[HTML][HTML] Blockchain-based access control techniques for IoT applications

S Namane, I Ben Dhaou - Electronics, 2022 - mdpi.com
The Internet of Things is gaining more importance in the present era of Internet technology. It
is considered as one of the most important technologies of everyday life. Moreover, IoT …

[HTML][HTML] A survey on blockchain envisioned attribute based access control for internet of things: Overview, comparative analysis, and open research challenges

SS Ullah, V Oleshchuk, HSG Pussewalage - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) network is rapidly expanding due to sudden
technological advancements, which enable objects to become intelligent and contribute to …

A systematic survey of multi-factor authentication for cloud infrastructure

SP Otta, S Panda, M Gupta, C Hota - Future Internet, 2023 - mdpi.com
The unauthorized usage of various services and resources in cloud computing is something
that must be protected against. Authentication and access control are the most significant …

Enhanced Data Security Framework Using Lightweight Cryptography and Multi-Level Encryption

P Chakrabarty, T Sarkar, M Rakhra… - 2024 International …, 2024 - ieeexplore.ieee.org
Network security is essential for individuals as well as organizations in the modern day,
since the majority of enterprises and organizations store their data on clouds. Therefore, a …

IoT-friendly, pre-computed and outsourced attribute based encryption

M Mahdavi, MH Tadayon, MS Haghighi… - Future Generation …, 2024 - Elsevier
Abstract The Internet of Things (IoT) and its applications are growing at an unprecedented
rate. In such a complex network with an enormous number of nodes, an important challenge …

A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain

X Yang, W Li, K Fan - Peer-to-peer Networking and Applications, 2023 - Springer
With the development of digital healthcare, sharing electronic medical record data has
become an indispensable part of improving medical conditions. Aiming at the centralized …

Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies

K Kaur, A Kaur, Y Gulzar, V Gandhi - Frontiers in Computer Science, 2024 - frontiersin.org
The Internet of Things (IoT) is a collection of devices such as sensors for collecting data,
actuators that perform mechanical actions on the sensor's collected data, and gateways …

Cybersecurity threats and vulnerabilities experienced by small-scale African migrant traders in Southern Africa

P Kariuki, LO Ofusori, PR Subramaniam - Security Journal, 2023 - pmc.ncbi.nlm.nih.gov
Cybersecurity threats have increased as the world becomes increasingly interconnected.
Whilst the use of technology to facilitate commercial activities is now common practice, there …

A Comprehensive Review on Cryptographic Techniques for Securing Internet of Medical Things: A State-of-the-Art, Applications, Security Attacks, Mitigation Measures …

W Robert, A Denis, A Thomas… - Mesopotamian …, 2024 - journals.mesopotamian.press
As healthcare becomes increasingly dependent on the Internet of Medical Things (IoMT)
infrastructure, it is essential to establish a secure system that guarantees the confidentiality …

[HTML][HTML] Revocable and traceable undeniable attribute-based encryption in cloud-enabled e-health systems

Z He, Y Chen, Y Luo, L Zhang, Y Tang - Entropy, 2023 - mdpi.com
The emerging cloud storage technology has significantly improved efficiency and
productivity in the traditional electronic healthcare field. However, it has also brought about …