Ding et al., 2022 - Google Patents
Leveraging self-sovereign identity in decentralized data aggregationDing et al., 2022
View PDF- Document ID
- 12242584325433177380
- Author
- Ding Y
- Sato H
- Machizawa M
- Publication year
- Publication venue
- 2022 Ninth International Conference on Software Defined Systems (SDS)
External Links
Snippet
Data aggregation has been widely implemented as an infrastructure of data-driven systems. However, a centralized data aggregation model requires a set of strong trust assumptions to ensure security and privacy. In recent years, decentralized data aggregation has become …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nagaraju et al. | Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway | |
CN112041838A (en) | Secure zone interaction | |
Zhuang et al. | BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property | |
JP2022177828A (en) | Method, apparatus and computer program for federated learning with reduced information leakage (federated learning with partitioned and dynamically-shuffled model updates) | |
KR20230073236A (en) | Authentication system and method | |
Ding et al. | Leveraging self-sovereign identity in decentralized data aggregation | |
JP2023543470A (en) | Challenge-response protocol based on physical hard-to-clon functions | |
Nalinipriya et al. | Extensive medical data storage with prominent symmetric algorithms on cloud-a protected framework | |
Wijesekara | A literature review on access control in networking employing blockchain | |
Antony Saviour et al. | IPFS based file storage access control and authentication model for secure data transfer using block chain technique | |
Thilagavathy et al. | A novel framework paradigm for EMR management cloud system authentication using blockchain security network | |
JP2024515637A (en) | Blockchain-Based Systems and Methods | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
JP2023543474A (en) | Physically difficult-to-replicate function | |
Wang et al. | A User‐Centered Medical Data Sharing Scheme for Privacy‐Preserving Machine Learning | |
Riadi et al. | Developing data integrity in an electronic health record system using blockchain and interplanetary file system (case study: COVID-19 data) | |
Nie et al. | Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT | |
Tiwari et al. | Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos | |
JP2023543515A (en) | Physically difficult-to-replicate function that stores response values on the blockchain | |
Farzana et al. | Symmetric key-based patient controlled secured electronic health record management protocol | |
Li | Context-aware attribute-based techniques for data security and access control in mobile cloud environment | |
Faruk et al. | Blockchain-based decentralized verifiable credentials: Leveraging smart contracts for privacy-preserving authentication mechanisms to enhance data security in scientific data access | |
Ding et al. | Data aggregation management with self-sovereign identity in decentralized networks | |
Gagged et al. | Improved secure dynamic bit standard technique for a private cloud platform to address security challenges | |
Krishna et al. | SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier |