Liu et al., 2021 - Google Patents
Secure resource sharing on hyperledger fabric based on cp-abeLiu et al., 2021
View PDF- Document ID
- 7492888955875929769
- Author
- Liu S
- Shang Y
- Publication year
- Publication venue
- Proceedings of the 2021 3rd International Conference on Blockchain Technology
External Links
Snippet
Nowadays, Web services are becoming more and more common in people's lives. However, resources and services are coupled on the Web. That's to say, users have to expose their data to service providers in order to trade for Web services. Consequently, users lose control …
- 239000004744 fabric 0 title abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5072—Grid computing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5077—Logical partitioning of resources; Management or configuration of virtualized resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Liang et al. | PDPChain: A consortium blockchain-based privacy protection scheme for personal data | |
| Agyekum et al. | A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain | |
| Namasudra | An improved attribute‐based encryption technique towards the data security in cloud computing | |
| Hu et al. | A survey on data provenance in IoT | |
| Wang et al. | A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems | |
| Zhang et al. | BaDS: blockchain‐based architecture for data sharing with ABS and CP‐ABE in IoT | |
| Premkamal et al. | Enhanced attribute based access control with secure deduplication for big data storage in cloud | |
| Pradeep et al. | An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment | |
| Chen et al. | Blockchain‐Enabled Public Key Encryption with Multi‐Keyword Search in Cloud Computing | |
| Yan et al. | Integrity audit of shared cloud data with identity tracking | |
| Jin et al. | A design of secure communication protocol using RLWE-based homomorphic encryption in IoT convergence cloud environment | |
| Gao et al. | Blockchain based secure IoT data sharing framework for SDN-enabled smart communities | |
| De Salve et al. | A logical key hierarchy based approach to preserve content privacy in decentralized online social networks | |
| Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
| Liao | Design of the secure smart home system based on the blockchain and cloud service | |
| Wang et al. | On-chain and off-chain collaborative management system based on consortium blockchain | |
| Han et al. | A decentralized document management system using blockchain and secret sharing | |
| Zhai et al. | TVS: a trusted verification scheme for office documents based on blockchain | |
| Liu et al. | Secure resource sharing on hyperledger fabric based on cp-abe | |
| Srisakthi et al. | Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment | |
| Meng et al. | BBAD: Blockchain-based data assured deletion and access control system for IoT | |
| Li et al. | Controlled sharing mechanism of data based on the consortium blockchain | |
| Kumar et al. | Secure Cloud Data Access: Unifying Quantum Key Distribution and Attribute-Based Encryption for Enhanced Data Protection | |
| Pervez et al. | Oblivious access control policies for cloud based data sharing systems | |
| Salunke et al. | Secure data sharing in distributed cloud environment |