Sunil Kumar et al., 2021 - Google Patents
A Data Privacy Approach Using Shamir's Secret Scheme in Permissioned BlockchainSunil Kumar et al., 2021
- Document ID
- 12295896815002664445
- Author
- Sunil Kumar K
- Jain K
- Subramanian N
- Publication year
- Publication venue
- Computer Networks and Inventive Communication Technologies: Proceedings of Third ICCNCT 2020
External Links
Snippet
Abstract Information sharing is the basic necessity for advancement in research works. Information sharing in the existing technology is relied on trusted third parties (TTP). There is a lack of trust for transparency, security, and immutability in these systems because of the …
- 238000005516 engineering process 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhou et al. | MIStore: a blockchain-based medical insurance storage system | |
Zhang et al. | BaDS: blockchain‐based architecture for data sharing with ABS and CP‐ABE in IoT | |
Ullah et al. | Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment | |
Eskandarian et al. | Express: Lowering the cost of metadata-hiding communication with cryptographic privacy | |
Premkamal et al. | A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud | |
Dong et al. | Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing | |
Fan et al. | TraceChain: A blockchain‐based scheme to protect data confidentiality and traceability | |
Das et al. | MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure | |
Huang et al. | Blockchain‐based fair three‐party contract signing protocol for fog computing | |
Ouaddah | A blockchain based access control framework for the security and privacy of IoT with strong anonymity unlinkability and intractability guarantees | |
Fugkeaw et al. | Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing | |
Bhandari et al. | A framework for data security and storage in Cloud Computing | |
Ying et al. | Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing | |
Gowda et al. | BPCPR-FC: blockchain-based privacy preservation with confidentiality using proxy reencryption and ring signature in fog computing environments | |
Cai et al. | BCSolid: a blockchain-based decentralized data storage and authentication scheme for solid | |
Zaghloul et al. | d-emr: Secure and distributed electronic medical record management | |
Srivastava et al. | Integration of quantum computing and blockchain technology: a cryptographic perspective | |
Mittal et al. | A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication | |
Zhu et al. | A collaborative framework for privacy protection in online social networks | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
Kwon et al. | Secure deduplication with reliable and revocable key management in fog computing | |
Sunil Kumar et al. | A Data Privacy Approach Using Shamir’s Secret Scheme in Permissioned Blockchain | |
Xiao et al. | Privacy-preserving and scalable data access control based on self-sovereign identity management in large-scale cloud storage | |
Purushothama et al. | Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud | |
shaher Alslman et al. | Exchanging digital documents using blockchain technology |