Nizam et al., 2025 - Google Patents
Hyperledger Fabric blockchain for securing the edge Internet of Things: A reviewNizam et al., 2025
View PDF- Document ID
- 1292178031108844636
- Author
- Nizam M
- Nizam M
- Jummadi M
- Mohd N
- Zainuddin A
- et al.
- Publication year
- Publication venue
- Journal of Informatics and Web Engineering
External Links
Snippet
Life has become more convenient, efficient, and productive in aspects like homes, healthcare, and other businesses' due to applied IoT. Nonetheless, the proliferation of IoT has led to enormous data production, which has presented daunting tasks of providing …
- 239000004744 fabric 0 title abstract description 93
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liao et al. | Security analysis of IoT devices by using mobile computing: a systematic literature review | |
Rahmani et al. | [Retracted] Blockchain‐Based Trust Management Framework for Cloud Computing‐Based Internet of Medical Things (IoMT): A Systematic Review | |
Čučko et al. | Decentralized and self-sovereign identity: Systematic mapping study | |
Hu et al. | A survey on data provenance in IoT | |
Macedo et al. | On the security aspects of Internet of Things: A systematic literature review | |
Anciaux et al. | Personal data management systems: The security and functionality standpoint | |
Chang et al. | Cloud computing adoption framework: A security framework for business clouds | |
Rajmohan et al. | A decade of research on patterns and architectures for IoT security | |
Soewito et al. | A systematic literature Review: Risk analysis in cloud migration | |
Sharma et al. | A review of blockchain-based applications and challenges | |
Fan et al. | SBBS: A secure blockchain-based scheme for IoT data credibility in fog environment | |
Hameed et al. | A formally verified blockchain-based decentralised authentication scheme for the internet of things | |
Satybaldy et al. | A taxonomy of challenges for self-sovereign identity systems | |
Will et al. | Intel software guard extensions applications: A survey | |
CN116583833A (en) | Self-auditing blockchain | |
Yang et al. | An access control model based on blockchain master-sidechain collaboration | |
Ahmed et al. | A survey on security and privacy challenges in smarthome based IoT | |
Ghesmati et al. | Studying bitcoin privacy attacks and their impact on bitcoin-based identity methods | |
Khare et al. | Design of a trustless smart city system: The# SmartME experiment | |
Haindl et al. | A systematic literature review of inter-service security threats and mitigation strategies in microservice architectures | |
Peng et al. | A privacy-preserving mobile crowdsensing scheme based on blockchain and trusted execution environment | |
Rueda-Rueda et al. | Framework-based security measures for Internet of Thing: A literature review | |
Song et al. | A collective attestation scheme towards cloud system | |
Ismail et al. | Edge IoT-cloud framework based on blockchain | |
Namakshenas | Web3. 0 Security: Privacy Enhancing and Anonym Auditing in Blockchain-based Structures |