[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sunil Kumar et al., 2021 - Google Patents

A Data Privacy Approach Using Shamir's Secret Scheme in Permissioned Blockchain

Sunil Kumar et al., 2021

Document ID
12295896815002664445
Author
Sunil Kumar K
Jain K
Subramanian N
Publication year
Publication venue
Computer Networks and Inventive Communication Technologies: Proceedings of Third ICCNCT 2020

External Links

Snippet

Abstract Information sharing is the basic necessity for advancement in research works. Information sharing in the existing technology is relied on trusted third parties (TTP). There is a lack of trust for transparency, security, and immutability in these systems because of the …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Similar Documents

Publication Publication Date Title
Zhou et al. MIStore: a blockchain-based medical insurance storage system
Zhang et al. BaDS: blockchain‐based architecture for data sharing with ABS and CP‐ABE in IoT
Ullah et al. Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment
Eskandarian et al. Express: Lowering the cost of metadata-hiding communication with cryptographic privacy
Premkamal et al. A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
Dong et al. Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing
Fan et al. TraceChain: A blockchain‐based scheme to protect data confidentiality and traceability
Das et al. MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure
Huang et al. Blockchain‐based fair three‐party contract signing protocol for fog computing
Ouaddah A blockchain based access control framework for the security and privacy of IoT with strong anonymity unlinkability and intractability guarantees
Fugkeaw et al. Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing
Bhandari et al. A framework for data security and storage in Cloud Computing
Ying et al. Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing
Gowda et al. BPCPR-FC: blockchain-based privacy preservation with confidentiality using proxy reencryption and ring signature in fog computing environments
Cai et al. BCSolid: a blockchain-based decentralized data storage and authentication scheme for solid
Zaghloul et al. d-emr: Secure and distributed electronic medical record management
Srivastava et al. Integration of quantum computing and blockchain technology: a cryptographic perspective
Mittal et al. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication
Zhu et al. A collaborative framework for privacy protection in online social networks
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
Kwon et al. Secure deduplication with reliable and revocable key management in fog computing
Sunil Kumar et al. A Data Privacy Approach Using Shamir’s Secret Scheme in Permissioned Blockchain
Xiao et al. Privacy-preserving and scalable data access control based on self-sovereign identity management in large-scale cloud storage
Purushothama et al. Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
shaher Alslman et al. Exchanging digital documents using blockchain technology