Palanikkumar et al., 2023 - Google Patents
An enhanced decentralized social network based on Web3 and IPFS using blockchainPalanikkumar et al., 2023
- Document ID
- 6179341418498696925
- Author
- Palanikkumar D
- Arun G
- Arunadevi R
- Gayathri S
- Dharun P
- Publication year
- Publication venue
- 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)
External Links
Snippet
Human lives now include a significant amount of social media usage. Social media is used to create communities, strengthen bonds, and stay in touch with distant friends. A single server, which performs all significant processing, serves as the hub of a centralized system …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ullah et al. | Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment | |
Boireau | Securing the blockchain against hackers | |
Panwar et al. | A Blockchain Framework to Secure Personal Health Record (PHR) in IBM Cloud‐Based Data Lake | |
Tang et al. | A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain | |
Ghaffari et al. | Identity and access management using distributed ledger technology: A survey | |
Xu et al. | An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption | |
Sauber et al. | A new secure model for data protection over cloud computing | |
Wu et al. | Secure personal health records sharing based on blockchain and IPFS | |
Neela et al. | An improved RSA technique with efficient data integrity verification for outsourcing database in cloud | |
Han et al. | Access control mechanism for the Internet of Things based on blockchain and inner product encryption | |
Jin et al. | Toward secure, privacy-preserving, and interoperable medical data sharing via blockchain | |
Palanikkumar et al. | An enhanced decentralized social network based on Web3 and IPFS using blockchain | |
Cai et al. | Socialchain: Decoupling social data and applications to return your data ownership | |
Fugkeaw et al. | Secure and fine-grained access control with optimized revocation for outsourced iot ehrs with adaptive load-sharing in fog-assisted cloud environment | |
Anil et al. | Achieving effective secrecy based on blockchain and data sharing in cloud computing | |
Alkhliwi | An efficient dynamic access control and security sharing scheme using blockchain | |
Diwan et al. | Blockchain assisted encryption scheme for intellectual share estimation using medical research data | |
Mahapatra et al. | Smart h‐Chain: A blockchain based healthcare framework with insurance fraud detection | |
Bisht et al. | Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey | |
Liu et al. | Dual blockchain-based data sharing mechanism with privacy protection for medical internet of things | |
Yuan et al. | Data centered and usage-based security service | |
Huang et al. | The key security management scheme of cloud storage based on blockchain and digital twins | |
Bai et al. | Access control for cloud‐based eHealth social networking: design and evaluation | |
Abouali et al. | Patient full control over secured medical records transfer framework based on blockchain | |
Agarwal et al. | A safe and resilient cryptographic system for dynamic cloud groups with secure data sharing and efficient user revocation |