[go: up one dir, main page]

Hashemi et al., 2017 - Google Patents

Decentralized user-centric access control using pubsub over blockchain

Hashemi et al., 2017

View PDF
Document ID
3303502076731375760
Author
Hashemi S
Faghri F
Campbell R
Publication year
Publication venue
arXiv preprint arXiv:1710.00110

External Links

Snippet

We present a mechanism that puts users in the center of control and empowers them to dictate the access to their collections of data. Revisiting the fundamental mechanisms in security for providing protection, our solution uses capabilities, access lists, and access …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Sharma et al. Blockchain technology for cloud storage: A systematic literature review
US11113410B2 (en) User controlled, decentralized, distributed, and secure content distribution
US11741083B2 (en) Cross-shard private atomic commit
Hashemi et al. World of empowered IoT users
US11943237B2 (en) Malicious peer identification for database block sequence
US11949691B2 (en) Malicious peer identification
US11641364B2 (en) Cross-domain state synchronization
KR102726544B1 (en) Cross-Network Identity Provisioning
KR20220044306A (en) Partially-aligned blockchain
US11275859B2 (en) Preservation of privacy in large datasets
Hashemi et al. Decentralized user-centric access control using pubsub over blockchain
US20210297271A1 (en) Subscription service for networks
US20210256145A1 (en) Preservation of privacy in large datasets
Ghorbel et al. Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain
US20230208640A1 (en) Selective audit process for privacy-preserving blockchain
US20220182237A1 (en) Entangled token structure for blockchain networks
US11228424B2 (en) Blu-ray copy service
WO2022057451A1 (en) Threshold encryption for broadcast content
US20210224404A1 (en) Privacy-preserving document sharing
WO2023046409A1 (en) Digital asset platform with hsm verification
US20220398567A1 (en) Provable trade secrets on blockchain networks
US11310311B2 (en) Media obfuscation
CN114830594A (en) Anonymization of partners
US20210224405A1 (en) Privacy-preserving document sharing
Tharani et al. A blockchain-based database management system