4.8 Article

Selective Sharing of Outsourced Encrypted Data in Cloud Environments

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 8, 期 18, 页码 14141-14155

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3068226

关键词

Cryptography; Cloud computing; Indexing; Access control; Encryption; Servers; Security; Access control; blockchain; computation offloading; data sharing; selective sharing; smart contract

资金

  1. Sichuan Science and Technology Program [2018HH0102, 2019YFH0014, 2020YFH0030, 2020YFSY0061]

向作者/读者索取更多资源

This article introduces a blockchain-based approach to data access management, which is implemented through smart contracts. Users can be constrained by access policy of data with this method while enhancing their computational power.
Owing to the vast volume of information gathered by computers, data protection and security has become a problem for organizations with the enormous rise in data transmission. Due to many advantages that cloud service providers provide, mainly economic benefits, several data owners outsource their data to cloud repositories. However, data owners do not have full ownership of the data after their data are outsourced. Thus, external data management systems are implemented to manage the data. Several kinds of research refer to the use of encryption techniques to prevent unauthorized access to data. Selective encryption aims at supporting selective and private access to outsourced data. However, the combination of this approach and indexing techniques cause confidentiality violations. In this article, a blockchain-based approach to data access is presented by implementing smart contracts over data access. These executable scripts bind users by stating access policies on the data. Furthermore, we provide a system, where users can offload their computational capabilities due to limitations in their computations. Our systems' computational capabilities outperform that of when users do the computation on their own. The results show a practical approach to data access management using blockchain technology.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据