Article
Engineering, Multidisciplinary
Guangyu Peng, Aiqing Zhang, Xiaodong Lin
Summary: This study proposes a privacy-preserving EMR sharing architecture based on blockchain technology to address the issue of privacy leakage in cloud-based storage. Through a dual-blockchain system and identity-based tripartite authentication key agreement scheme, patients have fine-grained control over their EMR access, ensuring trust between healthcare institutions and supervising doctors' identities. The results of the study demonstrate that the proposed protocol is secure, efficient, and suitable for the EMR sharing of comatose patients.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Article
Social Sciences, Interdisciplinary
Yang Liu, Xiangyu Li, Yan Ma
Summary: With the rapid development of digital economics, a large number of data have been accumulated in the supply chain system, resulting in data islands. To address this issue, this study proposes a blockchain-based fine-grained access control framework, which enhances the security and efficiency of data sharing by assigning different attribute keywords to different types of users.
Article
Computer Science, Information Systems
Hancheng Gao, Haiping Huang, Lingyan Xue, Fu Xiao, Qi Li
Summary: The integration of Internet of Things (IoT) with cloud-edge computing in cyber-physical systems has revolutionized the management of electronic health records (EHRs) in healthcare enterprises. This article proposes a searchable encryption (SE) scheme with fine-grained access control for cloud-based EHRs sharing assisted by blockchain, ensuring data integrity and transaction fairness. The scheme transfers computation to edge servers, allowing users to control access to their EHRs. Security analysis shows resistance to adaptive chosen keyword attacks (CKAs) and performance analysis confirms its efficiency for smart healthcare.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Artificial Intelligence
Farooq Ahmed, Lingbo Wei, Yukun Niu, Tianyu Zhao, Wei Zhang, Dong Zhang, Wenxiang Dong
Summary: This research proposes a video sharing scheme based on blockchain, ensuring the security and reliability of shared videos through the use of smart contracts and cryptographic primitives. The application of blockchain technology effectively prevents content manipulation and forgery, allowing users to manage their own data and make instant payments.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Computer Science, Information Systems
Tianshuai Zhang, Leyou Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha
Summary: This study introduces a hierarchical access control redactable blockchain model for data sharing through attribute-based encryption and a chameleon hash to address the limitation of deleting malicious data in an untrusted environment. The proposed scheme ensures data owners' full control over rights and regulates the behavior of modifiers.
IEEE SYSTEMS JOURNAL
(2023)
Article
Computer Science, Artificial Intelligence
Ming Li, Mingxing Li, Arjun Rachana Harish, George Q. Huang
Summary: This paper proposes a blockchain-based fine-grained digital twin sharing framework to accelerate the popularization and iteration of digital twins in social manufacturing. The framework decomposes complex digital twin instances into small granules and utilizes blockchain for decentralized registering, authorizing, and extracting. The sharing incentive mechanism is also explored to ensure feasibility and sustainability. Experimental results demonstrate the good performance of the sharing mechanism in terms of throughput, latency, and network bandwidth.
ADVANCED ENGINEERING INFORMATICS
(2023)
Article
Computer Science, Information Systems
Somchart Fugkeaw, Leon Wirz, Lyhour Hak
Summary: In this paper, a access control scheme called LightMED is proposed to provide secure, fine-grained, and scalable EMR sharing in a cloud-based environment integrated with fog computing, CP-ABE, and blockchain technology. A secure IoT data transmission and aggregation method based on lightweight encryption and digital signing is introduced. Additionally, a novel lightweight policy update algorithm is proposed to enable effective management of EMR policies. Experimental results show that the scheme outperforms existing works in terms of processing cost and efficiency.
Article
Computer Science, Information Systems
Durbadal Chattaraj, Basudeb Bera, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park
Summary: This article proposes a new private blockchain-enabled fine-grained access control mechanism for the SDN environment, incorporating attribute-based encryption and certificate-based access control protocol. The proposed solution can resist several well-known security threats and alleviate system-level inconveniences.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Electrical & Electronic
Aiqing Zhang, Xiao Wang, Xinrong Ye, Xiaojuan Xie
Summary: This paper presents a lightweight and fine-grained access control method for EMR sharing, by combining fog and cloud using symmetric encryption algorithm and attribute-based encryption algorithm.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
(2021)
Article
Computer Science, Information Systems
Zuobin Ying, Wenjie Jiang, Ximeng Liu, Shengmin Xu, Robert H. Deng
Summary: Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a powerful encryption paradigm for data confidentiality in cloud data sharing. However, the access policy in traditional CP-ABE reveals sensitive information. To address this, this article proposes a novel CP-ABE system called Privacy-Preserving Policy Updating ABE (3PU-ABE), which utilizes a security-enhanced Attribute Cuckoo Filter (se-ACF) to hide the access policy and enable policy updating.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Jian Chang, Junpei Ni, Jiang Xiao, Xiaohai Dai, Hai Jin
Summary: This article emphasizes the importance of data sharing in a multichain environment and proposes SynergyChain, a multichain framework that enables reliable data sharing with controllable data access. By aggregating and reorganizing data from multiple blockchains, SynergyChain ensures data reliability while providing automated and credible access control through smart contracts.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Yong Zhu, Xiao Wu, Zhihui Hu
Summary: Traditional centralized and distributed access control face different challenges, while the Smart Contract-based Access Control (SCAC) method combines the advantages of edge computing and blockchain to achieve fine-grained access control, considering both security and efficiency.
Article
Computer Science, Information Systems
Meiyan Xiao, Qiong Huang, Ying Miao, Shunpeng Li, Willy Susilo
Summary: This article proposes a fine-grained access control system based on Key-Policy Attribute-Based Encryption scheme and blockchain to meet the needs of data sharing services, and provides security analysis and system implementation.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Lejun Zhang, Yanfei Zou, Muhammad Hassam Yousuf, Weizheng Wang, Zilong Jin, Yansen Su, Kim Seokhoon
Summary: In the age of big data, achieving data access control and implementing user permission revocation in the blockchain environment has become an urgent problem. This paper proposes a novel blockchain-based data sharing scheme that provides fine-grained access control and permission revocation, using encryption technologies to ensure data security.
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
(2022)
Article
Computer Science, Information Systems
Ernesto Gomez-Marin, Davide Martintoni, Valerio Senni, Encarnacion Castillo, Luis Parrilla
Summary: This paper proposes a solution for secure data sharing among companies in Industry 4.0, combining attribute-based encryption, blockchain, hardware security modules, and the Interplanetary File System. The solution also includes OpenID for dynamic client identification and a new method for user revocation in attribute-based encryption. Evaluation results demonstrate that the solution can scale up to 2,000,000 clients while maintaining security guarantees.