Li et al., 2021 - Google Patents
Blockchain‐Based Fine‐Grained Data Sharing for Multiple Groups in Internet of ThingsLi et al., 2021
View PDF- Document ID
- 1808044797876288816
- Author
- Li T
- Zhang J
- Lin Y
- Zhang S
- Ma J
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Cloud‐based Internet of Things, which is considered as a promising paradigm these days, can provide various applications for our society. However, as massive sensitive and private data in IoT devices are collected and outsourced to cloud for data storage, processing, or …
- 238000003860 storage 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liang et al. | PDPChain: A consortium blockchain-based privacy protection scheme for personal data | |
Zhang et al. | An efficient blockchain-based hierarchical data sharing for healthcare internet of things | |
Salman et al. | Security services using blockchains: A state of the art survey | |
Wang et al. | Blockchain-based personal health records sharing scheme with data integrity verifiable | |
Yu et al. | Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage | |
Mahalakshmi et al. | Public auditing scheme for integrity verification in distributed cloud storage system | |
Huang et al. | Blockchain‐based fair three‐party contract signing protocol for fog computing | |
Yan et al. | Integrity audit of shared cloud data with identity tracking | |
Li et al. | A Blockchain‐Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors | |
Zhang et al. | Lightweight multidimensional encrypted data aggregation scheme with fault tolerance for fog-assisted smart grids | |
Li et al. | A Blockchain‐Based Public Auditing Protocol with Self‐Certified Public Keys for Cloud Data | |
Ling et al. | Multiauthority Attribute‐Based Encryption with Traceable and Dynamic Policy Updating | |
Zhang et al. | Efficient Hierarchical and Time‐Sensitive Data Sharing with User Revocation in Mobile Crowdsensing | |
Li et al. | Blockchain‐Based Fine‐Grained Data Sharing for Multiple Groups in Internet of Things | |
Zhou et al. | A Scalable Blockchain‐Based Integrity Verification Scheme | |
Rehman et al. | Securing cloud storage by remote data integrity check with secured key generation | |
Li et al. | Improved public auditing system of cloud storage based on BLS signature | |
Verma et al. | Applications of Data Security and Blockchain in Smart City Identity Management | |
Wu et al. | Smart contract-based E-voting system using homomorphic encryption and zero-knowledge proof | |
Feng et al. | Secure and flexible authorized data sharing for smart grid | |
He et al. | Attribute-based access control scheme for secure identity resolution in prognostics and health management | |
Hwang et al. | An SKP‐ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments | |
Chen et al. | A decentralized public auditing scheme for secure cloud storage based on blockchain | |
Lin et al. | FGDB‐MLPP: A fine‐grained data‐sharing scheme with blockchain based on multi‐level privacy protection | |
Chen et al. | An open identity authentication scheme based on blockchain |