2021
DOI: 10.1109/jiot.2020.3047640
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Access Control With Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 57 publications
(17 citation statements)
references
References 35 publications
0
17
0
Order By: Relevance
“…Energy-ICT is an integrated physical-information network. The integration of energy and ICT also inevitably exposes itself to cybersecurity threats (see [6] and [71][72][73][74][75][76][77][78][79][80][81][82][83][84][85][86]). Venkatachary et al [71] remind us that ICT connects multiple sectors as well as that of energy; however, the interdependence of these sectors generates security gaps.…”
Section: Cybersecurity Issues Of Energy-ictmentioning
confidence: 99%
See 1 more Smart Citation
“…Energy-ICT is an integrated physical-information network. The integration of energy and ICT also inevitably exposes itself to cybersecurity threats (see [6] and [71][72][73][74][75][76][77][78][79][80][81][82][83][84][85][86]). Venkatachary et al [71] remind us that ICT connects multiple sectors as well as that of energy; however, the interdependence of these sectors generates security gaps.…”
Section: Cybersecurity Issues Of Energy-ictmentioning
confidence: 99%
“…Yang et al [80] indicate that cybersecurity technologies such as blockchains can help with data security in smart grids. Blockchains can be applied to effectively achieve accountability because malicious behaviors then become traceable.…”
Section: Cybersecurity Issues Of Energy-ictmentioning
confidence: 99%
“…In [61], Yang et al affirmed that Ciphertext policy attribute-based encryption (CP-ABE) is suitable for the distributed environment. On the other hand, the limited computing capability of IoT devices prevents them from supporting the computationally intensive nature of ABE algorithms.…”
Section: Smart Gridmentioning
confidence: 99%
“…Some authors deployed a private one in [27,34,36,41,44,49,52]. In parallel, others used a consortium blockchain in [37,42,57,58,61,68]. This choice of type is determined by the nature of the information relating to the access control process.…”
Section: Analysis Of Blockchain-based Authorization Framework For Iotmentioning
confidence: 99%
“…In smart grid application scenario, Yang et al propose a secure data access control scheme used blockchain and edge computing 29 . In this scheme, the user's encryption computing work is outsourced to the edge node of the joint blockchain system.…”
Section: Related Workmentioning
confidence: 99%