[go: up one dir, main page]

Zaghloul, 2020 - Google Patents

Privilege-Based Decentralized Data Sharing

Zaghloul, 2020

Document ID
8061005001363773374
Author
Zaghloul E
Publication year

External Links

Snippet

In this dissertation, cryptographic mechanism-based data sharing schemes are presented that address the challenges of dependence on third trusted parties to facilitate sensitive data sharing and censorship. This work is driven by the lack of elevated security and privacy …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Zaghloul et al. Bitcoin and blockchain: Security and privacy
US12395324B2 (en) Systems and methods for communication, storage and processing of data provided by an entity over a blockchain network
Kokoris Kogias et al. Calypso: Private data management for decentralized ledgers
Niu et al. Electronic health record sharing scheme with searchable attribute-based encryption on blockchain
Huang et al. Blockchain-based multiple groups data sharing with anonymity and traceability
Yang et al. A blockchain‐based architecture for securing electronic health record systems
JP6986519B2 (en) Distributed transaction propagation and validation system
Xue et al. Blockchain-based fair and fine-grained data trading with privacy preservation
EP4169208B1 (en) Authentication system and method
Šimunić et al. Verifiable computing applications in blockchain
Sun et al. Permissioned blockchain frame for secure federated learning
Yi et al. Blockchain foundations and applications
Li et al. Cryptoeconomics: Economic mechanisms behind blockchains
Mahapatra et al. Smart h‐Chain: A blockchain based healthcare framework with insurance fraud detection
Panda et al. Contextual attribute‐based access control scheme for cloud storage using blockchain technology
Feng et al. Secure data collaborative computing scheme based on blockchain
Li et al. Non-equivocation in blockchain: Double-authentication-preventing signatures gone contractual
Lu et al. BEvote: Bitcoin‐Enabled E‐Voting Scheme with Anonymity and Robustness
Zaghloul Privilege-Based Decentralized Data Sharing
Zhang et al. Accountable monero system with privacy protection
Thakur et al. Revocable and Privacy‐Preserving CP‐ABE Scheme for Secure mHealth Data Access in Blockchain
Shi et al. Building efficient and flexible voting protocols: An approach to fairness and anonymity
Ma et al. Reusable group fuzzy extractor and group-shared bitcoin wallet
Chang et al. Medishuffle: auditable coin mixing scheme for internet of medical things
Cruz The Bitcoin Network as Platform for Role-Based Access Control and Electronic Voting: Using Blockchain-Based Technology to Create Innovative Systems