Agrawal et al., 2024 - Google Patents
Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithmAgrawal et al., 2024
- Document ID
- 17790422722028112827
- Author
- Agrawal R
- Singhal S
- Sharma A
- Publication year
- Publication venue
- Cluster Computing
External Links
Snippet
Blockchain technology ensures the integrity and transparency of data access control by keeping an unchangeable record of all transactions. Fog computing increases efficiency by dispersing cloud computing skills throughout the network's superiority and reducing latency …
- 238000004422 calculation algorithm 0 title abstract description 68
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alfandi et al. | A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues | |
Saidi et al. | DSMAC: Privacy-aware Decentralized Self-Management of data Access Control based on blockchain for health data | |
Mittal et al. | Using identity‐based cryptography as a foundation for an effective and secure cloud model for e‐health | |
Singh et al. | A cryptography and machine learning based authentication for secure data-sharing in federated cloud services environment | |
Zhang et al. | Data security sharing model based on privacy protection for blockchain‐enabled industrial Internet of Things | |
Cano et al. | Preserving data privacy in the internet of medical things using dual signature ECDSA | |
Selvarajan et al. | A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems | |
Oktian et al. | BorderChain: Blockchain-based access control framework for the Internet of Things endpoint | |
Shahidinejad et al. | An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT | |
Murala et al. | Securing electronic health record system in cloud environment using blockchain technology | |
Cherbal et al. | Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing | |
Lin et al. | Secure Internet of medical Things (IoMT) based on ECMQV-MAC authentication protocol and EKMC-SCP blockchain networking | |
Huang et al. | A medical data privacy protection scheme based on blockchain and cloud computing | |
Iftikhar et al. | Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review | |
Agrawal et al. | Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm | |
Ahmad et al. | Efficient time-oriented latency-based secure data encryption for cloud storage | |
Xu et al. | An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption | |
Sarwar et al. | A brief survey on IoT privacy: Taxonomy, issues and future trends | |
Sharma et al. | A survey on privacy preserving methods of electronic medical record using blockchain | |
Wang et al. | A User‐Centered Medical Data Sharing Scheme for Privacy‐Preserving Machine Learning | |
Kumar et al. | A novel framework for fog computing: Lattice-based secured framework for cloud interface | |
Diwan et al. | Blockchain assisted encryption scheme for intellectual share estimation using medical research data | |
Yakubu et al. | Blockchain-based privacy and security model for transactional data in large private networks | |
Odoom et al. | Blockchain-assisted sharing of electronic health records: a feasible privacy-centric constant-size ring signature framework | |
Rajesh Kanna et al. | Exploring the landscape of network security: a comparative analysis of attack detection strategies |