7 CONCLUSION
In this work, we proposed ARMOREDTWINS: a secure
digital twin system that protects the data of digital
twins, so that it can also be employed for sensitive in-
formation. We build on KP-CPRE for flexible, fine-
grained, end-to-end encryption, which enables shar-
ing of data with its owner and other parties to review
the data or process it, e.g., in simulations. Further-
more, we integrated MPC to enable processing of sen-
sitive data that owners would not expose even par-
tially. Our system allows to compute functions on
shares of digital twin data so that neither the cloud
nor the processing nodes learn the input or result, but
only the designated receiver gets the outcome. Also,
the system offers protected interaction with external
requesters, processes to manage changing trust rela-
tionships, and strategies to recover from device and
key loss. Benchmarks show the feasibility and practi-
cability of our ARMOREDTWINS system. We evaluated
the MPC integration with privacy-preserving contact
tracing as an example use case, which scales linearly
with about 8.2s per user and 50 uploaded location
points each.
REFERENCES
Abdalla, M., Cornejo, M., Nitulescu, A., and Pointcheval,
D. (2016). “Robust Password-Protected Secret Shar-
ing”. In: ESORICS (2). Vol. 9879. LNCS. Springer,
pp. 61–79.
Aly, A, Cong, K, Cozzo, D, Keller, M, Orsini, E, Rotaru,
D, Scherer, O, Scholl, P, Smart, N., Tanguy, T, and
Wood, T (2021). SCALE–MAMBA v1.11: Documenta-
tion. https://homes.esat.kuleuven.be/
∼
nsmart/SCALE/
Documentation-SCALE.pdf. Accessed: 2021-02-12.
Aranha, D. F. and Gouv
ˆ
ea, C. P. L. (2021). RELIC is an
Efficient LIbrary for Cryptography. https://github.com/
relic-toolkit/relic. Accessed: 2021-02-12.
Ateniese, G., Fu, K., Green, M., and Hohenberger, S.
(2006). “Improved proxy re-encryption schemes with
applications to secure distributed storage”. ACM Trans.
Inf. Syst. Secur., 9(1), pp. 1–30.
Barbulescu, R. and Duquesne, S. (2019). “Updating Key
Size Estimations for Pairings”. J. Cryptol., 32(4),
pp. 1298–1336.
Barricelli, B. R., Casiraghi, E., and Fogli, D. (2019). “A
Survey on Digital Twin: Definitions, Characteristics,
Applications, and Design Implications”. IEEE Access,
7, pp. 167653–167671.
Blaze, M., Bleumer, G., and Strauss, M. (1998). “Divertible
Protocols and Atomic Proxy Cryptography”. In: EU-
ROCRYPT. Vol. 1403. LNCS. Springer, pp. 127–144.
Bogdanov, D., Niitsoo, M., Toft, T., and Willemson, J.
(2012). “High-performance secure multi-party compu-
tation for data mining applications”. Int. J. Inf. Sec.,
11(6), pp. 403–418.
Chen, X., Kang, E., Shiraishi, S., Preciado, V. M., and Jiang,
Z. (2018). “Digital Behavioral Twins for Safe Con-
nected Cars”. In: MoDELS. ACM, pp. 144–153.
Dietz, M., Putz, B., and Pernul, G. (2019). “A Distributed
Ledger Approach to Digital Twin Secure Data Shar-
ing”. In: DBSec. Vol. 11559. LNCS. Springer, pp. 281–
300.
Eckhart, M. and Ekelhart, A. (2018). “A Specification-
based State Replication Approach for Digital Twins”.
In: CPS-SPC@CCS. ACM, pp. 36–47.
Fuller, A., Fan, Z., Day, C., and Barlow, C. (2020). “Digi-
tal Twin: Enabling Technologies, Challenges and Open
Research”. IEEE Access, 8, pp. 108952–108971.
Gehrmann, C. and Gunnarsson, M. (2020). “A Digital Twin
Based Industrial Automation and Control System Secu-
rity Architecture”. IEEE Trans. Ind. Informatics, 16(1),
pp. 669–680.
H
¨
orandner, F. and Rabensteiner, C. (2019). “Horcruxes
for Everyone - A Framework for Key-Loss Recovery
by Splitting Trust”. In: TrustCom/BigDataSE. IEEE,
pp. 50–57.
Huang, S., Wang, G., Yan, Y., and Fang, X. (2020).
“Blockchain-based data management for digital twin
of product”. Journal of Manufacturing Systems, 54,
pp. 361–371.
Kern, A. and Anderl, R. (2020). “Using Digital Twin Data
for the Attribute-Based Usage Control of Value-Added
Networks”. In: SDS. IEEE, pp. 29–36.
Kraft, E. M. (2016). “The Air Force Digital Thread/Digital
Twin - Life Cycle Integration and Use of Computa-
tional and Experimental Knowledge”. In: 54th AIAA
Aerospace Sciences Meeting.
Liu, Y., Zhang, L., Yang, Y., Zhou, L., Ren, L., Wang,
F., Liu, R., Pang, Z., and Deen, M. J. (2019). “A
Novel Cloud-Based Framework for the Elderly Health-
care Services Using Digital Twin”. IEEE Access, 7,
pp. 49088–49101.
Menezes, A., Sarkar, P., and Singh, S. (2016). “Challenges
with Assessing the Impact of NFS Advances on the
Security of Pairing-Based Cryptography”. In: Mycrypt.
Vol. 10311. LNCS. Springer, pp. 83–108.
National Institute of Standards & Technology (2016). SP
800-57. Recommendation for Key Management, Part 1:
General (Rev 4). Tech. rep. NIST.
Putz, B., Dietz, M., Empl, P., and Pernul, G. (2021).
“EtherTwin: Blockchain-based Secure Digital Twin In-
formation Management”. Inf. Process. Manag., 58(1),
p. 102425.
Qi, Q. and Tao, F. (2018). “Digital Twin and Big Data To-
wards Smart Manufacturing and Industry 4.0: 360 De-
gree Comparison”. IEEE Access, 6, pp. 3585–3593.
Yao, A. C. (1982). “Protocols for Secure Computations (Ex-
tended Abstract)”. In: FOCS. IEEE Computer Society,
pp. 160–164.
Zhao, J., Feng, D., and Zhang, Z. (2010). “Attribute-
Based Conditional Proxy Re-Encryption with Chosen-
Ciphertext Security”. In: GLOBECOM. IEEE, pp. 1–6.
SECRYPT 2021 - 18th International Conference on Security and Cryptography
160