2019
DOI: 10.21742/ijria.2019.7.2.02
|View full text |Cite
|
Sign up to set email alerts
|

Using IDoT Attributes for Secure Power Data Sharing Based on Blockchain Dynamic Access Control

Abstract: Data collected through devices are stored in a single cloud and processed in Internet of Things (IoT) environment. Because IoT has a limitation of computing and storage space of devices. In order to solve the problem of reliability of centralized system, previous researches have been carried out to link blockchain to the Internet. However, user privacy protection is an indispensable factor for sharing data through the Internet. However, these limitations are not overcome. In this paper, the access control of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
(13 reference statements)
0
2
0
Order By: Relevance
“…It is essentially an inductive process. The purpose of data analysis in customer relationship management is to discover hidden information in the data [13][14][15]. With the changing business needs of enterprises, the continuous updating of customer data, and the optimization of technology development systems, it is necessary to constantly adjust the established data model and to repeatedly carry out data mining to adapt to the requirements of enterprises [16] [17].…”
Section: Application Process Of Customer Relationship Management Undementioning
confidence: 99%
“…It is essentially an inductive process. The purpose of data analysis in customer relationship management is to discover hidden information in the data [13][14][15]. With the changing business needs of enterprises, the continuous updating of customer data, and the optimization of technology development systems, it is necessary to constantly adjust the established data model and to repeatedly carry out data mining to adapt to the requirements of enterprises [16] [17].…”
Section: Application Process Of Customer Relationship Management Undementioning
confidence: 99%
“…By using the current technology of this application, the entire processing of ticket booking will be considered to the entire block, and the ticket has been added to the ticket booking block chain. As a result, the ticket will be processed securely as a standard ticket to the customer and for a specific route and the entire train network [17][18][19][20].…”
Section: Block Chain Technologiesmentioning
confidence: 99%