Hu et al., 2023 - Google Patents
N-Accesses: A Blockchain-Based Access Control Framework for Secure IoT Data ManagementHu et al., 2023
View HTML- Document ID
- 14712108097615149918
- Author
- Hu T
- Yang S
- Wang Y
- Li G
- Wang Y
- Wang G
- Yin M
- Publication year
- Publication venue
- Sensors
External Links
Snippet
With the rapid advancement of network communication and big data technologies, the Internet of Things (IoT) has permeated every facet of our lives. Meanwhile, the interconnected IoT devices have generated a substantial volume of data, which possess …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nakamura et al. | Exploiting smart contracts for capability-based access control in the internet of things | |
Javed et al. | Blockchain-based secure data storage for distributed vehicular networks | |
Zhang et al. | An attribute-based collaborative access control scheme using blockchain for IoT devices | |
Kim et al. | Design of secure protocol for cloud-assisted electronic health record system using blockchain | |
Nyamtiga et al. | Blockchain-based secure storage management with edge computing for IoT | |
Chen et al. | Enterprise data sharing with privacy-preserved based on hyperledger fabric blockchain in IIOT’s application | |
Obour Agyekum et al. | A secured proxy-based data sharing module in IoT environments using blockchain | |
Nawaz et al. | Edge computing to secure iot data ownership and trade with the ethereum blockchain | |
Nyame et al. | An ECDSA approach to access control in knowledge management systems using blockchain | |
Wu et al. | Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing | |
Cheng et al. | An efficient ECC-based CP-ABE scheme for power IoT | |
Zhang et al. | Combining IOTA and attribute-based encryption for access control in the Internet of Things | |
Qureshi et al. | A blockchain-based efficient, secure and anonymous conditional privacy-preserving and authentication scheme for the internet of vehicles | |
Abdelgalil et al. | HealthBlock: a framework for a collaborative sharing of electronic health records based on blockchain | |
Huang et al. | SmartVeh: Secure and efficient message access control and authentication for vehicular cloud computing | |
Yu et al. | A blockchain-based authentication and authorization scheme for distributed mobile cloud computing services | |
Yin et al. | A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data | |
Alshudukhi et al. | An interoperable blockchain security frameworks based on microservices and smart contract in IoT environment | |
Watanabe et al. | A novel chip-level blockchain security solution for the Internet of Things networks | |
Alharbi | Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System | |
Han et al. | A blockchain-based and SGX-enabled access control framework for IoT | |
Robles et al. | Blockchain technologies for private data management in AmI environments | |
Witanto et al. | Distributed data integrity verification scheme in multi-cloud environment | |
Kallapu et al. | Enhancing cloud communication security: a blockchain-powered framework with attribute-aware encryption | |
Sun et al. | A secure and computable blockchain-based data sharing scheme in IoT system |