Shi et al., 2021 - Google Patents
BacS: A blockchain-based access control scheme in distributed internet of thingsShi et al., 2021
- Document ID
- 5387501592020274226
- Author
- Shi N
- Tan L
- Yang C
- He C
- Xu J
- Lu Y
- Xu H
- Publication year
- Publication venue
- Peer-to-peer networking and applications
External Links
Snippet
Abstract Distributed Internet of Things (Distributed IoT) is a large-scale, heterogeneous, dynamic distributed architecture environment which is gradually formed based on Internet of Things (IoT) technology. In order to cope with the large number access requirements for IoT …
- 238000000034 method 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shi et al. | BacS: A blockchain-based access control scheme in distributed internet of things | |
Shi et al. | A blockchain-empowered AAA scheme in the large-scale HetNet | |
Liu et al. | A survey on secure data analytics in edge computing | |
Zhang et al. | Attribute-based access control for smart cities: A smart-contract-driven framework | |
Tan et al. | A blockchain-based access control framework for cyber-physical-social system big data | |
Kumar et al. | A survey on the blockchain techniques for the Internet of Vehicles security | |
Riabi et al. | A survey on Blockchain based access control for Internet of Things | |
Namasudra et al. | Data accessing based on the popularity value for cloud computing | |
Dwivedi et al. | Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment | |
Majumder et al. | Taxonomy and classification of access control models for cloud environments | |
Su et al. | PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT | |
Xu et al. | An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption | |
Sankar et al. | Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things | |
Kotha et al. | A comprehensive review on secure data sharing in cloud environment | |
Nguyen et al. | Leveraging blockchain to enhance data privacy in IoT-based applications | |
Guo et al. | Using blockchain to control access to cloud data | |
Otta et al. | Cloud identity and access management solution with blockchain | |
Kumar | Cryptography during data sharing and accessing over cloud | |
Devi et al. | Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation | |
Nie et al. | Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT | |
Sun et al. | A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration | |
Krishna et al. | SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier | |
Suresha et al. | Enhancing data security in cloud computing using threshold cryptography technique | |
Dong et al. | Research on quantum authentication methods for the secure access control among three elements of cloud computing | |
Xie et al. | TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things |