2023
DOI: 10.3390/s23167036
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Secure Storage and Access Control Scheme for Supply Chain Ecological Business Data: A Case Study of the Automotive Industry

Abstract: The reliable circulation of automotive supply chain data is crucial for automotive manufacturers and related enterprises as it promotes efficient supply chain operations and enhances their competitiveness and sustainability. However, with the increasing prominence of privacy protection and information security issues, traditional data sharing solutions are no longer able to meet the requirements for highly reliable secure storage and flexible access control. In response to this demand, we propose a secure data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…Such advanced technologies as eco-design [44]; the symbiosis of CAD, CAE, and engineering knowledge [45]; the Internet of Things [46]; Big Data; digital technologies; the blockchain [47]; and software asset management [48] are used at all stages of the life cycle [5] of both auto components and the vehicle as a whole.…”
Section: Localization Of Auto Components As One Of the Sustainability...mentioning
confidence: 99%
“…Such advanced technologies as eco-design [44]; the symbiosis of CAD, CAE, and engineering knowledge [45]; the Internet of Things [46]; Big Data; digital technologies; the blockchain [47]; and software asset management [48] are used at all stages of the life cycle [5] of both auto components and the vehicle as a whole.…”
Section: Localization Of Auto Components As One Of the Sustainability...mentioning
confidence: 99%
“…In order to improve the security of access control systems, methods have been proposed to encrypt information or protect data in other ways. Li et al [18] designed a dual-layer access control model based on attributes. The initial layer encrypts data by using attribute-based encryption algorithms, while the subsequent layer applies optimized smart contracts and coordination algorithms for access control, protecting the privacy of data sharing.…”
Section: Privacy Preservation In Iot Access Controlmentioning
confidence: 99%
“…Here, a blockchain is implemented to avoid unintended product deletions and recover deleted data using traceability features. Bosona et al [24] and Li et al [25] also worked on the traceability and access management solutions on supply chain using the blockchain technology. El Khanboubi et al [26] employed a blockchain protocol to enable the smart deletion of duplicated data.…”
Section: Related Workmentioning
confidence: 99%