Nothing Special   »   [go: up one dir, main page]

Merlec et al., 2024 - Google Patents

SC-CAAC: A Smart Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems

Merlec et al., 2024

View PDF
Document ID
8748683532759951890
Author
Merlec M
In H
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

Integrating blockchain technology with the Internet of Things (IoT) facilitates seamless interaction between IoT devices and systems to securely share, access, and exchange data. However, ensuring adequate access control within blockchain-enabled IoT (BIoT) systems …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities

Similar Documents

Publication Publication Date Title
Ouaddah et al. Access control in the Internet of Things: Big challenges and new opportunities
Xu et al. Blendcac: A blockchain-enabled decentralized capability-based access control for iots
Hu et al. Guide to attribute based access control (abac) definition and considerations (draft)
Khan et al. An extended access control model for permissioned blockchain frameworks
Hernandez-Ramos et al. Security and privacy in internet of things-enabled smart cities: Challenges and future directions
Bouras et al. IoT-CCAC: a blockchain-based consortium capability access control approach for IoT
Kagal et al. Developing secure agent systems using delegation based trust management
Xu et al. Decentralized access control for IoT based on blockchain and smart contract
Bagdasaryan et al. Ancile: Enhancing privacy for ubiquitous computing with use-based privacy
Rahman Scalable role-based access control using the eos blockchain
Veloudis et al. Achieving security-by-design through ontology-driven attribute-based access control in cloud environments
Merlec et al. SC-CAAC: A Smart Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems
Shammar et al. An attribute‐based access control model for Internet of Things using hyperledger fabric blockchain
Singh et al. ITrust: identity and trust based access control model for healthcare system security
Ray et al. Trust-based access control for secure cloud computing
Alayda et al. A novel hybrid approach for access control in cloud computing
Trabelsi et al. Access control in Internet of Things: A survey
Rahman et al. Context-aware and dynamic role-based access control using blockchain
Mishra et al. Blockchain DrivenAccess control architecture for the internet of things
Sedrati et al. IoT-Gov: an IoT governance framework using the blockchain
Pham et al. On a taxonomy of delegation
Narayanan Securing hadoop
Al-Jaroodi et al. A survey of security middleware for pervasive and ubiquitous systems
Shi et al. DUCE: Distributed usage control enforcement for private data sharing in Internet of Things
Salim et al. Towards authorisation models for secure information sharing: A survey and research agenda