VOLUME XX, 2017 1 Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. Digital Object Identifier 10.1109/ACCESS.2022.Doi Number Blockchain-Assisted Hierarchical Attribute- based Encryption scheme for Secure Information Sharing in Industrial Internet of Things Sasikumar A 1 , Logesh Ravi 2,3 , Malathi Devarajan 4 , Selvalakshmi A 4 , Abdulaziz T. Almaktoom 5 , Abdulaziz S. Almazyad 6 , Guojiang Xiong 7 , Ali Wagdy Mohamed 8,9 1 Department of Data Science and Business Systems, Faculty of Engineering and Technology, SRM Institute of Science & Technology, Kattankulathur, Tamil Nadu-603203, India. 2 Centre for Advanced Data Science, Vellore Institute of Technology, Chennai-600127, India. 3 School of Electronics Engineering, Vellore Institute of Technology, Chennai-600127, Tamilnadu, India 4 School of Computer Science and Engineering, Vellore Institute of Technology, Chennai-600127, India. 5 Department of Operations and Supply Chain Management, Effat University, Jeddah-22332, Kingdom of Saudi Arabia. 6 Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia. 7 Guizhou Key Laboratory of Intelligent Technology in Power System, College of Electrical Engineering, Guizhou University, Guiyang- 550025, China. 8 Operations Research Department, Faculty of Graduate Studies for Statistical Research, Cairo University, Giza 12613, Egypt. 9 Applied Science Research Center, Applied Science Private University, Amman- 11937, Jordan. Corresponding author: Ali Wagdy Mohamed (aliwagdy@staff.cu.edu.eg; aliwagdy@gmail.com) & Logesh Ravi (LogeshPhD@gmail.com) Funding Support: The research is funded by Researchers Supporting Program at King Saud University, (RSPD2023R809) ABSTRACT The edge devices will produce enormous quantities of data daily as the Industrial Internet of Things (IIoT) expands in scope. Still, most IIoT data is stored in data centers, making it challenging to transfer data between domains safely. Smart logistic products have dramatically changed due to the prevalence of decentralized edge computing and blockchain in the industry sector. To address the need to exchange data between logistics networks, we proposed a novel decentralized hierarchical attribute-based encryption (HABE) scheme combining edge computing and blockchain. To begin, we offer an IoT data encryption strategy in which edge devices can send data to a nearby cloud network for data processing while maintaining privacy. In addition, we developed a blockchain-integrated data-sharing scheme that makes it possible for users to share data via the use of edge and cloud storage. In particular, an IoT device incorporates an encryption-based authentication system to verify users' access rights at the network's periphery in a decentralized manner. Using HABE, we provide a blockchain-integrated architecture for the IoT that protects user privacy. The suggested design utilizes the edge and cloud network paradigms and HABE to maintain privacy and works well with smart logistics applications. The authentication time of the proposed model is reduced by 1.5 times compared with the centralized model. The analyses and experimental findings show that the proposed blockchain-integrated edge computing architecture is better than the existing schemes in terms of data sharing, data privacy, and security. INDEX TERMS Blockchain, Data encryption, Edge Devices, HABE, IIoT, User privacy. I. INTRODUCTION The present economic landscape poses challenges for new ventures in the form of creative trade practices, innovative rules, fierce rivalry, and the need for prompt delivery of goods. Because of this, a lot of businesses depend on the Industrial Internet of Things (IIoT) [1], a term that describes any steps taken by firms to duplicate, control, and enhance their business operations using data collected from thousands of connected machines, objects, and devices to increase their revenue. As the name implies, an IIoT is a system that links and controls industrial objects, machines, and infrastructure via the Internet. This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3354846 This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4