2020
DOI: 10.1007/978-3-030-57881-7_29
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain Based Distributed Storage System for Knowledge Graph Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 12 publications
0
1
0
Order By: Relevance
“…While these results are of great interest in the context of an AI marketplace, distributed data storage has attracted much broader interest [44]- [59]. Reading and writing data to decentralized storage is relevant to, for example, the semantic web [44], supply chains [46], and knowledge graphs [57]. To our knowledge, this is the most comprehensive evaluation of multiple storage technologies with results relevant beyond AI-to-AI communication.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…While these results are of great interest in the context of an AI marketplace, distributed data storage has attracted much broader interest [44]- [59]. Reading and writing data to decentralized storage is relevant to, for example, the semantic web [44], supply chains [46], and knowledge graphs [57]. To our knowledge, this is the most comprehensive evaluation of multiple storage technologies with results relevant beyond AI-to-AI communication.…”
Section: Discussionmentioning
confidence: 99%
“…Beyond the limited scope, the particular choice of blockchain makes this study less relevant as a storage alternative due to Ethereum's unpredictable and sometimes high fees and congestion. [60]- [62] Wang et al [57] investigate knowledge graph storage on IPFS with the file index hashes stored and made accessible on Hyperledger Fabric. They present experimental results of write times using Hyperledge Fabric with four peer nodes running on a single machine.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the attack thread correlation analysis process relies on the existing alerts to query the associated alerts, CVE items, and CAPEC items, which could be conducive to predicting the real purpose of attackers. In the authors' thesis [120], rebuilding the scene of a series of alerts based on KG was introduced in detail. The author conducts an experiment on the DARPA 2000 dataset to assess the performance of the proposed framework by comparing the number of remaining alerts after correlation analysis.…”
Section: Security Alert or Event Correlation Analysismentioning
confidence: 99%
“…In practice, the perturbation can increase the data size and the computation when extracting the original data, therefore the differential privacy is not always efficient. The novel blockchain technology which is a decentralized, distributed and secure database, has been used to tackle many issues of security, privacy and trust in KG [1,2]. Blockchain has been recently integrated to protect and keep the privacy of the personal data [3,4,5] which can be represented by knowledge graphs.…”
Section: Introductionmentioning
confidence: 99%
“…Several approaches have integrated KG to enhance BC data querying and its reasoning capabilities such as [12], [13] and [14] but a few works like [15] have used BC with KG to keep data sharing privacy and security. In regards to keep only the KG privacy, [1] has proposed to merge BC with IPFS to keep only the KG integrity by saving the data hash on the BC without any access control. Among the shortcomings that are noticed by recent works do not give a complete KG privacy protection, and marginalize the access control on its data, which complicates the sharing of its content.…”
Section: Introductionmentioning
confidence: 99%