{"title":"Study of Access Control Techniques on the Blockchain-Enabled Secure\nData Sharing Scheme in Edge Computing","authors":"Neha Mathur, Shweta Sinha, Rajesh Kumar Tyagi, Nishtha Jatana","doi":"10.2174/0126662558276547231213075235","DOIUrl":null,"url":null,"abstract":"\n\nThe pervasive adoption of edge computing is reshaping real-time big\ndata analysis, smart city management, intelligent transportation, and various other domains. Its\nappeal lies in its distributed nature, decentralization, low latency, mobile support, and spatial\nawareness. However, this ubiquity exposes data to security threats, jeopardizing privacy and\nintegrity. Consequently, access control assumes paramount importance in securing data sharing\nwithin edge computing and blockchain technologies.\n\n\n\nThis research addresses this critical issue by conducting a comprehensive study on\naccess control techniques within the context of edge computing and blockchain for secure data\nsharing. Our methodology commences with an exhaustive review of relevant articles, aiming to\nidentify and expound upon gaps in existing research. Subsequently, we perform a meticulous\nanalysis of access control methods, mechanisms, and performance metrics, seeking to establish\na holistic understanding of the landscape.\n\n\n\nThe culmination of this research effort is a multifaceted contribution. We distill insights from a diverse range of access control schemes, shedding light on their nuances and effectiveness. Our analysis extends to evaluating the performance metrics vital for ensuring robust access control. Through this research, we also pinpoint critical research gaps within traditional access control methods, creating a foundation for innovative approaches to address the\nevolving challenges within edge computing and blockchain environments.\n\n\n\nIn conclusion, this research venture paves the way for secure data sharing in edge\ncomputing and blockchain by offering a thorough examination of access control. The findings\nfrom this study are anticipated to guide future developments in access control techniques and\nfacilitate the evolution of secure, privacy-conscious, and efficient data sharing practices in the\ndynamic landscape of digital technology.\n","PeriodicalId":506582,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":"32 10","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Advances in Computer Science and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/0126662558276547231213075235","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The pervasive adoption of edge computing is reshaping real-time big
data analysis, smart city management, intelligent transportation, and various other domains. Its
appeal lies in its distributed nature, decentralization, low latency, mobile support, and spatial
awareness. However, this ubiquity exposes data to security threats, jeopardizing privacy and
integrity. Consequently, access control assumes paramount importance in securing data sharing
within edge computing and blockchain technologies.
This research addresses this critical issue by conducting a comprehensive study on
access control techniques within the context of edge computing and blockchain for secure data
sharing. Our methodology commences with an exhaustive review of relevant articles, aiming to
identify and expound upon gaps in existing research. Subsequently, we perform a meticulous
analysis of access control methods, mechanisms, and performance metrics, seeking to establish
a holistic understanding of the landscape.
The culmination of this research effort is a multifaceted contribution. We distill insights from a diverse range of access control schemes, shedding light on their nuances and effectiveness. Our analysis extends to evaluating the performance metrics vital for ensuring robust access control. Through this research, we also pinpoint critical research gaps within traditional access control methods, creating a foundation for innovative approaches to address the
evolving challenges within edge computing and blockchain environments.
In conclusion, this research venture paves the way for secure data sharing in edge
computing and blockchain by offering a thorough examination of access control. The findings
from this study are anticipated to guide future developments in access control techniques and
facilitate the evolution of secure, privacy-conscious, and efficient data sharing practices in the
dynamic landscape of digital technology.