Nothing Special   »   [go: up one dir, main page]

Hu et al., 2023 - Google Patents

N-Accesses: A Blockchain-Based Access Control Framework for Secure IoT Data Management

Hu et al., 2023

View HTML
Document ID
14712108097615149918
Author
Hu T
Yang S
Wang Y
Li G
Wang Y
Wang G
Yin M
Publication year
Publication venue
Sensors

External Links

Snippet

With the rapid advancement of network communication and big data technologies, the Internet of Things (IoT) has permeated every facet of our lives. Meanwhile, the interconnected IoT devices have generated a substantial volume of data, which possess …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems

Similar Documents

Publication Publication Date Title
Nakamura et al. Exploiting smart contracts for capability-based access control in the internet of things
Javed et al. Blockchain-based secure data storage for distributed vehicular networks
Zhang et al. An attribute-based collaborative access control scheme using blockchain for IoT devices
Kim et al. Design of secure protocol for cloud-assisted electronic health record system using blockchain
Nyamtiga et al. Blockchain-based secure storage management with edge computing for IoT
Chen et al. Enterprise data sharing with privacy-preserved based on hyperledger fabric blockchain in IIOT’s application
Obour Agyekum et al. A secured proxy-based data sharing module in IoT environments using blockchain
Nawaz et al. Edge computing to secure iot data ownership and trade with the ethereum blockchain
Nyame et al. An ECDSA approach to access control in knowledge management systems using blockchain
Wu et al. Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing
Cheng et al. An efficient ECC-based CP-ABE scheme for power IoT
Zhang et al. Combining IOTA and attribute-based encryption for access control in the Internet of Things
Qureshi et al. A blockchain-based efficient, secure and anonymous conditional privacy-preserving and authentication scheme for the internet of vehicles
Abdelgalil et al. HealthBlock: a framework for a collaborative sharing of electronic health records based on blockchain
Huang et al. SmartVeh: Secure and efficient message access control and authentication for vehicular cloud computing
Yu et al. A blockchain-based authentication and authorization scheme for distributed mobile cloud computing services
Yin et al. A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data
Alshudukhi et al. An interoperable blockchain security frameworks based on microservices and smart contract in IoT environment
Watanabe et al. A novel chip-level blockchain security solution for the Internet of Things networks
Alharbi Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System
Han et al. A blockchain-based and SGX-enabled access control framework for IoT
Robles et al. Blockchain technologies for private data management in AmI environments
Witanto et al. Distributed data integrity verification scheme in multi-cloud environment
Kallapu et al. Enhancing cloud communication security: a blockchain-powered framework with attribute-aware encryption
Sun et al. A secure and computable blockchain-based data sharing scheme in IoT system