Study of Access Control Techniques on the Blockchain-Enabled Secure Data Sharing Scheme in Edge Computing

Neha Mathur, Shweta Sinha, Rajesh Kumar Tyagi, Nishtha Jatana
{"title":"Study of Access Control Techniques on the Blockchain-Enabled Secure\nData Sharing Scheme in Edge Computing","authors":"Neha Mathur, Shweta Sinha, Rajesh Kumar Tyagi, Nishtha Jatana","doi":"10.2174/0126662558276547231213075235","DOIUrl":null,"url":null,"abstract":"\n\nThe pervasive adoption of edge computing is reshaping real-time big\ndata analysis, smart city management, intelligent transportation, and various other domains. Its\nappeal lies in its distributed nature, decentralization, low latency, mobile support, and spatial\nawareness. However, this ubiquity exposes data to security threats, jeopardizing privacy and\nintegrity. Consequently, access control assumes paramount importance in securing data sharing\nwithin edge computing and blockchain technologies.\n\n\n\nThis research addresses this critical issue by conducting a comprehensive study on\naccess control techniques within the context of edge computing and blockchain for secure data\nsharing. Our methodology commences with an exhaustive review of relevant articles, aiming to\nidentify and expound upon gaps in existing research. Subsequently, we perform a meticulous\nanalysis of access control methods, mechanisms, and performance metrics, seeking to establish\na holistic understanding of the landscape.\n\n\n\nThe culmination of this research effort is a multifaceted contribution. We distill insights from a diverse range of access control schemes, shedding light on their nuances and effectiveness. Our analysis extends to evaluating the performance metrics vital for ensuring robust access control. Through this research, we also pinpoint critical research gaps within traditional access control methods, creating a foundation for innovative approaches to address the\nevolving challenges within edge computing and blockchain environments.\n\n\n\nIn conclusion, this research venture paves the way for secure data sharing in edge\ncomputing and blockchain by offering a thorough examination of access control. The findings\nfrom this study are anticipated to guide future developments in access control techniques and\nfacilitate the evolution of secure, privacy-conscious, and efficient data sharing practices in the\ndynamic landscape of digital technology.\n","PeriodicalId":506582,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":"32 10","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Advances in Computer Science and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/0126662558276547231213075235","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The pervasive adoption of edge computing is reshaping real-time big data analysis, smart city management, intelligent transportation, and various other domains. Its appeal lies in its distributed nature, decentralization, low latency, mobile support, and spatial awareness. However, this ubiquity exposes data to security threats, jeopardizing privacy and integrity. Consequently, access control assumes paramount importance in securing data sharing within edge computing and blockchain technologies. This research addresses this critical issue by conducting a comprehensive study on access control techniques within the context of edge computing and blockchain for secure data sharing. Our methodology commences with an exhaustive review of relevant articles, aiming to identify and expound upon gaps in existing research. Subsequently, we perform a meticulous analysis of access control methods, mechanisms, and performance metrics, seeking to establish a holistic understanding of the landscape. The culmination of this research effort is a multifaceted contribution. We distill insights from a diverse range of access control schemes, shedding light on their nuances and effectiveness. Our analysis extends to evaluating the performance metrics vital for ensuring robust access control. Through this research, we also pinpoint critical research gaps within traditional access control methods, creating a foundation for innovative approaches to address the evolving challenges within edge computing and blockchain environments. In conclusion, this research venture paves the way for secure data sharing in edge computing and blockchain by offering a thorough examination of access control. The findings from this study are anticipated to guide future developments in access control techniques and facilitate the evolution of secure, privacy-conscious, and efficient data sharing practices in the dynamic landscape of digital technology.
边缘计算中区块链安全数据共享方案的访问控制技术研究
边缘计算的广泛应用正在重塑实时大数据分析、智能城市管理、智能交通和其他各个领域。边缘计算的吸引力在于其分布式特性、去中心化、低延迟、移动支持和空间感知。然而,这种无处不在的特性会使数据面临安全威胁,危及隐私和完整性。因此,访问控制在确保边缘计算和区块链技术中的数据共享安全方面具有极其重要的意义。本研究针对这一关键问题,对边缘计算和区块链背景下的访问控制技术进行了全面研究,以确保数据共享安全。我们的研究方法首先是对相关文章进行详尽的综述,旨在识别和阐述现有研究中存在的不足。随后,我们对访问控制方法、机制和性能指标进行了细致的分析,力求建立对这一领域的整体认识。我们从多种多样的访问控制方案中提炼出独到见解,揭示出它们的细微差别和有效性。我们的分析还延伸到了对性能指标的评估,这些指标对于确保稳健的访问控制至关重要。通过这项研究,我们还指出了传统访问控制方法中存在的关键研究空白,为采用创新方法应对边缘计算和区块链环境中不断变化的挑战奠定了基础。总之,这项研究通过对访问控制进行深入研究,为边缘计算和区块链中的安全数据共享铺平了道路。本研究的发现预计将指导访问控制技术的未来发展,并促进数字技术动态景观中安全、注重隐私和高效数据共享实践的发展。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信