I. Introduction
With the boom of modern Information and Communications Technology (ICT), the fourth industrial revolution (Industry 4.0) has overturned the traditional industrial development model. Industrial Internet of Things (IIoT), where the huge amounts of data are generated by the connected industrial devices every day, is considered as one of the key technologies for the implementation of Industry 4.0. The characteristics of traditional industrial data were small quantity, simple construction, and unidirectional transmission, while, the features of data in IIoT are massive data, complicated structure, and two-way transmission. Business application and direction and path of data flow are more complicated, and data types and protection demand are diverse. It should not be surprising that the safety and security requirements in IIoT are generally stricter than those found in a typical IoT scenario [1]. Therefore, how to protect and use these valuable data in IIoT to share in efficient, secure, and economic ways becomes a burning issue for owners and providers. In recent years, we have seen an unprecedented growth of demand in physical data and logical data security of IIoT.