-
21
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Published 2024-01-01Get full text
Article -
22
Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence
Published 2023-12-01Get full text
Article -
23
Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key
Published 2018-05-01Subjects: Get full text
Article -
24
Cross-chain medical data sharing scheme based on elliptic curve signcryption
Published 2024-12-01“…To address the requester identity authentication and shared data security in cross-chain medical data sharing, a cross- chain medical data sharing scheme based on elliptic curve signcryption was devised in this article. …”
Get full text
Article -
25
Research on endogenous security data sharing mechanism of F-RAN for 6G
Published 2021-01-01Subjects: “…data sharing…”
Get full text
Article -
26
Design of Telecom Operators' Network Data Sharing Platform Based on Hadoop+MPP Architecture
Published 2014-04-01Subjects: Get full text
Article -
27
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
Published 2021-10-01“…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
Get full text
Article -
28
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Published 2022-06-01Subjects: Get full text
Article -
29
A Survey on Energy Harvesting and Integrated Data Sharing in Wireless Body Area Networks
Published 2015-10-01“…In this attempt, we focus mostly on energy acquisition, data integration and data sharing, and collaboration of WBANs, from the viewpoint of energy harvesting development, the social network and smartphone application in WBANs, and the integration of WBANs and cloud system networks computing to analyze related issues of WBANs. …”
Get full text
Article -
30
6G oriented blockchain based Internet of things data sharing and storage mechanism
Published 2020-10-01Subjects: Get full text
Article -
31
Data sharing scheme supporting secure outsourced computation in wireless body area network
Published 2017-04-01“…How to effectively protect the security of data sharing in WBAN was a key problem to be solved urgently.The traditional CP-ABE mechanism had a 〝one to many〝 data security communication function which was suitable for access control in WBAN,but it had high computational complexity and did not support attribute revocation.Fully considering of limitations on computation and storage of sensor nodes and dynamic user attribute in WBAN,a CP-ABE scheme was proposed which was provably secure against CPA under the standard model and supported attributes revocation,outsourced encryption and decryption.Compared with the proposed schemes,the computation burden on senor nodes is greatly reduced and the user's attribution can be revoked immediately and fine grained while meeting the demand of its security in the proposed scheme.…”
Get full text
Article -
32
Research on safety supervision data sharing of railway construction projects based on edge computing
Published 2020-06-01“…Information security monitoring system is widely used in railway construction projects,but the existing safety supervision model has problems such as high server load,heavy network bandwidth pressure,monitoring data can’t be effectively shared,key monitoring data may be tampered,and security accident responsibility is difficult to determine.A credible sharing model of safety supervision data for railway construction projects based on edge computing was proposed.On one hand,the construction of a safety monitoring edge computing framework for construction projects was constructed,and the data processing flow of edge nodes was described; on the other hand,a trusted data sharing framework based on blockchain was established,and a safety supervision data sharing process was designed and trusted sharing data was implemented through smart contracts.The proposed solution combined with edge computing and blockchain technology,which not only could strengthen the safety supervision of railway construction projects by industry authorities,but also provide new opportunities for stakeholders to share safety monitoring data in real time.…”
Get full text
Article -
33
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology
Published 2024-12-01Subjects: Get full text
Article -
34
Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
Published 2023-05-01Subjects: Get full text
Article -
35
Deepening the data divide: Marginalised perspectives and non-profit priorities in Australian data sharing reforms
Published 2025-03-01“…This paper investigates open public data and data sharing reforms in Australia (2018–2022) and their potential role in deepening the ‘data divide’. …”
Get full text
Article -
36
Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain
Published 2020-08-01Subjects: Get full text
Article -
37
Defend Against Property Inference Attack for Flight Operations Data Sharing in FedMeta Framework
Published 2025-01-01“…Our contribution lies in the development of a secure and efficient data-sharing solution for flight operations data, which has the potential to revolutionize the aviation industry.…”
Get full text
Article -
38
Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture
Published 2023-03-01Subjects: Get full text
Article -
39
Research on key technologies of safety monitoring data sharing for railway engineering construction based on blockchain
Published 2021-08-01“…In order to solve the problems that the monitoring data was easy to be tampered with in the process of railway engineering construction safety monitoring, and the authenticity of the data might be questioned during the accountability of accidents, a blockchain-based railway engineering construction safety monitoring data sharing model was proposed.The characteristics of automatic execution of smart contracts ensured the transparency of the process of monitoring data on the chain.In the PBFT algorithm, there was a problem that the Byzantine nodes and the normal nodes were selected as the master node with the same probability, a reputation-based practical Byzantine fault tolerance algorithm was proposed.Streaming data on the chain might cause network congestion, which simplified the consensus protocol and reduced the time complexity from O(n<sup>2</sup>) to O(n).A comparative experiment was conducted using Hyperledger Caliper to prove that the delay of the improved algorithm is lower than PBFT algorithm, and the throughput is higher than PBFT algorithm.A quantitative analysis of the possibility of attack and the probability of successful attack was carried out, and it was determined that the smart contract provides tamper-proof modification for the monitoring data on the chain.Comparative analysis proves that the proposed blockchain-based railway engineering construction safety monitoring data sharing model is good than other models in terms of consensus efficiency, TPS and block generation speed.…”
Get full text
Article -
40
D2D data sharing partner selection mechanism based on privacy degree and stability degree
Published 2019-12-01Subjects: “…D2D data sharing…”
Get full text
Article