A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing

Y Zhang, L Xiong, F Li, X Niu, H Wu - Journal of Systems Architecture, 2023 - Elsevier
Blockchain-based authentication mode, a fundamental solution to prevent unauthorized
access behavior, gradually becomes a focus in future distributed mobile cloud computing …

Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs

M Babel, J Sedlmeir - arXiv preprint arXiv:2301.00823, 2023 - arxiv.org
Today, digital identity management for individuals is either inconvenient and error-prone or
creates undesirable lock-in effects and violates privacy and security expectations. These …

An encrypted medical blockchain data search method with access control mechanism

C Gan, H Yang, Q Zhu, Y Zhang, A Saini - Information Processing & …, 2023 - Elsevier
The use of medical blockchain enables the safe sharing of electronic medical data (EMD).
With the continuous growth of EMD, how to efficiently find EMD on the medical blockchain is …

[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed - Internet of Things, 2024 - Elsevier
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …

A security framework to enhance IoT device identity and data access through blockchain consensus model

K Janani, S Ramamoorthy - Cluster Computing, 2024 - Springer
In today's technology landscape, the Internet of Things (IoT) has gained significant
momentum due to its wide-ranging applications across diverse devices. However, the …

Using natural language processing and blockchain for employee performance evaluation

U Prasad, S Chakravarty, YS Bisht… - 2023 3rd …, 2023 - ieeexplore.ieee.org
This study suggests a unique method for assessing employee performance that makes use
of blockchain technology and natural language processing (NLP). The conventional …

Towards accountable and privacy-preserving blockchain-based access control for data sharing

Q Hu, C Huang, G Zhang, L Cai, T Jiang - Journal of Information Security …, 2024 - Elsevier
The integration of blockchain technology with Access Control (AC) systems presents novel
opportunities for enhancing data security within decentralized architectures, which is …

AALMOND: Decentralized Adaptive Access Control of Multi-Party Data Sharing in Industrial Networks

R Saha, G Kumar, M Conti, T Devgun… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Access control is an important security parameter in industrial networks; a mismanaged
access control system leads to security breaches. The existing security solutions significantly …

An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage

Q Wu, G Meng, L Zhang, Y Lei - Journal of Systems Architecture, 2024 - Elsevier
The application of medical cloud storage technology in healthcare and the sharing of
electronic medical records (EMR) bring convenience for patients and medical institutes …

Adaptive Access and Tracking Method for Supply Chain Data Based on Sharding Blockchain

Q Zhang, S Wang, D Zhang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Combining the supply chain with blockchain provides an immutable and publicly transparent
ledger for the supply chain data history, addressing the issue of information asymmetry …