JOURNAL ARTICLE

Blockchain enabled Security Framework for handling Security and privacy challenges in Smart cities

E. Divya

Year: 2021 Journal:   Türk bilgisayar ve matematik eğitimi dergisi Vol: 12 (10)   Publisher: Karadeniz Technical University

Abstract

One of the intriguing secure applications with regards to the keen city is communicating data to authentic clients, alluringly with client protection. Broadcast encryption has been considered as a helpful device to ensure the information security and give information access control. Most works in broadcast encryption are about the information security, while less consideration is paid to the information access control and the character protection. In this paper, in view of transmission encryption, we present a plan called Fully Privacy-Preserving and Revocable Identity-Based Broadcast Encryption, which protects the information security and the personality security of the collector just as the denied client. The information can be safely ensured and just the approved client can get to the information. The repudiation cycle doesn't uncover any data about the information substance and the collector personality. The general population adapts nothing about the recipient character and the repudiated client personality. These properties lead to pleasant applications in the shrewd city where character protection is attractive. The security of our plan is end up being semantically secure in the arbitrary prophet model

Keywords:
Computer security Encryption Computer science Internet privacy Asset (computer security) Information sensitivity Personally identifiable information Cloud computing security Identity (music) Cloud computing

Metrics

1
Cited By
0.14
FWCI (Field Weighted Citation Impact)
27
Refs
0.53
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence
Blockchain Technology Applications and Security
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.