+

Ye et al., 2021 - Google Patents

Security challenges of blockchain in Internet of things: Systematic literature review

Ye et al., 2021

Document ID
2355150022547718913
Author
Ye C
Cao W
Chen S
Publication year
Publication venue
Transactions on Emerging Telecommunications Technologies

External Links

Snippet

Since security is the most important issue in the Internet of things (IoT) and blockchain (BC), this article aims to identify, analyze, and organize the literature about security in the IoT and BC context up to August 2020 and proposes an agenda for future research. The 39 related …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30575Replication, distribution or synchronisation of data between databases or within a distributed database; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Similar Documents

Publication Publication Date Title
Ye et al. Security challenges of blockchain in Internet of things: Systematic literature review
Garriga et al. Blockchain and cryptocurrencies: A classification and comparison of architecture drivers
Zubaydi et al. Leveraging blockchain technology for ensuring security and privacy aspects in internet of things: A systematic literature review
Etemadi et al. An ism modeling of barriers for blockchain/distributed ledger technology adoption in supply chains towards cybersecurity
Rathee et al. A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology
Fortino et al. Iot platforms and security: An analysis of the leading industrial/commercial solutions
Dhasaratha et al. Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things
Demertzi et al. An overview of privacy dimensions on the industrial internet of things (iiot)
Joshi et al. Adoption of blockchain technology for privacy and security in the context of industry 4.0
Zuo Exploring the synergy: AI enhancing blockchain, blockchain empowering AI, and their convergence across IoT applications and beyond
Alwaheidi et al. Data-driven threat analysis for ensuring security in cloud enabled systems
Bahrepour et al. Benefit and limitation of using blockchain in smart cities to improve citizen services
Obaidat et al. Exploring IoT and blockchain: a comprehensive survey on security, integration strategies, applications and future research directions
Sathish et al. RETRACTED ARTICLE: A survey on Blockchain mechanisms (BCM) based on internet of things (IoT) applications
Dalal et al. Original Research Article A Blockchain-based secure Internet of Medical Things framework for smart healthcare
Wang et al. Network approaches in blockchain-based systems: Applications, challenges, and future directions
Gupta et al. Emergence of Big Data and Blockchain Technology in Smart City
Shrivastav et al. Blockchain-based system for secure data sharing in cloud using machine learning: Current researches and challenges
Calabrò et al. A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures
Hakiri et al. BlockCare: SDN-enabled blockchain framework for securing decentralized healthcare and precision medicine applications
Ali et al. Hyperledger fabric framework with 5G network for blockchain-based security of IoT smart home applications
Majeed et al. Devising a secure architecture of internet of everything (IoE) to avoid the data exploitation in cross culture communications
Niemiec et al. Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities
Benaich et al. Securing big data-based smart applications using blockchain technology
Lee et al. Security System Design and Verification for Zero Trust Architecture
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载