4.6 Article

Fine-Grained Access Control with User Revocation in Smart Manufacturing

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions

Iqbal H. Sarker et al.

Summary: The Internet of Things (IoT) is a widely used technology that greatly impacts various aspects of our lives. However, cyber-attacks and threats pose significant challenges to smart applications in the IoT environment. Utilizing artificial intelligence, especially machine and deep learning, is crucial in enhancing the security of next-generation IoT systems. This article provides an overview of IoT security intelligence built on machine and deep learning technologies, aiming to intelligently protect IoT devices from a variety of cyber-attacks.

MOBILE NETWORKS & APPLICATIONS (2023)

Article Computer Science, Hardware & Architecture

Blockchain-based cloud storage system with CP-ABE-based access control and revocation process

Pratima Sharma et al.

Summary: The cloud storage system faces various security issues, and to address these issues, we propose a blockchain-based framework with the Ciphertext Policy Attribute-based Encryption algorithm. Our scheme provides a secure environment by registering data owners and attribute authorities using a key generation algorithm, storing public information in a blockchain structure and setting access policies, and implementing fine-grained access control and user revocation using immediate attribute modification.

JOURNAL OF SUPERCOMPUTING (2022)

Article Computer Science, Theory & Methods

Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid

Zhitao Guan et al.

Summary: With the arrival of the Industry 4.0 era, the development of smart cities based on the Internet of Things has reached a new level, with a focus on the security of wireless sensor networks. The Energy Internet, a key component supporting smart city construction, is increasingly emphasizing security and reliability, particularly in the use of blockchain technology for energy trading. However, privacy disclosure remains a challenge for many blockchain-based trading models, leading to the introduction of Ciphertext-Policy Attribute-Based Encryption as a core algorithm to address this issue.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2021)

Review Telecommunications

A Review on the Security of the Internet of Things: Challenges and Solutions

Oludare Isaac Abiodun et al.

Summary: The Internet of Things (IoT) offers transformative possibilities in various aspects of life, but security and privacy issues remain a critical concern. This paper provides a state-of-the-art review of IoT security challenges, technical and legal solutions, and potential solutions to address these challenges. It aims to serve as a knowledgebase for guiding users, organizations, scholars, and researchers in addressing IoT security problems and exploring future research directions.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Computer Science, Artificial Intelligence

A Survey on Data Collection for Machine Learning: A Big Data-AI Integration Perspective

Yuji Roh et al.

Summary: Data collection is a major bottleneck in machine learning due to the lack of labeled data in new applications and the feature generation process in deep learning requiring more labeled data. Research in data collection comes from machine learning, natural language, and computer vision communities, as well as data management due to the importance of handling large amounts of data. The integration of machine learning and data management opens many opportunities for new research in the context of Big Data and Artificial Intelligence (AI) integration.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2021)

Article Computer Science, Information Systems

LBAC: A lightweight blockchain-based access control scheme for the internet of things

Xuanmei Qin et al.

Summary: Attribute-based encryption (ABE) is suitable for cryptographic access control in the big data environment but faces challenges in the IoT. A lightweight decryption scheme based on ABE and blockchain technology is proposed to reduce computing overhead. Users can obtain authorization through blockchain and record access behavior.

INFORMATION SCIENCES (2021)

Article Computer Science, Theory & Methods

A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography

Xiaoxuan Lou et al.

Summary: Side-channel attacks pose a severe threat to the confidentiality of computer applications and systems, with microarchitectural attacks being a popular type. Research on attacks and defenses in cryptographic applications can inspire the discovery of new attacks and propose new defense solutions.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Information Systems

A Survey on Industry 4.0 for the Oil and Gas Industry: Upstream Sector

Olakunle Elijah et al.

Summary: This paper investigates the state-of-the-art efforts of I4.0 technologies in the oil and gas industry, provides a framework for implementation, and discusses future research opportunities. Findings show that I4.0 technologies are currently being explored and deployed in various aspects of the upstream sector, with some technologies like additive manufacturing and virtual reality being least explored.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Design and implementation of automated IoT security testbed

Omnia Abu Waraga et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Artificial Intelligence

MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption

Seyed Morteza Pournaghi et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)

Article Computer Science, Interdisciplinary Applications

Prerequisites and incentives for digital information sharing in Industry 4.0-An international comparison across data types

Julian M. Mueller et al.

COMPUTERS & INDUSTRIAL ENGINEERING (2020)

Proceedings Paper Computer Science, Theory & Methods

Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review

Khalid Albulayhi et al.

2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) (2020)

Article Business

Enabling Attribute Revocation for Fine-Grained Access Control in Blockchain-IoT Systems

Guangsheng Yu et al.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2020)

Article Computer Science, Hardware & Architecture

Toward Data Security in Edge Intelligent IIoT

Yong Yu et al.

IEEE NETWORK (2019)

Article Computer Science, Theory & Methods

Facial Expression Analysis under Partial Occlusion: A Survey

Ligang Zhang et al.

ACM COMPUTING SURVEYS (2018)

Article Computer Science, Information Systems

A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems

Shangping Wang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT

Yunru Zhang et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Proceedings Paper Computer Science, Information Systems

Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains

Elli Androulaki et al.

EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE (2018)

Proceedings Paper Computer Science, Interdisciplinary Applications

Decentralized access control mechanism with temporal dimension based on blockchain

Mayssa Jemel et al.

2017 IEEE 14TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE 2017) (2017)

Review Management

A Review of Cyber-Physical System Research Relevant to the Emerging IT Trends: Industry 4.0, IoT, Big Data, and Cloud Computing

Jin Ho Kim

JOURNAL OF INDUSTRIAL INTEGRATION AND MANAGEMENT-INNOVATION AND ENTREPRENEURSHIP (2017)

Editorial Material Computer Science, Information Systems

Industry 4.0

Heiner Lasi et al.

BUSINESS & INFORMATION SYSTEMS ENGINEERING (2014)

Article Computer Science, Theory & Methods

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Kan Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Theory & Methods

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

Ming Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds

Piotr K. Tysowski et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2013)

Article Computer Science, Theory & Methods

FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks

Shucheng Yu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Article Computer Science, Theory & Methods

Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems

Junbeom Hur et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)