2018
DOI: 10.1109/access.2018.2851611
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
254
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 477 publications
(254 citation statements)
references
References 15 publications
0
254
0
Order By: Relevance
“…The full GDPR are described in detail across 99 articles covering all of the technical and admin principles around how commercial and public organisations process personal data [13]. GDPR lays out the means by which personal data is to be protected which are founded on a set of six core data processing principles: Lawfulness, Fairness, and Transparency; Purpose Limitation; Data Minimisation; Accuracy; Storage Limitation; Integrity and Confidentiality 3 . To preserve such 2 https://www.hyperledger.org/projects/fabric 3 https://gdpr-info.eu/art-5-gdpr/ principles, the GDPR clearly differentiates three roles (i.e., DS, DC and DP) and explicitly specifies associated rights and obligations under the EU data protection law.…”
Section: A the Gdpr In A Nutshellmentioning
confidence: 99%
See 1 more Smart Citation
“…The full GDPR are described in detail across 99 articles covering all of the technical and admin principles around how commercial and public organisations process personal data [13]. GDPR lays out the means by which personal data is to be protected which are founded on a set of six core data processing principles: Lawfulness, Fairness, and Transparency; Purpose Limitation; Data Minimisation; Accuracy; Storage Limitation; Integrity and Confidentiality 3 . To preserve such 2 https://www.hyperledger.org/projects/fabric 3 https://gdpr-info.eu/art-5-gdpr/ principles, the GDPR clearly differentiates three roles (i.e., DS, DC and DP) and explicitly specifies associated rights and obligations under the EU data protection law.…”
Section: A the Gdpr In A Nutshellmentioning
confidence: 99%
“…Input : c-ID ci, signature t, public-key pk DP , permission op Output: out 1 Initialisation: rec = null, out = error 2 s ← (V(ci.pk DS , t) ∨ V(ci.pk DC , t)) 3 Once consent is grant, the operation flow of accessing personal data is demonstrated in Fig. 4.…”
Section: Alg 2: Revokeconsent Revokes a Permission Previously Grantementioning
confidence: 99%
“…These systems have been tailored based on system requirements. These studies [5,35,42,51] have focused on designing a user-centric system, which owners of the data can define and enforce access control policies directly. [23,36] systems have focused on auditability characteristic and trusted logging provided by blockchain to design a reliable access control system.…”
Section: Summary and Future Workmentioning
confidence: 99%
“…[23,36] systems have focused on auditability characteristic and trusted logging provided by blockchain to design a reliable access control system. From the transactional perspective, [28,35,59] use only transactions to store access control attributes on blockchain, while [2,13,17,22,23,26,36,39,42,51,52] applied smart contracts to exploit its advantages such as flexibility and automatically enforcing access control policies. Also, the challenges and future directions have been discussed in this paper.…”
Section: Summary and Future Workmentioning
confidence: 99%
“…Accesscontrol for sharing displays in a vehicle can ensure the safety of display sharing [19]. In [49], decentralized storage and blockchain technology are combined with attributebased encryption to provide data privacy and fine-grained access-control while avoiding a single point of failure. Attestable trust anchors on clients can help with usage control of data across devices [48].…”
Section: Safety Resiliency and Trustmentioning
confidence: 99%