Blockchain intelligence for internet of vehicles: Challenges and solutions

X Wang, H Zhu, Z Ning, L Guo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
With the development of communication and networking technologies, the Internet of
Vehicles (IoV) has become the foundation of smart transportation. The development of …

Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey

F Ghaffari, E Bertin, N Crespi, J Hatin - Computer Science Review, 2023 - Elsevier
The accelerated growth of networking technologies highlights the importance of
Authentication and Access Control (AAC) as protection against associated attacks …

[HTML][HTML] Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing

S Athanere, R Thakur - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, cloud servers are gathering an increasing amount of data. Data is commonly
stored on cloud servers in the form of ciphertext to protect security and concealment of data …

A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing

X Qin, Y Huang, Z Yang, X Li - Journal of Systems Architecture, 2021 - Elsevier
Ciphertext-policy attribute-based encryption (CP-ABE) has been widely studied and used in
access control schemes for secure data sharing. Since in most of the existing attribute-based …

A blockchain based access control scheme with hidden policy and attribute

N Wu, L Xu, L Zhu - Future Generation Computer Systems, 2023 - Elsevier
Attribute-based access control, which can provide fine-grained and flexible privacy
protection, is widely used in practice. Traditional attribute-based access control schemes …

[PDF][PDF] Secure distributed cloud storage based on the blockchain technology and smart contracts

S Gousteris, YC Stamatiou… - Emerging Science …, 2023 - pdfs.semanticscholar.org
Objectives: This paper addresses the problem of secure data storage and sharing over
cloud storage infrastructures. A secure, distributed cloud storage structure incorporating the …

Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health

H Wang, J Liang, Y Ding, S Tang, Y Wang - Computer Standards & …, 2023 - Elsevier
Smart Health, with its flexibility and efficiency, has been widely deployed, especially during
the COVID-19 pandemic. However, privacy protection mechanisms for Smart Health are not …

ReLAC: Revocable and lightweight access control with blockchain for smart consumer electronics

J Zong, C Wang, J Shen, C Su… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The increasing popularity of consumer smart devices has led to concerns about the security
of electronic data. Blockchains, which are tamper-proof, can be used to store electronic data …

Secure data access control with fair accountability in smart grid data sharing: An edge blockchain approach

W Yang, Z Guan, L Wu, X Du… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Nowadays, the advance of smart grid technology has fostered the development of
microgrids, which can efficiently control and manage the distributed energy resources …

Blockchain-assisted transparent cross-domain authorization and authentication for smart city

C Huang, L Xue, D Liu, X Shen… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Secure cross-domain authorization and authentication (AA) enable application service
providers (ASPs) to allow users for resource access from different trusted domains. In this …