2022
DOI: 10.1109/tifs.2022.3144869
|View full text |Cite
|
Sign up to set email alerts
|

Synchronized Provable Data Possession Based on Blockchain for Digital Twin

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(12 citation statements)
references
References 43 publications
0
10
0
Order By: Relevance
“…So more useful content understanding technologies are necessary to be introduced into our recommendation scenario to pursue higher recommendation performances. Third, privacy concern often exists in user-related decision systems [45][46][47][48][49]. And how to secure sensitive user information during recommendations is another research direction in our future study.…”
Section: Conclusion and Further Discussionmentioning
confidence: 95%
“…So more useful content understanding technologies are necessary to be introduced into our recommendation scenario to pursue higher recommendation performances. Third, privacy concern often exists in user-related decision systems [45][46][47][48][49]. And how to secure sensitive user information during recommendations is another research direction in our future study.…”
Section: Conclusion and Further Discussionmentioning
confidence: 95%
“…In IoDT, realtime heterogeneous multi-source data fusion is essential to the creation and consistency of digital twins. To ensure the consistency in autonomous digital twin synchronization, Li et al [55] propose a provable data possession method for verifying time states and checking data integrity in virtual spaces. A consortium blockchain ledger is leveraged as the synchronization platform to maintain trusted time state values among distributed physical/virtual entities in IoDT.…”
Section: Security and Privacy Countermeasures In Iodt A Iodt Data Sec...mentioning
confidence: 99%
“…In their blockchain system, tag verification method is used to prevent legitimate virtual spaces from being framed, and anonymous services are offered to entities for privacy considerations. The work in [55] satisfies provable security, conditional anonymity, and unforgeability using rigorous security analysis under the assumption of RSA.…”
Section: Security and Privacy Countermeasures In Iodt A Iodt Data Sec...mentioning
confidence: 99%
“…Techniques such as Virtual Private Clouds (VPC), firewalls, and intrusion detection systems have been integral for securing the network perimeters [36,37,38]. However, as cloud deployments become more complex and distributed, the limitations of these networkcentric approaches become evident, especially in the context of inter-cloud communications [39,40,41].…”
Section: Literature Reviewmentioning
confidence: 99%