Noor et al., 2022 - Google Patents
Decentralized access control using blockchain technology for application in smart farmingNoor et al., 2022
View PDF- Document ID
- 7440740030442849845
- Author
- Noor N
- Razali N
- Malizan N
- Ishak K
- Wook M
- Hasbullah N
- Publication year
- Publication venue
- International Journal of Advanced Computer Science and Applications
External Links
Snippet
The application of the Internet of Things (IoT) plays a crucial role in the fourth industrial revolution. The sophistication of technology due to the integration of heterogenous smart devices open a new threat from various aspects. Access control is the first line of defence to …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30312—Storage and indexing structures; Management thereof
- G06F17/30321—Indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Shammar et al. | A survey of IoT and blockchain integration: security perspective | |
| Alfandi et al. | A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues | |
| Jurcut et al. | Security considerations for Internet of Things: A survey | |
| Alwarafy et al. | A survey on security and privacy issues in edge-computing-assisted internet of things | |
| Qashlan et al. | Privacy-preserving mechanism in smart home using blockchain | |
| Sookhak et al. | Security and privacy of smart cities: a survey, research issues and challenges | |
| Liu et al. | A survey on secure data analytics in edge computing | |
| Zulkifl et al. | FBASHI: Fuzzy and blockchain-based adaptive security for healthcare IoTs | |
| Lim et al. | Blockchain technology the identity management and authentication service disruptor: a survey | |
| Almadani et al. | Blockchain-based multi-factor authentication: A systematic literature review | |
| US10469496B2 (en) | Fabric assisted identity and authentication | |
| Dramé-Maigné et al. | Centralized, distributed, and everything in between: Reviewing access control solutions for the IoT | |
| Alshehri et al. | Dynamic secure access control and data sharing through trusted delegation and revocation in a blockchain-enabled cloud-IoT environment | |
| Ghaffari et al. | Identity and access management using distributed ledger technology: A survey | |
| Al Muhtadi et al. | Subjective logic-based trust model for fog computing | |
| Xu et al. | An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption | |
| Rui et al. | Research on secure transmission and storage of energy IoT information based on Blockchain | |
| Noor et al. | Decentralized access control using blockchain technology for application in smart farming | |
| Chen et al. | Endogenous security formal definition, innovation mechanisms, and experiment research in industrial internet | |
| US20250021982A1 (en) | Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions | |
| Moradi et al. | Security‐Level Improvement of IoT‐Based Systems Using Biometric Features | |
| Abubakar et al. | A lightweight and user-centric two-factor authentication mechanism for iot based on blockchain and smart contract | |
| Pešić et al. | CAAVI-RICS model for observing the security of distributed IoT and edge computing systems | |
| Ashraf et al. | Authentication in IoT devices using blockchain technology: A review | |
| Moghariya et al. | Blockchain-enabled IoT (B-IoT): overview, security, scalability & challenges |