[go: up one dir, main page]

Kaaniche et al., 2017 - Google Patents

A blockchain-based data usage auditing architecture with enhanced privacy and availability

Kaaniche et al., 2017

View PDF
Document ID
443111313458731388
Author
Kaaniche N
Laurent M
Publication year
Publication venue
2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)

External Links

Snippet

Recent years have witnessed the trend of increasingly relying on distributed infrastructures. This increased the number of reported incidents of security breaches compromising users' privacy, where third parties massively collect, process and manage users' personal data …
Continue reading at hal.science (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Kaaniche et al. A blockchain-based data usage auditing architecture with enhanced privacy and availability
US12088568B2 (en) Systems and methods for secure key service
Sauber et al. A new secure model for data protection over cloud computing
Jam et al. A survey on security of Hadoop
US10909254B2 (en) Object level encryption system including encryption key management system
Manjusha et al. Secure authentication and access system for cloud computing auditing services using associated digital certificate
KR20230022178A (en) Decentralized Anonymization Compliant Cryptographic Management System
Guo et al. Using blockchain to control access to cloud data
Said et al. A multi-factor authentication-based framework for identity management in cloud applications
Otta et al. Cloud identity and access management solution with blockchain
Han et al. A decentralized document management system using blockchain and secret sharing
Kaaniche et al. BDUA: Blockchain-based data usage auditing
Zhang et al. ATIPM: A blockchain-based anonymous and traceable intellectual property management scheme
Aljahdali et al. Efficient and Secure Access Control for IoT-based Environmental Monitoring
Kaaniche et al. Id-based user-centric data usage auditing scheme for distributed environments
Balusamy et al. Collective advancements on access control scheme for multi-authority cloud storage system
Pervez et al. Oblivious access control policies for cloud based data sharing systems
Bathula et al. An Integrated Blockchain Framework for Secure Data Sharing in IoT Fog Computing
Kathrine et al. Four-factor based privacy preserving biometric authentication and authorization scheme for enhancing grid security
Yau et al. Anonymous service usage and payment in service-based systems
Mythili et al. Enhancing Role Based Access Control with Privacy in Cloud Computing.
Aguru et al. SCS: A Secure Cloud Storage Framework with Enhanced Integrity and Auditability Using Consortium Blockchain System
Madhushree et al. Analysis of Key Policy-Attribute Based Encryption Scheme
Priya et al. A survey: attribute based encryption for secure cloud
Goodrich et al. Notarized federated ID management and authentication