Steichen et al., 2018 - Google Patents
Blockchain-based, decentralized access control for IPFSSteichen et al., 2018
View PDF- Document ID
- 8709577004495775328
- Author
- Steichen M
- Fiz B
- Norvill R
- Shbair W
- State R
- Publication year
- Publication venue
- 2018 Ieee international conference on internet of things (iThings) and ieee green computing and communications (GreenCom) and ieee cyber, physical and social computing (CPSCom) and ieee smart data (SmartData)
External Links
Snippet
Large files cannot be efficiently stored on blockchains. On one hand side, the blockchain becomes bloated with data that has to be propagated within the blockchain network. On the other hand, since the blockchain is replicated on many nodes, a lot of storage space is …
- 230000002708 enhancing 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/3015—Redundancy elimination performed by the file system
- G06F17/30156—De-duplication implemented within the file system, e.g. based on file segments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30091—File storage and access structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Steichen et al. | Blockchain-based, decentralized access control for IPFS | |
Ibáñez et al. | On blockchains and the general data protection regulation | |
Kaur et al. | Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS | |
WO2020233644A1 (en) | Conditional receipt storage method and node combining dimensions of code annotation and type | |
EP2043019B1 (en) | Software publisher trust extension application | |
CN111800268A (en) | Zero knowledge proof for block chain endorsements | |
CN110263087B (en) | Receipt storage method and node based on multi-dimensional information and with conditional restriction | |
CN110580414A (en) | Privacy data query method and device based on blockchain account | |
CN110263544B (en) | Receipt storage method and node combining transaction type and judgment condition | |
CN110580413A (en) | Private data query method and device based on off-chain authorization | |
WO2020233612A1 (en) | Receipt storage method and node combining code annotation with transaction and event types | |
WO2020233642A1 (en) | Conditional receipt storage method and node which combine code labelling and type dimension | |
CN110263086B (en) | Receipt storage method and node combining user type and event function type | |
WO2020233613A1 (en) | Conditional receipt storage method and node which combine code marking with transaction type | |
CN110264197B (en) | Receipt storage method and node combining event function type and judgment condition | |
WO2020233610A1 (en) | Receipt storage method combining code labelling with user and event type, and node | |
WO2020233626A1 (en) | Receipt storage method and node in combination with conditional limitation of transaction and user types | |
WO2020233609A1 (en) | Conditional receipt storage method and node combining code labeling with user type | |
CN110245504B (en) | Receipt storage method and node combined with condition limitation of multi-type dimensionality | |
Wüst et al. | Zlite: Lightweight clients for shielded zcash transactions using trusted execution | |
WO2020233640A1 (en) | Receipt storage method and node based on code labeling and determination condition | |
WO2020233622A1 (en) | Receipt storage method and node based on code labeling and multiple types of dimensions | |
WO2020233631A1 (en) | Transaction type-based receipt storage method and node | |
WO2020233624A1 (en) | Receipt storage method and node employing transaction type in combination with event function type | |
WO2020233614A1 (en) | Conditional receipt storage method and node combining code labeling with event type |