Figure 3 - uploaded by Mongetro Goint
Content may be subject to copyright.
Generic architecture of the data control system based on data encryption.

Generic architecture of the data control system based on data encryption.

Source publication
Article
Full-text available
Data access control is a crucial aspect of data management. Actors who want to share data need systems to manage consent in order to decide who can access their data. This guarantees the privacy of data, which is often sensitive. As a secure distributed ledger, the blockchain is widely used today to manage consent for data access. However, a blockc...

Contexts in source publication

Context 1
... these users register according to the rules of the system, before being able to save data, which will be shared on the basis of consent to other users of the system. Once registered, a user can log in and save the data to be shared, as shown in step 1 in Figure 3. When storing data, a symmetric encryption key is generated using AES algorithms and the user data are encrypted before being sent to the off-chain storage, as shown in steps 2 and 3. ...
Context 2
... receiving consent from a data owner, an accessor can make a data subject access request to access data which were shared with them. Consider the example described in Figure 3, where Alice has received Bob's consent to access her data. When Alice tries to consult Bob's data in the off-chain storage, several steps will follow: ...
Context 3
... asks the system to consult Bob's data, as shown in step 9 in Figure 3. 2. ...

Citations

... As a result of the widespread adoption of numerous digital applications in modern times, businesses now depend on various interrelated systems to carry out their daily operations. Networking advancements have allowed for less expensive and more accurate information storage and transmission technologies, but these advantages necessitate more sophisticated Authorization and Authentication methods (Goint et al. 2023). To keep information on internet of things devices safe, access control (AC) is an essential technology. ...
... To adapt and use new access control forms in four emerging areas of cloud computing, IoT, Blockchain, and Software-defined networking. Access control mechanisms are incorporated into a more prominent cybersecurity and network architectural strategy, and the business adoption methods developed for implementing this technology (Goint et al. 2023). ...
Article
Full-text available
Access control systems have become integral to every organization’s defensive arsenal to protect sensitive information and ensure that businesses comply with data privacy regulations. The goal is to block out anyone who shouldn’t be able to get their hands on sensitive information. Authorization solutions like access control help keep sensitive information safe by enforcing strict rules against unauthorized users. This study investigates the difficulties of pushback request response management in P2P electronic health records (EHRs) and suggests a blockchain-enabled EHR for a decentralized P2P healthcare facility. To prevent privacy breaches in the blockchain network and to make information more easily accessible, a new method of authentic access control has been created and implemented. The PRR is an innovative method proposed where security-based mathematical representation and modelling on EHR datasets create a proven security aspect of data privacy. We tested on-chain and off-chain computing modalities by implementing them. Simulations with our implementation show that our suggested pushback request response to medical data significantly lowers the overall peak request. The off-chain computing method offers lower delay time and overhead than the on-chain mode while maintaining the same level of system integrity. In addition, we evaluated the suggested method in terms of its performance and security, and we compared it to an existing hybrid method while taking into account data from the New York State Department of Health.
... Currently, the size of Ethereum's full node has surged from 2.0 terabytes in January 2019 to 15.7 terabytes 2 . The excessive demand for data storage undoubtedly escalates the threshold for full nodes to join the blockchain network, thereby reducing blockchain decentralization [1]. ...
Article
Recently, smart contract, a code script that autonomously runs on blockchains, has facilitated numerous decentralized applications and accelerated the boost of the Web3 ecosystem. However, the current underutilization of smart contracts and a large number of duplicate smart contracts have caused significant challenges to blockchains. Considering the reusability and composability of smart contracts, we can innovatively address these issues, promote diversity for decentralized projects, and increase efficiency for Web3 developers. In this tutorial paper, we first propose a novel service-oriented paradigm: Smart Contracts as a Service (SCaaS), then analyze the feasibility of SCaaS, delve into its application scenarios and finally explore the challenges and limitations and propose the potential solutions accordingly.