Nothing Special   »   [go: up one dir, main page]

Yu et al., 2020 - Google Patents

Enabling attribute revocation for fine-grained access control in blockchain-IoT systems

Yu et al., 2020

View PDF
Document ID
16303092331313507357
Author
Yu G
Zha X
Wang X
Ni W
Yu K
Yu P
Zhang J
Liu R
Guo Y
Publication year
Publication venue
IEEE Transactions on Engineering Management

External Links

Snippet

The attribute-based encryption (ABE) has drawn a lot of attention for fine-grained access control in blockchains, especially in blockchain-enabled tampering-resistant Internet-of- Things (IoT) systems. However, its adoption has been severely hindered by the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Similar Documents

Publication Publication Date Title
Yu et al. Enabling attribute revocation for fine-grained access control in blockchain-IoT systems
Liang et al. PDPChain: A consortium blockchain-based privacy protection scheme for personal data
Xu et al. Healthchain: A blockchain-based privacy preserving scheme for large-scale health data
Dilawar et al. Blockchain: securing internet of medical things (IoMT)
Nilizadeh et al. Cachet: a decentralized architecture for privacy preserving social networking with caching
Shafagh et al. Droplet: Decentralized authorization and access control for encrypted data streams
Shi et al. Blockchain-based multimedia sharing in vehicular social networks with privacy protection
Gao et al. BSSPD: A Blockchain‐Based Security Sharing Scheme for Personal Data with Fine‐Grained Access Control
Li et al. Blockchain-empowered data-driven networks: A survey and outlook
Murugesan et al. Analysis on homomorphic technique for data security in fog computing
She et al. A double steganography model combining blockchain and interplanetary file system
Beato et al. For some eyes only: protecting online information sharing
Chen et al. Blockchain meets covert communication: A survey
Yang et al. An efficient blockchain-based bidirectional friends matching scheme in social networks
Peng et al. A blockchain‐based mobile crowdsensing scheme with enhanced privacy
Zaghloul et al. d-emr: Secure and distributed electronic medical record management
US20230164121A1 (en) Autonomic distribution of hyperlinked hypercontent in a secure peer-to-peer data network
Abubakar et al. A survey on the integration of blockchain and IoT: challenges and opportunities
Liao Design of the secure smart home system based on the blockchain and cloud service
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
Palit et al. AUGChain: blockchain-based mobile user authentication scheme in global mobility network
Guo et al. A multifactor combined data sharing scheme for vehicular fog computing using blockchain
Kamel et al. D3vn: Decentralized abe-based distributed data validation network
Saxena et al. A Lightweight and Efficient Scheme for e-Health Care System using Blockchain Technology
KR20190139742A (en) Distributed Ledger for logging inquiry time in blockchain