Submit Search
Upload
An interactive Study on secure data sharing in the IOT through Blockchain
•
0 likes
•
30 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i11/IRJET-V9I11138.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
ijtsrd
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
ijtsrd
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
Recommended
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
ijtsrd
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
ijtsrd
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
IRJET - Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
IRJET Journal
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET Journal
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal
Design of access control framework for big data as a service platform
Design of access control framework for big data as a service platform
International Journal of Reconfigurable and Embedded Systems
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
Electronic Health Records (EHR) storage using blockchain
Electronic Health Records (EHR) storage using blockchain
IRJET Journal
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET Journal
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to An interactive Study on secure data sharing in the IOT through Blockchain
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
IRJET - Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
IRJET Journal
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET Journal
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal
Design of access control framework for big data as a service platform
Design of access control framework for big data as a service platform
International Journal of Reconfigurable and Embedded Systems
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
Electronic Health Records (EHR) storage using blockchain
Electronic Health Records (EHR) storage using blockchain
IRJET Journal
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET Journal
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET Journal
Similar to An interactive Study on secure data sharing in the IOT through Blockchain
(20)
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IRJET - Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
Design of access control framework for big data as a service platform
Design of access control framework for big data as a service platform
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Electronic Health Records (EHR) storage using blockchain
Electronic Health Records (EHR) storage using blockchain
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Recently uploaded
(20)
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
An interactive Study on secure data sharing in the IOT through Blockchain
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 647 An interactive Study on secure data sharing in the IOT through Blockchain Shinde Tanmay Balkrushna1, Thorat Swastik Jaysing2, Dahatonde Mangesh Ramesh3, Prof. A. S. Dumbre4 1, 2, 3 Student, Department of Computer Engineering, Jaihind College of Engineering, Pune, Maharashtra, India 4Guide, Department of Computer Engineering, Jaihind College of Engineering, Pune, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - At the same time as the information age is growing exponentially, the amount of data produced by users is growing at an equally rapid pace. It is obvious that the storage space on the desktop device is insufficient. Cloud services are becoming more popular as a means for users to archive, analyze, and administer their data. Peoples' lives are improved in several ways by cloud - based solutions, yet these alternatives also pose significant threats to consumers' confidentiality. As soon as data is uploaded to a cloud server through the internet, the data's owner has no further say over the content and therefore must depend on the server to perform any required computations or processing. As a consequence, cloud data protection has taken on new challenges, such as figuring out how to effectively ensure user privacy and fine-grained access control as well as authorization control. Our approach, which will be detailed in more depth in the subsequent volume of this study, has relied heavily on the findings of these studies. The proposed approach for proxy re-encryption secures the Internet of Medical Things data on a public cloud through the use of Blockchain distributed framework. This approach will be further elaborated in the upcoming editions of this research. Key Words: Internet of Medical Things, Public Cloud, Medical Health Records, Cryptography, Search over encrypted data. 1. INTRODUCTION Users' information provided is expanding at an exponential rate along with the expansion of the age of information. It's clear that the user's computer's storage device isn't enough. Users are increasingly turning to cloud services for data storage, processing, and management. Although cloud solutions improve users' lives in many different ways, there are also serious risks to their privacy and security. Once data is sent to the cloud acrossa network, the data holder loses control on the information and must rely on the cloud server to do any necessary calculations or processing. As a result, new difficulties have emerged in cloud data security, such as how to guarantee the confidentiality of information and the efficacy of user fine - grained access control and permission management. In contrast, the majority of the currently available cloud storage solutions are centralized, with data management handled by a single authority. Both the transmission and calculation costs associated with this method are substantial. Therefore, it is importanttoprovide a user-friendly, secure, and effective cloud storage sharing solution. Cloud ciphertext authorization technique is presented as a solution to the issue of data privacy protection. The privacy is maintained by encrypting the information key as well as maintaining the encrypted message in the cloud. Additionally, the data owner controls the user's key and hence the access privileges. Conventional research proposes a participation encryption methodology that takes the roleintoaccountasa decryption criterion. It was suggested to use attribute encryption as the basis for a composite cloud re-encryption information sharing framework. This strategy not only facilitates versatile ciphertextidentitymanagementbutthen also simplifies management for data owners. An adaptive and intelligent proxy re-encryption technique is devised. Using this method, the data owner may provideaccesstothe plaintext message by authorizing the designated user to decode any re encrypted ciphertext using the user's component. Individuality, certifications, and environments were subsequently suggested as important components ina proxy re-encryption system. Confidential information is adequately ensured by the aforementioned methods; yet, users are hampered in their ability to swiftly locate the data and information they want throughout the data exchange operation. A characteristic proxy re-encryption system using cryptographically searchable terms is proposed to enhance access efficiency during information sharing. However, a practical ciphertext decryption technique cannot be designed using this method. The traditional research solves this through a key-based attribute proxy re-encryption technique to facilitate keyword retrieval, and demonstrated the system's viability inside a randomly generated oracle model. Unfortunately, the scheme's computational complexity cost makes it impractical for widespread practical application, according to performance studies.The majority of the following methods also include outsourcing the administration of user data to remote cloud storage facilities. In the event of an assault on the administrators of
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 648 third-party cloud services, sensitive customer data may be compromised or perhaps even deleted forever. The development of Blockchain technologies has resulted in a decentralized, non-tamper able, unforgeable, and communally administered system of administration. What we possess with Blockchain is simply a distributed database. Also, Bitcoin's core technology is a series of cryptographically created data blocks. Bitcoin blockchain transactions are grouped together in blocks. Data needed to ensure the integrity of the previous block's data and create the following one. To begin, decentralization is a key feature of the blockchain. Distributed ledger technology operates independently of centralized authorities and physical servers. Due to decentralized ledgers and databases, the Blockchain operates autonomously. Data self-verification, transmission, and administration are all implemented by networks. The Blockchain's primary value and main attraction is its decentralized nature. On top of all that, the Blockchain is decentralized, accessible, private, and confidential. Jingwei Liu [1] proposes a consortia blockchain- based system for exchanging medical records that protects patient confidentiality.Tosafeguard patients'confidentiality, we offer a conditionally anonymous tracking technique that may identify bad actors when unlawful activity is detected. When dealingwith enormous amountsofhealthinformation, the on chain off-chain warehouse architecture may significantly decrease blockchain'smemoryload.Asidefrom that, the enhanced proxy re-encryption strategy may withstand a collaboration assault that involves a third-party cloud as well as the authorized data requester. This means that the plan is more secure and faster than similar projects. It is the authors' intention to employ smart contracts as the basis for a tool to track down rogue users. [2] Xiaoyu Zhang proposes two asynchronously deep learning techniques that are secure and don't interfere with users' confidentiality. Together,several usersmaytrain the same model in concurrently and asynchronously whilst maintaining the secrecy of their input data and the information contained within it. Depending on proxy re- encryption, DeepPAR allows for guidelines outlined secrecy to be maintained while still protecting the privacy of individual participants' inputs. In addition, DeepDPA's lightweight dynamic participation notification is only affected by its immediate two neighbors thanks to thegroup key administration system on which it is built. Furthermore, DeepDPA provides retroactive anonymity in adaptive privacy-preserving machine learning. This literature review paper divides section 2 into an assessment of prior work in the form of a review of literature, and section 3 concludes with recommendations for future research. 2. RELATED WORKS In order to offer effective and private security controls for media distribution in V-NDN,ShunrongJiang [3] reveals the security problems when deploying NDN to VANETs and proposes appropriate solutions (ESAC). To begin, researchers construct a proxy re-encryption method that works in the absence of a trustworthy sourceto provide identity management,revocation,andupdating.Researchers use pseudonyms and an identifier-based signature to solve the problem of anonymous authentication and validity checking. To assure NDN's usefulness in VANETs, researchers provide an incentive technique using a hashed certificate. According to the results of the security study, ESAC is capable of providing the necessary level of security for use in V-NDN. The simulated outcomes further demonstrate that the suggested secure strategy has a negligible impact on the efficiency of the network. To ensure the immutability, auditability, trustworthiness, and security of log events pertaining to access/permissions, Ammar Ayman Battah [4] presented a completely decentralized blockchain-based multi-party authorization (MPA) system. Proxy re-encryption with multiple oracles was suggested to provide accessibility to protected shared data on a community and decentralized storage network like IPFS. The researchers designed the suggested smart contracts with reputational algorithmsthat assign oracles scores based on their record of malevolent and benign actions. To construct the procedures, variables, and trigger events, the researchers used smart contracts on the Ethereum platform. The smart contract implementation is published on GitHub and is flexible enoughto beusedwith little adjustments for use on either permissionless or anonymous public blockchains, depending on the requirements of certainsectors.The researchersdetailed the development, evaluation, and verification of the suggested algorithms as well as the elements of the system. In order to overcome the drawback of conventional intelligent transportation's centralized data administration and to focus on ensuring the anonymity and safety in the data engagement process, Di Wang [5] proposed a unique strategy of secure information posting and customized service providers for transportation engineeringpredicated on the consortium blockchain. By splitting the key through into attribute key and also the search key, the suggested policy attribute - based proxy re-encryptionmethodenables both word search as well as proxy re-encryption, as well as safe data exchange and the prevention of OBU privacy information leaks. Afterwards when, thesmartcontractmay be used by the hospitality industry to give accurate and personalized services like insurance premiums and auto repairs. This approach provides clear benefits in terms of confidentiality, computing cost, communication cost, and latency, as shown by the security study and performance assessment.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 649 In order to safely store and transmit PHRs to the appropriate parties in the cloud, Mazhar Ali [6] devised an approach. This approach ensures that protected health information (PHI) is kept private and secure by enforcing granular, patient-centric controls over who has access to what parts of PHI. By implementing a fine-grained accessibility control technique, the authorsensurethat none of the legitimate network operators may see protected health information (PHI) that they have been not permitted to view. Owners of protected health records (PHRs) secure their data and keep it on the cloud; only those with appropriate re-encryption keys supplied by such a semi- trusted proxy may access thePHRs.Users'privateandpublic keys pairs inside the system will be generated and stored by the semi-trusted proxy. By contrast to safeguarding patient privacy and ensuring PHRs are managed in a patient-centric manner, the approach also manages both forward backwards access controls for individuals who are leaving and entering the system. Utilizing proxy re-encryption technologies and Blockchains, Yanfang Lei [7] creates a system for updating authorization to retrieve data in the cloud, with capability for search retrieval. At the outset, the reader is provided with some introductory material tothesituation.Second, the system architecture and methodology of the approach are outlined in great depth. The scheme's accuracy and security are next analyzed. The scheme's effectiveness is then analyzed, and the algorithm's efficacy is tested using numerical trials. One positive aspect of this technique isthat it uses ciphertext segregation and preservation to significantly lower the possibility of informational cooperation. However, if the major parameters of the proxy re-encryption are really only modified whenever the access permissions are modified, then the objective of a deterministic authorization upgrade is best served. The Web 3.0 structure was created by Koushik Bhargav Muthe [8]. Humans, as a species, have the potential to unite as one, linked organism, powered bya decentralized Internet. This study analyzed the existing state of the web and recommended a mechanism for its full decentralization. The suggested Decentranet protocol must be employed for experimental purposes since it isstill intheproof-of-concept phase. The limitations of the present Network infrastructure make scalability a manufacturing problem. Motivating the intermediaries to take an interest in the network is an important step in expanding the system's design. Ethereum 1.0, the foundation of the present protocol is focused, has a Proof of Work-based agreement method,whichisn'toptimal for truly decentralized systems. To ensure that third party candidates (first responders) may have immediate or subsequent accessibility to movies captured by drones without jeopardizing the confidentiality of the material, Khaled Rabieh [9] presented a privacy-preserving yet effective sharing method. Users' privacy is protected when watching these films since they are encrypted and stored in the cloud. For reasons of data security, emergency rescuers are never given a copy of the initial private key being used encode drone footage. Alternatively, a proxyre-encryptionisused to facilitate re-encryption through the CC upon that cloud server. To initiate the re-encryption procedure, a new key is produced and uploaded to the cloud. Authors used ns-3 simulator as well as OpenCV framework to create working model. Conditional identity-based broadcasting proxy re- encryption was described by Chunpeng Ge [10], a practical implementation was presented under this specification,and it was shown that our method is CPA reliable in the randomized oracle scenario. Comparing properties and effectiveness also shows that their suggested approach is economical and usable in the real world.Inaddition,theRIB- BPRE method can elegantly handlekeyrevocationfora data- sensitive platform in a cloud - based environment, such as a volunteer-based genomic research process. Although this research has addressed the issue of revoked keys for data sharing, it has also inspired some intriguing open issues, such as building a RIB-BPRE strategy requiring random oracles and figuring out ways to enablemoreexpressiveness on identification. To get a (single-hop directional)semanticproxykey re-encapsulation technique out of a linear predicate key abstraction strategy, Yi-Fan Tseng [11] presents a unique general construction. It is possible to achieve a (single-hop unidirectional) conditional proxy re-encryption process by integrating with a trustworthysymmetrickeyencryption.As a consequence, the result offers a novel approachtobuilding a semantic proxy re-encryption that works with any predicate functions, addressing the issue that the existing predicate proxy re-encryption exclusively works with the kernel function predicate feature. In the context of substantial data, Kun Wang [12] implements multi-sharing, anonymous, and CCA-secure transmission of data. Inaddition,researcherssuggesta novel concept termed pre for usage in the proxy re-encryption scheme that might guarantee that only individualsforwhom the credentials have been confirmed are authorized to get the information and provide effectivesecurityfortheprivate variables. User demands are considerably reduced by the pre-authentication feature. Researchers also show that the pre-authentication procedure improves the system's integrity by keeping users' information, credentials, and other properties safe. Authors believe their idea of pre- authentication will be the first of its kind in this context.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 650 Fig. System Overview Diagram 3. CONCLUSION Proxy re-encryption may prohibit a proxy that cannot be entirely authorized from gaining any insight into the actual plaintext whilst re-encrypting a ciphertext. Proxy re-encryption has seen widespread application due to the flexibility it affords. Unsurprisingly, the computational complexity overhead renders it impossible for extensive operational implementation, as per performance benchmarks. The bulk of the following strategies also require delegating the management of user information to remote cloud infrastructures. In the case of an attack on the operators of third-party cloud storage, critical client data may be jeopardized or possibly even wiped permanently. Diverse academics came up with numerous approaches to deal with the security breaches that spring up in various application contexts, and they have all been properly assessed to help us arrive at our strategy. Protecting IoMT data in the cloud using a distributed ledgerlikeBlockchainis the goal of the suggested proxy re-encryption method. In subsequent iterations of this study, this method will be developed in more depth. REFERENCES [1] J. Liu, T. Liang, R. Sun, X. Du and M. Guizani, "A Privacy- Preserving Medical Data Sharing Scheme Based on Consortium Blockchain," GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 2020, pp. 1-6, doi: 10.1109/GLOBECOM42002.2020.9348251. [2] X. Zhang, X. Chen, J. K. Liu and Y. Xiang, "DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT," in IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 2081-2090, March 2020, doi: 10.1109/TII.2019.2941244. [3] S. Jiang, J. Liu, L. Wang, Y. Zhou and Y. Fang, "ESAC: An Efficient and Secure Access Control SchemeinVehicular Named Data Networking," in IEEE Transactions on Vehicular Technology, vol. 69, no. 9, pp. 10252-10263, Sept. 2020, doi: 10.1109/TVT.2020.3004459. [4] A. A. Battah, M. M. Madine, H. Alzaabi, I. Yaqoob, K. Salah and R. Jayaraman, "Blockchain-Based Multi-Party Authorization for Accessing IPFS Encrypted Data," in IEEE Access, vol. 8, pp. 196813-196825, 2020, doi: 10.1109/ACCESS.2020.3034260. [5] D. Wang and X. Zhang, "Secure Data Sharing and Customized Services for Intelligent Transportation Based on a Consortium Blockchain," in IEEE Access, vol. 8, pp. 56045-56059, 2020, doi: 10.1109/ACCESS.2020.2981945. [6] M. Ali, A. Abbas, M. U. S. Khan and S. U. Khan, "SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud," in IEEE Transactions on Cloud Computing, vol. 9, no. 1, pp. 347-359, 1 Jan.-March2021, doi: 10.1109/TCC.2018.2854790. [7] Y. Lei, Z. Jia, Y. Yang, Y. Cheng and J. Fu, "A Cloud Data Access Authorization Update Scheme Based on Blockchain," 2020 3rd International Conference on Smart BlockChain (SmartBlock), 2020, pp. 33-38, doi: 10.1109/SmartBlock52591.2020.00014. [8] K. B. Muthe, T. S. T. Vemuru, K. Sharma and N. S. Mohammad, "Decentranet - An Ethereum, Proxy Re- Encryption and IPFS Based Decentralized Internet," 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2020, pp. 1-5, doi: 10.1109/ICCCNT49239.2020.9225483. [9] K. Rabieh, S. Mercan, K. Akkaya, V. Baboolal and R. S. Aygun, "Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using ProxyRe- encryption," 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI), 2020, pp. 45-52, doi: 10.1109/IRI49571.2020.00015. [10] C. Ge, Z. Liu, J. Xia and L. Fang, "Revocable Identity- Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds," in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1214-1226, 1 May- June 2021, doi: 10.1109/TDSC.2019.2899300. [11] Y. -F. Tseng, Z. -Y. Liu and R. Tso, "A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism," 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 2020, pp. 1-8, doi: 10.1109/AsiaJCIS50894.2020.00013. [12] K. Wang, J. Yu, X. Liu and S. Guo, "A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context," in IEEE Transactions on Big Data, vol. 7, no. 4, pp. 657- 667, 1 Oct. 2021, doi: 10.1109/TBDATA.2017.2702176.
Download now