Smart City Gnosys

Smart city article details

Title Study Of Access Control Techniques On The Blockchain-Enabled Secure Data Sharing Scheme In Edge Computing
ID_Doc 53324
Authors Mathur N.; Sinha S.; Tyagi R.K.; Jatana N.
Year 2024
Published Recent Advances in Computer Science and Communications, 17, 8
DOI http://dx.doi.org/10.2174/0126662558276547231213075235
Abstract Background: The pervasive adoption of edge computing is reshaping real-time big data analysis, smart city management, intelligent transportation, and various other domains. Its appeal lies in its distributed nature, decentralization, low latency, mobile support, and spatial awareness. However, this ubiquity exposes data to security threats, jeopardizing privacy and integrity. Consequently, access control assumes paramount importance in securing data sharing within edge computing and blockchain technologies. Methods: This research addresses this critical issue by conducting a comprehensive study on access control techniques within the context of edge computing and blockchain for secure data sharing. Our methodology commences with an exhaustive review of relevant articles, aiming to identify and expound upon gaps in existing research. Subsequently, we perform a meticulous analysis of access control methods, mechanisms, and performance metrics, seeking to establish a holistic understanding of the landscape. Results: The culmination of this research effort is a multifaceted contribution. We distill insights from a diverse range of access control schemes, shedding light on their nuances and effectiveness. Our analysis extends to evaluating the performance metrics vital for ensuring robust access control. Through this research, we also pinpoint critical research gaps within traditional access control methods, creating a foundation for innovative approaches to address the evolving challenges within edge computing and blockchain environments. Conclusion: In conclusion, this research venture paves the way for secure data sharing in edge computing and blockchain by offering a thorough examination of access control. The findings from this study are anticipated to guide future developments in access control techniques and facilitate the evolution of secure, privacy-conscious, and efficient data sharing practices in the dynamic landscape of digital technology. © 2024 Bentham Science Publishers.
Author Keywords access control; blockchain; Edge computing; privacy; security; wireless communication


Similar Articles


Id Similarity Authors Title Published
13511 View0.89Li S.; Li R.; Zhang Y.; Huang Y.Cbi: A Data Access Control System Based On Cloud And Blockchain IntegrationProceedings - 2020 IEEE 22nd International Conference on High Performance Computing and Communications, IEEE 18th International Conference on Smart City and IEEE 6th International Conference on Data Science and Systems, HPCC-SmartCity-DSS 2020 (2020)
12354 View0.883Alam T.Blockchain And Big Data-Based Access Control For Communication Among Iot Devices In Smart CitiesWireless Personal Communications, 132, 1 (2023)
12358 View0.88Khan, Z; Abbasi, AG; Pervez, ZBlockchain And Edge Computing-Based Architecture For Participatory Smart City ApplicationsCONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 32, 12 (2020)
37155 View0.877Matta V.D.R.; Maheswara Rao V.V.R.; Battula V.S.J.; Addagatla M.B.Mitigating Security Challenges In Edge Computing: Attacks, Defence Strategies, And Algorithms3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025 (2025)
11719 View0.872Sebbar A.; Boulmalf M.Bcds-Sdn: Privacy And Trusted Data Sharing Using Blockchain Based On A Software-Defined Network'S Edge Computing ArchitectureIEEE International Conference on Communications, 2023-May (2023)
12461 View0.871Badidi E.; Sabir E.Blockchain For Secure Data Sharing In Fog-Based Smart City SystemsInternet of Things (2022)
25718 View0.87Nguyen T.; Nguyen H.; Nguyen Gia T.Exploring The Integration Of Edge Computing And Blockchain Iot: Principles, Architectures, Security, And ApplicationsJournal of Network and Computer Applications, 226 (2024)
6331 View0.87Poddar S.Adaptive Security At The Edge With Real-Time Access Control And Monitoring Beyond Zero TrustData Governance, DevSecOps, and Advancements in Modern Software (2025)
12593 View0.869Priyanshu; Singh S.K.; Kumar S.; Garg S.; Arora S.; Sharma S.K.; Arya V.; Chui K.T.Blockchain-Based Data Security In Smart Cities: Ensuring Data Integrity And TrustworthinessDigital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions (2024)
57656 View0.866Simonet-Boulogne A.; Solberg A.; Sinaeepourfard A.; Roman D.; Perales F.; Ledakis G.; Plakas I.; Sengupta S.Toward Blockchain-Based Fog And Edge Computing For Privacy-Preserving Smart CitiesFrontiers in Sustainable Cities, 4 (2022)