Kaaniche et al., 2017 - Google Patents
A blockchain-based data usage auditing architecture with enhanced privacy and availabilityKaaniche et al., 2017
View PDF- Document ID
- 443111313458731388
- Author
- Kaaniche N
- Laurent M
- Publication year
- Publication venue
- 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)
External Links
Snippet
Recent years have witnessed the trend of increasingly relying on distributed infrastructures. This increased the number of reported incidents of security breaches compromising users' privacy, where third parties massively collect, process and manage users' personal data …
- 238000000034 method 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kaaniche et al. | A blockchain-based data usage auditing architecture with enhanced privacy and availability | |
US12088568B2 (en) | Systems and methods for secure key service | |
Sauber et al. | A new secure model for data protection over cloud computing | |
Jam et al. | A survey on security of Hadoop | |
US10909254B2 (en) | Object level encryption system including encryption key management system | |
Manjusha et al. | Secure authentication and access system for cloud computing auditing services using associated digital certificate | |
KR20230022178A (en) | Decentralized Anonymization Compliant Cryptographic Management System | |
Guo et al. | Using blockchain to control access to cloud data | |
Said et al. | A multi-factor authentication-based framework for identity management in cloud applications | |
Otta et al. | Cloud identity and access management solution with blockchain | |
Han et al. | A decentralized document management system using blockchain and secret sharing | |
Kaaniche et al. | BDUA: Blockchain-based data usage auditing | |
Zhang et al. | ATIPM: A blockchain-based anonymous and traceable intellectual property management scheme | |
Aljahdali et al. | Efficient and Secure Access Control for IoT-based Environmental Monitoring | |
Kaaniche et al. | Id-based user-centric data usage auditing scheme for distributed environments | |
Balusamy et al. | Collective advancements on access control scheme for multi-authority cloud storage system | |
Pervez et al. | Oblivious access control policies for cloud based data sharing systems | |
Bathula et al. | An Integrated Blockchain Framework for Secure Data Sharing in IoT Fog Computing | |
Kathrine et al. | Four-factor based privacy preserving biometric authentication and authorization scheme for enhancing grid security | |
Yau et al. | Anonymous service usage and payment in service-based systems | |
Mythili et al. | Enhancing Role Based Access Control with Privacy in Cloud Computing. | |
Aguru et al. | SCS: A Secure Cloud Storage Framework with Enhanced Integrity and Auditability Using Consortium Blockchain System | |
Madhushree et al. | Analysis of Key Policy-Attribute Based Encryption Scheme | |
Priya et al. | A survey: attribute based encryption for secure cloud | |
Goodrich et al. | Notarized federated ID management and authentication |