prod. Res."},{"key":"B25","first-page":"157","article-title":"PrivChain: provenance and privacy preservation in blockchain enabled supply chains","author":"Malik","year":"2022"},{"key":"B26","volume-title":"Network routing: algorithms, protocols, and architectures","author":"Medhi","year":"2018"},{"key":"B27","doi-asserted-by":"publisher","first-page":"201071","DOI":"10.1109\/access.2020.3035849","article-title":"The use of MQTT in M2M and IoT systems: a survey","volume":"8","author":"Mishra","year":"2020","journal-title":"IEEE Access"},{"key":"B28","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-33-4320-7_16","article-title":"Comprehensive study of artificial intelligence tools in supply chain","volume-title":"Advances in industrial and production engineering. LNME: 175-188","author":"Ojha","year":"2021"},{"key":"B29","doi-asserted-by":"crossref","DOI":"10.1109\/IT54280.2022.9743541","article-title":"Blockchain-based transparency and data provenance in the wine value chain","author":"Popovic","year":"2022"},{"key":"B30","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/3176258.3176333","article-title":"Smartprovenance: a distributed, blockchain based data provenance system","volume-title":"CODASPY'18","author":"Ramachandran","year":"2018"},{"key":"B31","doi-asserted-by":"publisher","first-page":"975","DOI":"10.14778\/3329772.3329775","article-title":"Fine-grained, secure and efficient data provenance on blockchain systems","volume":"12","author":"Ruan","year":"2019","journal-title":"Proc. VLDB Endow."},{"key":"B32","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-57870-5_1","article-title":"A conceptual framework for industry 4.0","volume-title":"Industry 4.0: managing the digital transformation","author":"Salkin","year":"2018"},{"key":"B33","article-title":"Security framework for the Internet of Things leveraging network telescopes and machine learning","author":"Shaikh","year":"2019"},{"key":"B34","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.gltp.2022.04.015","article-title":"MQTT based secure Transport layer communication for mutual authentication in IoT network","volume":"3","author":"Shilpa","year":"2022","journal-title":"Glob. Transitions Proc."},{"key":"B35","doi-asserted-by":"publisher","first-page":"3471","DOI":"10.1016\/j.matpr.2021.07.273","article-title":"Inclusion of IoT, ML, and blockchain technologies in next generation industry 4.0 environment","volume":"80","author":"Shrivastava","year":"2023","journal-title":"Mater. Today Proc."},{"key":"B36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00779-020-01417-z","article-title":"A secure and extensible blockchain-based data provenance framework for the Internet of Things","author":"Sigwart","year":"2020","journal-title":"Personal Ubiquitous Comput."},{"key":"B37","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.procir.2019.02.056","article-title":"Intelligent cloud manufacturing platform for efficient resource sharing in smart manufacturing networks","volume":"79","author":"Simeone","year":"2019","journal-title":"Procedia CIRP"},{"key":"B47","first-page":"463","article-title":"BlockTrack-L: A Lightweight Blockchain-based Provenance Message Tracking in IoT","volume":"11","author":"Siddiqui","year":"2020","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"B38","unstructured":"134 cybersecurity statistics and trends for 2021 varonis\n SobersR.\n 2021"},{"key":"B39","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.3390\/electronics11091489","article-title":"BSTProv: blockchain-based secure and trustworthy data provenance sharing","volume":"11","author":"Sun","year":"2022","journal-title":"Electronics"},{"key":"B48","first-page":"83","article-title":"IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things","volume":"19","author":"Tang","year":"2019","journal-title":"SACMAT"},{"key":"B40","doi-asserted-by":"publisher","first-page":"120783","DOI":"10.1016\/j.jclepro.2020.120783","article-title":"Sustainability accounting and reporting in the industry 4.0","volume":"258","author":"Tiwari","year":"2020","journal-title":"J. Clean. Prod."},{"key":"B41","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-981-33-4320-7_27","article-title":"Role of industry 4.0 technologies in sustainability accounting and reporting-research opportunities in India and other emerging economies","volume-title":"Advances in industrial and production engineering LNME","author":"Tiwari","year":"2021"},{"key":"B42","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MIE.2017.2649104","article-title":"The future of industrial communication: automation networks in the era of the Internet of Things and industry 4.0","volume":"11","author":"Wollschlaeger","year":"2017","journal-title":"IEEE Ind. Electron. Mag."},{"key":"B45","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.dcan.2022.09.008","article-title":"An ensemble deep learning model for cyber threat hunting in industrial internet of things","volume":"9","author":"Yazdinejad","year":"","journal-title":"Digit. Commun. Netw."},{"key":"B46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dcan.2022.09.010","article-title":"Accurate threat hunting in industrial internet of things edge devices","author":"Yazdinejad","year":"","journal-title":"Digit. Commun. Netw. (In Press)"},{"key":"B43","doi-asserted-by":"publisher","first-page":"8999","DOI":"10.1109\/tii.2022.3178410","article-title":"Distributed real-time scheduling in cloud manufacturing by deep reinforcement learning","volume":"18","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Industrial Inf."}],"container-title":["Frontiers in Blockchain"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fbloc.2023.1273314\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T18:00:17Z","timestamp":1699639217000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fbloc.2023.1273314\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,9]]},"references-count":48,"alternative-id":["10.3389\/fbloc.2023.1273314"],"URL":"https:\/\/doi.org\/10.3389\/fbloc.2023.1273314","relation":{},"ISSN":["2624-7852"],"issn-type":[{"value":"2624-7852","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,9]]}}}