[go: up one dir, main page]

Noor et al., 2022 - Google Patents

Decentralized access control using blockchain technology for application in smart farming

Noor et al., 2022

View PDF
Document ID
7440740030442849845
Author
Noor N
Razali N
Malizan N
Ishak K
Wook M
Hasbullah N
Publication year
Publication venue
International Journal of Advanced Computer Science and Applications

External Links

Snippet

The application of the Internet of Things (IoT) plays a crucial role in the fourth industrial revolution. The sophistication of technology due to the integration of heterogenous smart devices open a new threat from various aspects. Access control is the first line of defence to …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • G06F17/30321Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer

Similar Documents

Publication Publication Date Title
Shammar et al. A survey of IoT and blockchain integration: security perspective
Alfandi et al. A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues
Jurcut et al. Security considerations for Internet of Things: A survey
Alwarafy et al. A survey on security and privacy issues in edge-computing-assisted internet of things
Qashlan et al. Privacy-preserving mechanism in smart home using blockchain
Sookhak et al. Security and privacy of smart cities: a survey, research issues and challenges
Liu et al. A survey on secure data analytics in edge computing
Zulkifl et al. FBASHI: Fuzzy and blockchain-based adaptive security for healthcare IoTs
Lim et al. Blockchain technology the identity management and authentication service disruptor: a survey
Almadani et al. Blockchain-based multi-factor authentication: A systematic literature review
US10469496B2 (en) Fabric assisted identity and authentication
Dramé-Maigné et al. Centralized, distributed, and everything in between: Reviewing access control solutions for the IoT
Alshehri et al. Dynamic secure access control and data sharing through trusted delegation and revocation in a blockchain-enabled cloud-IoT environment
Ghaffari et al. Identity and access management using distributed ledger technology: A survey
Al Muhtadi et al. Subjective logic-based trust model for fog computing
Xu et al. An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption
Rui et al. Research on secure transmission and storage of energy IoT information based on Blockchain
Noor et al. Decentralized access control using blockchain technology for application in smart farming
Chen et al. Endogenous security formal definition, innovation mechanisms, and experiment research in industrial internet
US20250021982A1 (en) Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions
Moradi et al. Security‐Level Improvement of IoT‐Based Systems Using Biometric Features
Abubakar et al. A lightweight and user-centric two-factor authentication mechanism for iot based on blockchain and smart contract
Pešić et al. CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
Ashraf et al. Authentication in IoT devices using blockchain technology: A review
Moghariya et al. Blockchain-enabled IoT (B-IoT): overview, security, scalability & challenges