4.5 Article

Blockchain-empowered cloud architecture based on secret sharing for smart city

出版社

ELSEVIER
DOI: 10.1016/j.jisa.2020.102686

关键词

Blockchain; Cloud computing; Secret sharing; Security; Smart city

资金

  1. National Research Foundation of Korea (NRF) - Korea government [NRF-2019R1A2B5B01070416]

向作者/读者索取更多资源

Recent advances in information technology have led to the development of smart city technology, which offers various applications for citizens through a large IoT-based network. However, this can also pose security and privacy issues. This study addresses these issues by using blockchain and Secret Sharing to improve data integrity and security, designing a distributed system with faster transaction speed and data storage efficiency compared to existing research.
Recent advances in information technology go beyond the simple convenience offered to individuals, leading to smart city technology that provides urban facilities and better quality of life. Smart City is a heterogeneous system consisting of a large IoT-based network, offering various applications for citizens by collecting and analyzing real-time information. As intelligent, efficient digital systems, smart cities manage data by digitalizing all information. Despite the potential benefits of smart cities for citizen convenience, this digital information service can give rise to security and privacy issues. In particular, the challenge of relying on the Cloud Service Provider (CSP) is that it is difficult for individuals to manage large amounts of data in smart city environments. In this paper, we study blockchain and Secret Sharing to address personal information protection issues in external cloud services and improve data integrity and security by designing a distributed system. CSPs are connected in a blockchain to validate user data integrity and provide easy data access through Transaction. CSP uses the blockchain to store distributed users' information safely through the Secret Sharing algorithm as a distributed system with improved security of existing centralized systems. The proposed approach demonstrates improved security and privacy through security analysis and has faster transaction speed and data storage efficiency than existing research.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据