[go: up one dir, main page]

Cha et al., 2023 - Google Patents

A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2

Cha et al., 2023

Document ID
7529172650862765959
Author
Cha S
Meng W
Li W
Yeh K
Publication year
Publication venue
Computers & Industrial Engineering

External Links

Snippet

Recently, blockchain has attracted attention as one of the most promising key platform technologies for leveraging IoT (Internet of Things) security and auditing management with trusted and decentralized architecture. Therefore, the possibilities of using blockchain for …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
KR102542720B1 (en) System for providing internet of behavior based intelligent data security platform service for zero trust security
Pasquier et al. Data provenance to audit compliance with privacy policy in the Internet of Things
Cha et al. A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2
Toapanta et al. Analysis for the evaluation and security management of a database in a public organization to mitigate cyber attacks
Henriques et al. A survey on forensics and compliance auditing for critical infrastructure protection
Anand et al. Data security and privacy functions in fog computing for healthcare 4.0
Porras et al. Security in the internet of things-a systematic mapping study
Grimaila et al. Design and analysis of a dynamically configured log-based distributed security event detection methodology
Bezas et al. Comparative analysis of open source security information & event management systems (siems)
Miloslavskaya Designing blockchain-based SIEM 3.0 system
Kamal et al. Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things‐based smart city security using blockchain
Miloslavskaya et al. New SIEM system for the internet of things
Porras et al. Security challenges and solutions in the internet of things
Dorigo Security information and event management
US11741409B1 (en) Compliance management system
Fehér et al. Log file authentication and storage on blockchain network
Bitar et al. Gdpr: Securing personal data in compliance with new eu-regulations
Rjaibi et al. The mean failure cost cybersecurity model toward security measures and associated mechanisms
Prowell et al. Position Papers for the ASCR Workshop on Cybersecurity and Privacy for Scientific Computing Ecosystems
Alexandrov et al. Design and security analysis of a fragment of internet of things telecommunication system
Benedik et al. Digital citizens in a smart city: The impact and security challenges of IoT on citizen’s data privacy
Al-Fedaghi et al. Events classification in log audit
Yakubu et al. Security Protocols and Mechanisms for Sharing Near-Real-Time Environmental Data with Multiple Audiences During Disasters
Alqahtani A novel approach to providing secure data storage using multi cloud computing
Forsberg Penetration Testing and PrivacyAssessment of Top-RankedHealth and Fitness Apps: An Empirical Study