2019
DOI: 10.26438/ijcse/v7i12.7478
|View full text |Cite
|
Sign up to set email alerts
|

Challenges against Big Data as a Service A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Blockchain-based Anonymous authentication with Selective revocation (BASS) for Smart industrial applications is proposed for smart industrial applications that support attribute privacy, selective revocation, and credential soundness [10]. Basic architecture of BDaaS has been presented in [11] that is considered for this research paper also. Random oracle model is used to handle security requirements such as mutual authentication and user anonymity and it also resists various malicious attac ks [12].…”
Section: Access Control Decisionmentioning
confidence: 99%
“…Blockchain-based Anonymous authentication with Selective revocation (BASS) for Smart industrial applications is proposed for smart industrial applications that support attribute privacy, selective revocation, and credential soundness [10]. Basic architecture of BDaaS has been presented in [11] that is considered for this research paper also. Random oracle model is used to handle security requirements such as mutual authentication and user anonymity and it also resists various malicious attac ks [12].…”
Section: Access Control Decisionmentioning
confidence: 99%
“…Blockchain-based anonymous authentication with selective revocation for smart industrial applications (BASS) offers support for attribute privacy, selective revocation, and credential soundness, aiming to enhance security and privacy within smart industrial environments [20]. The basic architecture of BDaaS has been presented in [21] which is considered for this research paper. Random oracle model is used to handle security requirements such as mutual authentication and user anonymity and it also resists various malicious attacks [22].…”
Section: Introductionmentioning
confidence: 99%