2020
DOI: 10.1109/access.2020.3002823
|View full text |Cite
|
Sign up to set email alerts
|

Subscription-Based Data-Sharing Model Using Blockchain and Data as a Service

Abstract: In modern times, many individuals, businesses and the Internet of Things (IoT) integrated industries collect huge amounts of meaningful data daily, which may be beneficial for other individuals and businesses as well. By utilizing this data, future trends to make the right decisions on the bases of facts and figures are analyzed efficiently. In addition to that, many new ways are paved for researchers to utilize this data in their upcoming research. However, due to some major issues like security, privacy and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(27 citation statements)
references
References 26 publications
0
27
0
Order By: Relevance
“…Howard et al [29] proposed a decentralized computation platform, Enigma, to prevent accessing raw data, based on blockchain technology. Al-Zahrani et al [8] used blockchain and Data as a Service (DaaS) to construct a privacy-preserving data sharing model, which preserved the data controllability for data owner. Thus, this model cannot guarantee the data traceability and quality estimation for the data user.…”
Section: Peer-to-peer Technologymentioning
confidence: 99%
See 1 more Smart Citation
“…Howard et al [29] proposed a decentralized computation platform, Enigma, to prevent accessing raw data, based on blockchain technology. Al-Zahrani et al [8] used blockchain and Data as a Service (DaaS) to construct a privacy-preserving data sharing model, which preserved the data controllability for data owner. Thus, this model cannot guarantee the data traceability and quality estimation for the data user.…”
Section: Peer-to-peer Technologymentioning
confidence: 99%
“…However, the trusted third party with a large capacity and powerful computation inevitably inherits the single-point attack problems, which cannot preserve the security and ownership of stored data. Without the data owner's approval, such attacked data can be applied to proliferate huge commercial profits by unauthorized organizations [8]. Moreover, data owners have no awareness about how important their personal data is.…”
Section: Introductionmentioning
confidence: 99%
“…The second is usage-based subscription. A research by [1] indicates that in the usage-based subscription, an initial subscription fee which is fixed will be charged and another fee which is the usage fee is variable depending on the number of times you use the product or service. The third is user-based model that focuses on the number of individual users of a particular product or service.…”
Section: Subscription Business Model Figure 1 Subscription Business Model [9] [11]mentioning
confidence: 99%
“…The fifth is the tiered model where different subscription options and services are offered to the customers based on their interests. The last is the hybrid model, where consumers are allowed to use the product or service for a period of time and after once the subscription limits are exceeded, excess fees will be charged to allow continuous usage [1].…”
Section: Subscription Business Model Figure 1 Subscription Business Model [9] [11]mentioning
confidence: 99%
“…In Saranyu [18], Nayak et al proposed a cloud tenant and service management system similar to [17], but they used Quorum as the platform, a permissioned network to implement SCs, and have not provided enough details about charging tenants. Al-Zahrani [19] also proposed a subscription-based model for trading cloud services data. In his proposed model, all subscription requests are recorded to the ledger, even those for which the payment has not been completed.…”
Section: Related Workmentioning
confidence: 99%