2021
DOI: 10.1016/j.sysarc.2020.101854
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(31 citation statements)
references
References 12 publications
0
30
0
1
Order By: Relevance
“…AliNSF et al [3] 2016 Excessive storage consumption Grabis et al [34] 2020 Excessive storage consumption Yang et al [100] 2018 Excessive storage consumption Konsta et al [45] 2021 Excessive storage consumption Ali et al [2] 2019 Excessive storage consumption Eltayieb et al [28] 2020 Excessive storage consumption Qin et al [80] 2021 Excessive storage consumption Chen et al [14] 2017 Excessive storage consumption Data security protection.…”
Section: Target Problem Authors Year Weaknessmentioning
confidence: 99%
See 1 more Smart Citation
“…AliNSF et al [3] 2016 Excessive storage consumption Grabis et al [34] 2020 Excessive storage consumption Yang et al [100] 2018 Excessive storage consumption Konsta et al [45] 2021 Excessive storage consumption Ali et al [2] 2019 Excessive storage consumption Eltayieb et al [28] 2020 Excessive storage consumption Qin et al [80] 2021 Excessive storage consumption Chen et al [14] 2017 Excessive storage consumption Data security protection.…”
Section: Target Problem Authors Year Weaknessmentioning
confidence: 99%
“…Through smart contracts, each node in a data-exchange P2P network makes consensus and endorsements for each other, queries the transaction record and checks the payment bill from its local blockchain peer. Same as [100], there are also some other works [2,28,45,80] that use the storage of data on the blockchain and the use of smart contracts for secure cloud data sharing.…”
Section: Blockchain-assisted Databasesmentioning
confidence: 99%
“…In [27], a lightweight proxy re-encryption scheme is proposed, which builds the pre-encryption algorithm and designs a certificateless protocol that remove bilinear pair and have very high performance. Qin et al [28] introduced Shamir secret sharing scheme and permissioned blockchain to eliminate the single point failure, and computed tokens cross domains to reduce communication and computation overhead on the data user side. Qin also made other work to realize access control based on different scenarios, such as [29,30].…”
Section: Security and Privacy Protection When Sharing Datamentioning
confidence: 99%
“…As we all know, medical data contains a lot of high-definition pictures, videos and so on, so it needs a large amount of space for storage. Qin X. et al [16] encapsulated the patient's electronic record in the blockchain based on a multi-authoritative signature scheme to resist collusion attacks. However, the blockchain storage is limited, and too much data will slow down its performance.…”
Section: Storage Modementioning
confidence: 99%