[go: up one dir, main page]

Shi et al., 2021 - Google Patents

BacS: A blockchain-based access control scheme in distributed internet of things

Shi et al., 2021

Document ID
5387501592020274226
Author
Shi N
Tan L
Yang C
He C
Xu J
Lu Y
Xu H
Publication year
Publication venue
Peer-to-peer networking and applications

External Links

Snippet

Abstract Distributed Internet of Things (Distributed IoT) is a large-scale, heterogeneous, dynamic distributed architecture environment which is gradually formed based on Internet of Things (IoT) technology. In order to cope with the large number access requirements for IoT …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

Similar Documents

Publication Publication Date Title
Shi et al. BacS: A blockchain-based access control scheme in distributed internet of things
Shi et al. A blockchain-empowered AAA scheme in the large-scale HetNet
Liu et al. A survey on secure data analytics in edge computing
Zhang et al. Attribute-based access control for smart cities: A smart-contract-driven framework
Tan et al. A blockchain-based access control framework for cyber-physical-social system big data
Kumar et al. A survey on the blockchain techniques for the Internet of Vehicles security
Riabi et al. A survey on Blockchain based access control for Internet of Things
Namasudra et al. Data accessing based on the popularity value for cloud computing
Dwivedi et al. Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment
Majumder et al. Taxonomy and classification of access control models for cloud environments
Su et al. PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT
Xu et al. An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption
Sankar et al. Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things
Kotha et al. A comprehensive review on secure data sharing in cloud environment
Nguyen et al. Leveraging blockchain to enhance data privacy in IoT-based applications
Guo et al. Using blockchain to control access to cloud data
Otta et al. Cloud identity and access management solution with blockchain
Kumar Cryptography during data sharing and accessing over cloud
Devi et al. Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation
Nie et al. Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT
Sun et al. A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration
Krishna et al. SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier
Suresha et al. Enhancing data security in cloud computing using threshold cryptography technique
Dong et al. Research on quantum authentication methods for the secure access control among three elements of cloud computing
Xie et al. TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things