[go: up one dir, main page]

Palanikkumar et al., 2023 - Google Patents

An enhanced decentralized social network based on Web3 and IPFS using blockchain

Palanikkumar et al., 2023

Document ID
6179341418498696925
Author
Palanikkumar D
Arun G
Arunadevi R
Gayathri S
Dharun P
Publication year
Publication venue
2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)

External Links

Snippet

Human lives now include a significant amount of social media usage. Social media is used to create communities, strengthen bonds, and stay in touch with distant friends. A single server, which performs all significant processing, serves as the hub of a centralized system …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers

Similar Documents

Publication Publication Date Title
Ullah et al. Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment
Boireau Securing the blockchain against hackers
Panwar et al. A Blockchain Framework to Secure Personal Health Record (PHR) in IBM Cloud‐Based Data Lake
Tang et al. A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain
Ghaffari et al. Identity and access management using distributed ledger technology: A survey
Xu et al. An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption
Sauber et al. A new secure model for data protection over cloud computing
Wu et al. Secure personal health records sharing based on blockchain and IPFS
Neela et al. An improved RSA technique with efficient data integrity verification for outsourcing database in cloud
Han et al. Access control mechanism for the Internet of Things based on blockchain and inner product encryption
Jin et al. Toward secure, privacy-preserving, and interoperable medical data sharing via blockchain
Palanikkumar et al. An enhanced decentralized social network based on Web3 and IPFS using blockchain
Cai et al. Socialchain: Decoupling social data and applications to return your data ownership
Fugkeaw et al. Secure and fine-grained access control with optimized revocation for outsourced iot ehrs with adaptive load-sharing in fog-assisted cloud environment
Anil et al. Achieving effective secrecy based on blockchain and data sharing in cloud computing
Alkhliwi An efficient dynamic access control and security sharing scheme using blockchain
Diwan et al. Blockchain assisted encryption scheme for intellectual share estimation using medical research data
Mahapatra et al. Smart h‐Chain: A blockchain based healthcare framework with insurance fraud detection
Bisht et al. Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey
Liu et al. Dual blockchain-based data sharing mechanism with privacy protection for medical internet of things
Yuan et al. Data centered and usage-based security service
Huang et al. The key security management scheme of cloud storage based on blockchain and digital twins
Bai et al. Access control for cloud‐based eHealth social networking: design and evaluation
Abouali et al. Patient full control over secured medical records transfer framework based on blockchain
Agarwal et al. A safe and resilient cryptographic system for dynamic cloud groups with secure data sharing and efficient user revocation