2020
DOI: 10.1016/j.comcom.2020.08.021
|View full text |Cite
|
Sign up to set email alerts
|

FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
53
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(56 citation statements)
references
References 14 publications
0
53
0
Order By: Relevance
“…Most related works propose preemptive access control [29] and authentication schemes [30] for data mashup privacy preservation in fog computing environments. However, the utility of the published data is lesser in such approaches because they are limited by design to expose publicly available data only.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Most related works propose preemptive access control [29] and authentication schemes [30] for data mashup privacy preservation in fog computing environments. However, the utility of the published data is lesser in such approaches because they are limited by design to expose publicly available data only.…”
Section: Discussionmentioning
confidence: 99%
“…Most works on privacy preservation in distributed data environments propose a preemptive approach, defining who has access to private data attributes and resources by defining user profiles [29]. Access control techniques and authentication-based schemes [30] explicitly grant and revoke data access to parties. The larger the number of sensitive attributes in an access-controlled dataset, the greater the loss of analytical utility if exposing only publicly available data attributes.…”
Section: Related Workmentioning
confidence: 99%
“…A typical BC and smart contract implementation also illustrated in Figure 1. The data sent from IoT devices to the Fog node for data aggregation and further analysis [22]. Fog nodes enforce predefined security policies to manage connected IoT devices and services and also play an intermediate role of interaction between the Cloud and the public BC which enable indexing of authentication for data query [23].…”
Section: Fog Computing Backgroundmentioning
confidence: 99%
“…Users should first conduct identity authentication for cloud data users and then obtain the required services from the Cloud [140]. And in 2020, the research on authentication has expanded to multiple aspects such as mutual authentication [89], authentication scheme [141] and fog computing [142]. The research on it has continued from the third period to the fourth period and has gradually matured.…”
Section: ) Cloudmentioning
confidence: 99%