A review of IoT security and privacy using decentralized blockchain techniques.
Vinay GugueothSunitha SafavatSachin ShettyDanda B. RawatPublished in: Comput. Sci. Rev. (2023)
Keyphrases
- security issues
- rfid systems
- security problems
- security concerns
- statistical databases
- cloud computing
- data security
- information flow control
- data privacy
- security mechanisms
- sensitive data
- preserving privacy
- key management
- security services
- security threats
- security and privacy issues
- information security
- security properties
- security requirements
- privacy requirements
- personal data
- privacy preserving
- security risks
- privacy issues
- privacy concerns
- multi agent
- access control
- biometric template
- security measures
- privacy enhancing
- security administration
- authentication protocol
- security policies
- protection mechanisms
- peer to peer
- confidential information
- secure multiparty computation
- identity management
- network security
- personal information
- management system
- big data
- cooperative
- electronic payment
- privacy preservation
- intrusion detection
- policy enforcement
- trusted third party
- security protocols
- encryption scheme
- homomorphic encryption
- resource constrained
- privacy preserving data mining
- security management