2020 IEEE Intl Conf on Parallel &Amp; Distributed Processing With Applications, Big Data &Amp; Cloud Computing, Sustainable Com 2020
DOI: 10.1109/ispa-bdcloud-socialcom-sustaincom51426.2020.00060
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-based Access Control Mechanism of Federated Data Sharing System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Blockchain [21][22][23] and references [24 and 25] has the advantages of data traceability, high data security, and data tamper resistance, which can solve the problem of secure data storage and multiparty noncompliance. Moreover, the issue of data sharing in the context of mutual trust is very applicable to data asset management [26][27][28][29][30].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Blockchain [21][22][23] and references [24 and 25] has the advantages of data traceability, high data security, and data tamper resistance, which can solve the problem of secure data storage and multiparty noncompliance. Moreover, the issue of data sharing in the context of mutual trust is very applicable to data asset management [26][27][28][29][30].…”
Section: Related Workmentioning
confidence: 99%
“…In addition, when ocean data assets are shared across departments, data sharing methods using traditional centralized systems face security risks such as data being easily tampered with and illegal copying and utilization. Ding et al [26] developed a blockchain-based ocean data sharing platform based on the alliance chain, which realized data sharing between ocean departments and better protected the rights and interests of owners in the cross-departmental use of ocean data. It prevents data from being tampered with and copied in violation of regulations, and at the same time reduces the cost of data transactions caused by the existence of third parties, improves the motivation of various departments to share and open data on the data asset value network, and further forms a healthy development ecological environment [36,37].…”
Section: Tamper-proofing Of Data Assetsmentioning
confidence: 99%
“…Some of these limitations include limited granularity, complexity in access policy management and protection, difficulties involved in access revocation, and lower operational efficiency. Attribute based access control(ABAC) is preferred over the other access control methods due to its capability to provide finer granularity in access control using multiple attributes and to resolve most the limitations mentioned above [1].…”
Section: Introductionmentioning
confidence: 99%