A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review

Malicious assaults and information leakage have grown in importance in practically every area of information and communication technology (ICT) in recent years. Enterprise ledger organization, preservation, security, and protection are all greatly aided by information security (IS). To maintain thei...

Full description

Saved in:
Bibliographic Details
Main Authors: Zaffar Ahmed Shaikh, Fahima Hajjej, Yeter Demir Uslu, Serhat Yuksel, Hasan Dincer, Roobaea Alroobaea, Abdullah M. Baqasah, Uma Chinta
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10384336/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832583272161345536
author Zaffar Ahmed Shaikh
Fahima Hajjej
Yeter Demir Uslu
Serhat Yuksel
Hasan Dincer
Roobaea Alroobaea
Abdullah M. Baqasah
Uma Chinta
author_facet Zaffar Ahmed Shaikh
Fahima Hajjej
Yeter Demir Uslu
Serhat Yuksel
Hasan Dincer
Roobaea Alroobaea
Abdullah M. Baqasah
Uma Chinta
author_sort Zaffar Ahmed Shaikh
collection DOAJ
description Malicious assaults and information leakage have grown in importance in practically every area of information and communication technology (ICT) in recent years. Enterprise ledger organization, preservation, security, and protection are all greatly aided by information security (IS). To maintain their positions in the market, industries must safeguard their data and other vital assets. The main goals of this paper’s systematic review, which covers the entire process of privacy protection and security, are to introduce cryptographic IS for Industry 5.0 (the Fifth Industrial Revolution) as a comprehensive solution that provides regulatory compliance and IS policies in addition to the industrial goals. The review covers the four main areas: 1) recognizing the need for frameworks to be developed for a secure Industry 5.0 lifecycle; 2) emphasizing security guidelines, procedures, and countermeasures for Industry 5.0; 3) applying control, access, and availability in real-time; and 4) proposing a futuristic architecture for industrial information security. Furthermore, the analysis of previously published state-of-the-art techniques is presented in this paper. These techniques survive with various limitations and challenges, including intercommunication exchange, fine-grained control access, and interconnectivity-related issues, which affect the adoption of an IS in industrial programs. At the end of this systematic review, we investigated a few open research problems and mentioned those that are involved in the design of cryptographic re-encryption enabled IS for future Industry 5.0 developments.
format Article
id doaj-art-fd99883dcaf14aefbaa3ced8883b5f06
institution Kabale University
issn 2169-3536
language English
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-fd99883dcaf14aefbaa3ced8883b5f062025-01-29T00:00:40ZengIEEEIEEE Access2169-35362024-01-01127156716910.1109/ACCESS.2024.335148510384336A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic ReviewZaffar Ahmed Shaikh0https://orcid.org/0000-0003-0323-2061Fahima Hajjej1https://orcid.org/0000-0003-1709-5790Yeter Demir Uslu2Serhat Yuksel3https://orcid.org/0000-0002-9858-1266Hasan Dincer4https://orcid.org/0000-0002-8072-031XRoobaea Alroobaea5https://orcid.org/0000-0001-8199-5852Abdullah M. Baqasah6https://orcid.org/0000-0002-2337-4326Uma Chinta7https://orcid.org/0000-0002-1191-5594Department of Computer Science and Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi, PakistanDepartment of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi~ArabiaSchool of Business, Istanbul Medipol University, Istanbul, TurkeySchool of Business, Istanbul Medipol University, Istanbul, TurkeySchool of Business, Istanbul Medipol University, Istanbul, TurkeyDepartment of Computer Science, College of Computers and Information Technology, Taif University, Taif, Saudi~ArabiaDepartment of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi~ArabiaDepartment of Computer Science, College of Engineering and Applied Sciences, University of Colorado, Colorado Springs, CO, USAMalicious assaults and information leakage have grown in importance in practically every area of information and communication technology (ICT) in recent years. Enterprise ledger organization, preservation, security, and protection are all greatly aided by information security (IS). To maintain their positions in the market, industries must safeguard their data and other vital assets. The main goals of this paper’s systematic review, which covers the entire process of privacy protection and security, are to introduce cryptographic IS for Industry 5.0 (the Fifth Industrial Revolution) as a comprehensive solution that provides regulatory compliance and IS policies in addition to the industrial goals. The review covers the four main areas: 1) recognizing the need for frameworks to be developed for a secure Industry 5.0 lifecycle; 2) emphasizing security guidelines, procedures, and countermeasures for Industry 5.0; 3) applying control, access, and availability in real-time; and 4) proposing a futuristic architecture for industrial information security. Furthermore, the analysis of previously published state-of-the-art techniques is presented in this paper. These techniques survive with various limitations and challenges, including intercommunication exchange, fine-grained control access, and interconnectivity-related issues, which affect the adoption of an IS in industrial programs. At the end of this systematic review, we investigated a few open research problems and mentioned those that are involved in the design of cryptographic re-encryption enabled IS for future Industry 5.0 developments.https://ieeexplore.ieee.org/document/10384336/Cryptographyinformation securityIndustrial Internet of Things (IIoT)Industry 50blockchainhash encryption
spellingShingle Zaffar Ahmed Shaikh
Fahima Hajjej
Yeter Demir Uslu
Serhat Yuksel
Hasan Dincer
Roobaea Alroobaea
Abdullah M. Baqasah
Uma Chinta
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
IEEE Access
Cryptography
information security
Industrial Internet of Things (IIoT)
Industry 50
blockchain
hash encryption
title A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
title_full A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
title_fullStr A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
title_full_unstemmed A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
title_short A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
title_sort new trend in cryptographic information security for industry 5 0 a systematic review
topic Cryptography
information security
Industrial Internet of Things (IIoT)
Industry 50
blockchain
hash encryption
url https://ieeexplore.ieee.org/document/10384336/
work_keys_str_mv AT zaffarahmedshaikh anewtrendincryptographicinformationsecurityforindustry50asystematicreview
AT fahimahajjej anewtrendincryptographicinformationsecurityforindustry50asystematicreview
AT yeterdemiruslu anewtrendincryptographicinformationsecurityforindustry50asystematicreview
AT serhatyuksel anewtrendincryptographicinformationsecurityforindustry50asystematicreview
AT hasandincer anewtrendincryptographicinformationsecurityforindustry50asystematicreview
AT roobaeaalroobaea anewtrendincryptographicinformationsecurityforindustry50asystematicreview
AT abdullahmbaqasah anewtrendincryptographicinformationsecurityforindustry50asystematicreview
AT umachinta anewtrendincryptographicinformationsecurityforindustry50asystematicreview
AT zaffarahmedshaikh newtrendincryptographicinformationsecurityforindustry50asystematicreview
AT fahimahajjej newtrendincryptographicinformationsecurityforindustry50asystematicreview
AT yeterdemiruslu newtrendincryptographicinformationsecurityforindustry50asystematicreview
AT serhatyuksel newtrendincryptographicinformationsecurityforindustry50asystematicreview
AT hasandincer newtrendincryptographicinformationsecurityforindustry50asystematicreview
AT roobaeaalroobaea newtrendincryptographicinformationsecurityforindustry50asystematicreview
AT abdullahmbaqasah newtrendincryptographicinformationsecurityforindustry50asystematicreview
AT umachinta newtrendincryptographicinformationsecurityforindustry50asystematicreview