Ye et al., 2021 - Google Patents
Security challenges of blockchain in Internet of things: Systematic literature reviewYe et al., 2021
- Document ID
- 2355150022547718913
- Author
- Ye C
- Cao W
- Chen S
- Publication year
- Publication venue
- Transactions on Emerging Telecommunications Technologies
External Links
Snippet
Since security is the most important issue in the Internet of things (IoT) and blockchain (BC), this article aims to identify, analyze, and organize the literature about security in the IoT and BC context up to August 2020 and proposes an agenda for future research. The 39 related …
- 238000005516 engineering process 0 abstract description 49
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30575—Replication, distribution or synchronisation of data between databases or within a distributed database; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ye et al. | Security challenges of blockchain in Internet of things: Systematic literature review | |
| Garriga et al. | Blockchain and cryptocurrencies: A classification and comparison of architecture drivers | |
| Zubaydi et al. | Leveraging blockchain technology for ensuring security and privacy aspects in internet of things: A systematic literature review | |
| Etemadi et al. | An ism modeling of barriers for blockchain/distributed ledger technology adoption in supply chains towards cybersecurity | |
| Rathee et al. | A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology | |
| Fortino et al. | Iot platforms and security: An analysis of the leading industrial/commercial solutions | |
| Dhasaratha et al. | Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things | |
| Demertzi et al. | An overview of privacy dimensions on the industrial internet of things (iiot) | |
| Joshi et al. | Adoption of blockchain technology for privacy and security in the context of industry 4.0 | |
| Zuo | Exploring the synergy: AI enhancing blockchain, blockchain empowering AI, and their convergence across IoT applications and beyond | |
| Alwaheidi et al. | Data-driven threat analysis for ensuring security in cloud enabled systems | |
| Bahrepour et al. | Benefit and limitation of using blockchain in smart cities to improve citizen services | |
| Obaidat et al. | Exploring IoT and blockchain: a comprehensive survey on security, integration strategies, applications and future research directions | |
| Sathish et al. | RETRACTED ARTICLE: A survey on Blockchain mechanisms (BCM) based on internet of things (IoT) applications | |
| Dalal et al. | Original Research Article A Blockchain-based secure Internet of Medical Things framework for smart healthcare | |
| Wang et al. | Network approaches in blockchain-based systems: Applications, challenges, and future directions | |
| Gupta et al. | Emergence of Big Data and Blockchain Technology in Smart City | |
| Shrivastav et al. | Blockchain-based system for secure data sharing in cloud using machine learning: Current researches and challenges | |
| Calabrò et al. | A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures | |
| Hakiri et al. | BlockCare: SDN-enabled blockchain framework for securing decentralized healthcare and precision medicine applications | |
| Ali et al. | Hyperledger fabric framework with 5G network for blockchain-based security of IoT smart home applications | |
| Majeed et al. | Devising a secure architecture of internet of everything (IoE) to avoid the data exploitation in cross culture communications | |
| Niemiec et al. | Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities | |
| Benaich et al. | Securing big data-based smart applications using blockchain technology | |
| Lee et al. | Security System Design and Verification for Zero Trust Architecture |