A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Malicious assaults and information leakage have grown in importance in practically every area of information and communication technology (ICT) in recent years. Enterprise ledger organization, preservation, security, and protection are all greatly aided by information security (IS). To maintain thei...
Saved in:
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10384336/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832583272161345536 |
---|---|
author | Zaffar Ahmed Shaikh Fahima Hajjej Yeter Demir Uslu Serhat Yuksel Hasan Dincer Roobaea Alroobaea Abdullah M. Baqasah Uma Chinta |
author_facet | Zaffar Ahmed Shaikh Fahima Hajjej Yeter Demir Uslu Serhat Yuksel Hasan Dincer Roobaea Alroobaea Abdullah M. Baqasah Uma Chinta |
author_sort | Zaffar Ahmed Shaikh |
collection | DOAJ |
description | Malicious assaults and information leakage have grown in importance in practically every area of information and communication technology (ICT) in recent years. Enterprise ledger organization, preservation, security, and protection are all greatly aided by information security (IS). To maintain their positions in the market, industries must safeguard their data and other vital assets. The main goals of this paper’s systematic review, which covers the entire process of privacy protection and security, are to introduce cryptographic IS for Industry 5.0 (the Fifth Industrial Revolution) as a comprehensive solution that provides regulatory compliance and IS policies in addition to the industrial goals. The review covers the four main areas: 1) recognizing the need for frameworks to be developed for a secure Industry 5.0 lifecycle; 2) emphasizing security guidelines, procedures, and countermeasures for Industry 5.0; 3) applying control, access, and availability in real-time; and 4) proposing a futuristic architecture for industrial information security. Furthermore, the analysis of previously published state-of-the-art techniques is presented in this paper. These techniques survive with various limitations and challenges, including intercommunication exchange, fine-grained control access, and interconnectivity-related issues, which affect the adoption of an IS in industrial programs. At the end of this systematic review, we investigated a few open research problems and mentioned those that are involved in the design of cryptographic re-encryption enabled IS for future Industry 5.0 developments. |
format | Article |
id | doaj-art-fd99883dcaf14aefbaa3ced8883b5f06 |
institution | Kabale University |
issn | 2169-3536 |
language | English |
publishDate | 2024-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj-art-fd99883dcaf14aefbaa3ced8883b5f062025-01-29T00:00:40ZengIEEEIEEE Access2169-35362024-01-01127156716910.1109/ACCESS.2024.335148510384336A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic ReviewZaffar Ahmed Shaikh0https://orcid.org/0000-0003-0323-2061Fahima Hajjej1https://orcid.org/0000-0003-1709-5790Yeter Demir Uslu2Serhat Yuksel3https://orcid.org/0000-0002-9858-1266Hasan Dincer4https://orcid.org/0000-0002-8072-031XRoobaea Alroobaea5https://orcid.org/0000-0001-8199-5852Abdullah M. Baqasah6https://orcid.org/0000-0002-2337-4326Uma Chinta7https://orcid.org/0000-0002-1191-5594Department of Computer Science and Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi, PakistanDepartment of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi~ArabiaSchool of Business, Istanbul Medipol University, Istanbul, TurkeySchool of Business, Istanbul Medipol University, Istanbul, TurkeySchool of Business, Istanbul Medipol University, Istanbul, TurkeyDepartment of Computer Science, College of Computers and Information Technology, Taif University, Taif, Saudi~ArabiaDepartment of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi~ArabiaDepartment of Computer Science, College of Engineering and Applied Sciences, University of Colorado, Colorado Springs, CO, USAMalicious assaults and information leakage have grown in importance in practically every area of information and communication technology (ICT) in recent years. Enterprise ledger organization, preservation, security, and protection are all greatly aided by information security (IS). To maintain their positions in the market, industries must safeguard their data and other vital assets. The main goals of this paper’s systematic review, which covers the entire process of privacy protection and security, are to introduce cryptographic IS for Industry 5.0 (the Fifth Industrial Revolution) as a comprehensive solution that provides regulatory compliance and IS policies in addition to the industrial goals. The review covers the four main areas: 1) recognizing the need for frameworks to be developed for a secure Industry 5.0 lifecycle; 2) emphasizing security guidelines, procedures, and countermeasures for Industry 5.0; 3) applying control, access, and availability in real-time; and 4) proposing a futuristic architecture for industrial information security. Furthermore, the analysis of previously published state-of-the-art techniques is presented in this paper. These techniques survive with various limitations and challenges, including intercommunication exchange, fine-grained control access, and interconnectivity-related issues, which affect the adoption of an IS in industrial programs. At the end of this systematic review, we investigated a few open research problems and mentioned those that are involved in the design of cryptographic re-encryption enabled IS for future Industry 5.0 developments.https://ieeexplore.ieee.org/document/10384336/Cryptographyinformation securityIndustrial Internet of Things (IIoT)Industry 50blockchainhash encryption |
spellingShingle | Zaffar Ahmed Shaikh Fahima Hajjej Yeter Demir Uslu Serhat Yuksel Hasan Dincer Roobaea Alroobaea Abdullah M. Baqasah Uma Chinta A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review IEEE Access Cryptography information security Industrial Internet of Things (IIoT) Industry 50 blockchain hash encryption |
title | A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review |
title_full | A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review |
title_fullStr | A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review |
title_full_unstemmed | A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review |
title_short | A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review |
title_sort | new trend in cryptographic information security for industry 5 0 a systematic review |
topic | Cryptography information security Industrial Internet of Things (IIoT) Industry 50 blockchain hash encryption |
url | https://ieeexplore.ieee.org/document/10384336/ |
work_keys_str_mv | AT zaffarahmedshaikh anewtrendincryptographicinformationsecurityforindustry50asystematicreview AT fahimahajjej anewtrendincryptographicinformationsecurityforindustry50asystematicreview AT yeterdemiruslu anewtrendincryptographicinformationsecurityforindustry50asystematicreview AT serhatyuksel anewtrendincryptographicinformationsecurityforindustry50asystematicreview AT hasandincer anewtrendincryptographicinformationsecurityforindustry50asystematicreview AT roobaeaalroobaea anewtrendincryptographicinformationsecurityforindustry50asystematicreview AT abdullahmbaqasah anewtrendincryptographicinformationsecurityforindustry50asystematicreview AT umachinta anewtrendincryptographicinformationsecurityforindustry50asystematicreview AT zaffarahmedshaikh newtrendincryptographicinformationsecurityforindustry50asystematicreview AT fahimahajjej newtrendincryptographicinformationsecurityforindustry50asystematicreview AT yeterdemiruslu newtrendincryptographicinformationsecurityforindustry50asystematicreview AT serhatyuksel newtrendincryptographicinformationsecurityforindustry50asystematicreview AT hasandincer newtrendincryptographicinformationsecurityforindustry50asystematicreview AT roobaeaalroobaea newtrendincryptographicinformationsecurityforindustry50asystematicreview AT abdullahmbaqasah newtrendincryptographicinformationsecurityforindustry50asystematicreview AT umachinta newtrendincryptographicinformationsecurityforindustry50asystematicreview |