2020
DOI: 10.1109/access.2020.2985762
|View full text |Cite
|
Sign up to set email alerts
|

AuthPrivacyChain: A Blockchain-Based Access Control Framework With Privacy Protection in Cloud

Abstract: Cloud is a computing model that provides sharing and supports ubiquitous on-demand access computing, providing new data processing and services for many industries, significantly reducing user computing and storage costs, and improving ease of use. With the development of cloud-scale and intensification, cloud security has become an essential issue in the field of cloud computing. Access control is one of the critical security technologies for protecting sensitive data stored in the cloud by enterprises and in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 141 publications
(57 citation statements)
references
References 35 publications
0
49
0
Order By: Relevance
“…In this article, different attacks are mentioned through CSA which are the topmost nine (09) attacks on the cloud system until 2013: data breaches, data loss, account hijacking, insecure APIs, DoS, malicious insiders, abuse of cloud services, insufficient due diligence, and shared technology issues. e control blockchain-based framework called the Auth-Privacy chain is adopted to minimize the leakage and temper the data in the cloud [70]. First, the identity is provided to a node and this address is stored in blockchain; then, according to this address encryption is made.…”
Section: Testing-as-a-servicementioning
confidence: 99%
“…In this article, different attacks are mentioned through CSA which are the topmost nine (09) attacks on the cloud system until 2013: data breaches, data loss, account hijacking, insecure APIs, DoS, malicious insiders, abuse of cloud services, insufficient due diligence, and shared technology issues. e control blockchain-based framework called the Auth-Privacy chain is adopted to minimize the leakage and temper the data in the cloud [70]. First, the identity is provided to a node and this address is stored in blockchain; then, according to this address encryption is made.…”
Section: Testing-as-a-servicementioning
confidence: 99%
“…Also, it is not suffering from certificate management issue, key escrow issue, public key replacement issue, and secure channel need problem. The new scheme ensured the security requirements, i.e., Warrant Unforgeability, Confidentiality, Integrity, Unforgeability, Forward Secrecy, and Resists Replay Attack [41,42,43,44], respectively. Our scheme is not affected by heavy computation because we used hyper elliptic curve instead of bilinear pairing and elliptic curve which need very miner time for computations [11,12].…”
Section: Ming Et Al [2014]mentioning
confidence: 96%
“…Other works that is of interest are : AuthPrivacyChain (blockchain-based access control framework with privacy protection) proposed by Caixia Yang, et al, [10]; blockchain-empowered AAA scheme for accessing data of LS-HetNet proposed by Na Shi, et al, [70] and zkCrowd (an innovative hybrid blockchain crowdsourcing platform) named and proposed by, Saide Zhu et al, [80].…”
Section: B Block Chain In Health Carementioning
confidence: 99%