Visible to the public Data traceability scheme of industrial control system based on digital watermark

TitleData traceability scheme of industrial control system based on digital watermark
Publication TypeConference Paper
Year of Publication2022
AuthorsSun, Jun, Li, Yang, Zhang, Ge, Dong, Liangyu, Yang, Zitao, Wang, Mufeng, Cai, Jiahe
Conference Name2022 7th IEEE International Conference on Data Science in Cyberspace (DSC)
KeywordsData security, Data traceability, digital watermarking, fourth industrial revolution, industrial control system, industrial control systems, Industrial Internet, Internet, process control, Production management, Production systems, pubcrawl, resilience, Resiliency, Scalability, security monitoring, Soft sensors, Watermarking
AbstractThe fourth industrial revolution has led to the rapid development of industrial control systems. While the large number of industrial system devices connected to the Internet provides convenience for production management, it also exposes industrial control systems to more attack surfaces. Under the influence of multiple attack surfaces, sensitive data leakage has a more serious and time-spanning negative impact on industrial production systems. How to quickly locate the source of information leakage plays a crucial role in reducing the loss from the attack, so there are new requirements for tracing sensitive data in industrial control information systems. In this paper, we propose a digital watermarking traceability scheme for sensitive data in industrial control systems to address the above problems. In this scheme, we enhance the granularity of traceability by classifying sensitive data types of industrial control systems into text, image and video data with differentiated processing, and achieve accurate positioning of data sources by combining technologies such as national secret asymmetric encryption and hash message authentication codes, and mitigate the impact of mainstream watermarking technologies such as obfuscation attacks and copy attacks on sensitive data. It also mitigates the attacks against the watermarking traceability such as obfuscation attacks and copy attacks. At the same time, this scheme designs a data flow watermark monitoring module on the post-node of the data source to monitor the unauthorized sensitive data access behavior caused by other attacks.
DOI10.1109/DSC55868.2022.00050
Citation Keysun_data_2022