2022 5th Conference on Cloud and Internet of Things (CIoT) 2022
DOI: 10.1109/ciot53061.2022.9766634
|View full text |Cite
|
Sign up to set email alerts
|

An access control and authentication scheme for secure data sharing in the decentralized cloud storage system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Access control [20,40,42,45,69,85,96,97] Access to healthcare files is typically governed by robust access control mechanisms. Role-based access control (RBAC) and attribute-based access control (ABAC) are commonly used to regulate access based on predefined roles, permissions, and attributes.…”
Section: Approaches Work Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Access control [20,40,42,45,69,85,96,97] Access to healthcare files is typically governed by robust access control mechanisms. Role-based access control (RBAC) and attribute-based access control (ABAC) are commonly used to regulate access based on predefined roles, permissions, and attributes.…”
Section: Approaches Work Descriptionmentioning
confidence: 99%
“…Secure Data Sharing and Consent Management [23,73,80,87,96,110] Blockchain-cloud integrations often implement secure data-sharing mechanisms that allow patients to control and grant access to their healthcare data. Consent management protocols ensure that data are shared only with authorized entities and for approved purposes, respecting patient privacy and data sovereignty.…”
Section: Approaches Work Descriptionmentioning
confidence: 99%
See 1 more Smart Citation