2021
DOI: 10.21203/rs.3.rs-165857/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Exploiting Blockchain and Secure Access Control Scheme to Enhance Privacy-Preserving of IoT Publish-Subscribe System

Abstract: With the dramatically increasing deployment of intelligent devices, the Internet of Things (IoT) has attracted more attention and developed rapidly. It effectively collects and shares data from the surrounding environment to achieve better IoT services. For data sharing, the publish-subscribe (PS) paradigm provides a loosely-coupled and scalable communication model. However, due to the loosely-coupled nature, it is vulnerable to many attacks, resulting in some security threats to the IoT system, but it cannot … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…It has been shown that the framework may be used to offer distributed trustworthy access control in the IoT and that it can survive attacks on the network from immoral behavior. According to the authors of [14], the typical centralized publish-subscribe system's security and privacy issues may be addressed with an access control mechanism based on BC and a fully homomorphic encryption algorithm. Experimental evidence supports the theoretical analysis and shows that the plan is technically feasible and efficacious in certain respects.…”
Section: Related Workmentioning
confidence: 99%
“…It has been shown that the framework may be used to offer distributed trustworthy access control in the IoT and that it can survive attacks on the network from immoral behavior. According to the authors of [14], the typical centralized publish-subscribe system's security and privacy issues may be addressed with an access control mechanism based on BC and a fully homomorphic encryption algorithm. Experimental evidence supports the theoretical analysis and shows that the plan is technically feasible and efficacious in certain respects.…”
Section: Related Workmentioning
confidence: 99%