2019
DOI: 10.1007/978-3-030-33509-0_81
|View full text |Cite
|
Sign up to set email alerts
|

Data Sharing System Integrating Access Control Based on Smart Contracts for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Therefore, the real-world implementation of the system is not provided. The authors in [18] presented a bubble of trust mechanism to provide trustworthiness and confidentiality of data, identification and authentication of devices. The system is efficient in terms of cost; however, the communication between nodes in a bubble is not controlled.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the real-world implementation of the system is not provided. The authors in [18] presented a bubble of trust mechanism to provide trustworthiness and confidentiality of data, identification and authentication of devices. The system is efficient in terms of cost; however, the communication between nodes in a bubble is not controlled.…”
Section: Related Workmentioning
confidence: 99%
“…The environment attributes in this method are limited to the time attributes. Another similar system for data sharing in IoT is proposed by Sultana et al [35], [36]. In this system, the user sends an access request to a central server.…”
Section: B Using Blockchain In Access Management Processmentioning
confidence: 99%
“…In addition, the CapBAC model allows subjects to delegate access rights from one to another for flexible and spontaneous access control. Recently, some initial attempts have been made to implement access control using the blockchain technology [28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43][44][45]. Among these schemes, the Blockchain-Enabled Decentralized Capability-Based Access Control (BlendCAC) scheme in [28] is the one most related to our scheme.…”
Section: Research Objectivementioning
confidence: 99%
“…The authors also provided implementations to demonstrate the feasibility of the framework. In [34], an extended version of the scheme in [33] was designed with slight modification. In [35], a smart contract was deployed to maintain the roles assigned to each user in an RBAC model, such that any service provider can verify the users' ownership of roles when providing services.…”
Section: Related Workmentioning
confidence: 99%