Ding et al., 2022 - Google Patents

Leveraging self-sovereign identity in decentralized data aggregation

Ding et al., 2022

View PDF
Document ID
12242584325433177380
Author
Ding Y
Sato H
Machizawa M
Publication year
Publication venue
2022 Ninth International Conference on Software Defined Systems (SDS)

External Links

Snippet

Data aggregation has been widely implemented as an infrastructure of data-driven systems. However, a centralized data aggregation model requires a set of strong trust assumptions to ensure security and privacy. In recent years, decentralized data aggregation has become …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks

Similar Documents

Publication Publication Date Title
Nagaraju et al. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway
CN112041838A (en) Secure zone interaction
Zhuang et al. BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property
JP2022177828A (en) Method, apparatus and computer program for federated learning with reduced information leakage (federated learning with partitioned and dynamically-shuffled model updates)
KR20230073236A (en) Authentication system and method
Ding et al. Leveraging self-sovereign identity in decentralized data aggregation
JP2023543470A (en) Challenge-response protocol based on physical hard-to-clon functions
Nalinipriya et al. Extensive medical data storage with prominent symmetric algorithms on cloud-a protected framework
Wijesekara A literature review on access control in networking employing blockchain
Antony Saviour et al. IPFS based file storage access control and authentication model for secure data transfer using block chain technique
Thilagavathy et al. A novel framework paradigm for EMR management cloud system authentication using blockchain security network
JP2024515637A (en) Blockchain-Based Systems and Methods
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
JP2023543474A (en) Physically difficult-to-replicate function
Wang et al. A User‐Centered Medical Data Sharing Scheme for Privacy‐Preserving Machine Learning
Riadi et al. Developing data integrity in an electronic health record system using blockchain and interplanetary file system (case study: COVID-19 data)
Nie et al. Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT
Tiwari et al. Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos
JP2023543515A (en) Physically difficult-to-replicate function that stores response values on the blockchain
Farzana et al. Symmetric key-based patient controlled secured electronic health record management protocol
Li Context-aware attribute-based techniques for data security and access control in mobile cloud environment
Faruk et al. Blockchain-based decentralized verifiable credentials: Leveraging smart contracts for privacy-preserving authentication mechanisms to enhance data security in scientific data access
Ding et al. Data aggregation management with self-sovereign identity in decentralized networks
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges
Krishna et al. SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier