Blockchain-Enabled Decentralized Trust Management and Secure Usage Control of IoT Big Data

2020 ◽  
Vol 7 (5) ◽  
pp. 4000-4015 ◽  
Author(s):  
Ma Zhaofeng ◽  
Wang Lingyun ◽  
Wang Xiaochang ◽  
Wang Zhen ◽  
Zhao Weizhe
2019 ◽  
pp. 411-431
Author(s):  
Usama Ahmed ◽  
Imran Raza ◽  
Syed Asad Hussain
Keyword(s):  
Big Data ◽  

Author(s):  
Stefania Marrara ◽  
Mirjana Pejic-Bach ◽  
Sanja Seljan ◽  
Amir Topalovic

In this chapter, a study about how Italian SMEs understand and use FinTech technologies is presented. The study focuses on FinTech-aided banking services, in particular, due to the fact that these are, at present, the most widely used FinTech technologies available in Italy. The study shows how, despite FinTech entering Italy only in recently, the Italian SMEs market is very active and fruitful for digital companies. In the last years, a continuous growth of investment has seen the development of FinTech technologies in multiple areas, such as mobile networks, big data, trust management, mobile embedded systems, cloud computing, image processing, and data analytic techniques.


Author(s):  
Stefania Marrara ◽  
Mirjana Pejic-Bach ◽  
Sanja Seljan ◽  
Amir Topalovic

In this chapter, a study about how Italian SMEs understand and use FinTech technologies is presented. The study focuses on FinTech-aided banking services, in particular, due to the fact that these are, at present, the most widely used FinTech technologies available in Italy. The study shows how, despite FinTech entering Italy only in recently, the Italian SMEs market is very active and fruitful for digital companies. In the last years, a continuous growth of investment has seen the development of FinTech technologies in multiple areas, such as mobile networks, big data, trust management, mobile embedded systems, cloud computing, image processing, and data analytic techniques.


Author(s):  
Li Yang ◽  
Chang Phuong ◽  
Amy Novobilski ◽  
Raimund K. Ege

Most access control models have formal access control rules to govern the authorization of a request from a principal. In pervasive and collaborative environments, the behaviors of a principal are uncertain due to partial information. Moreover, the attributes of a principal, requested objects, and contexts of a request are mutable during the collaboration. A variety of such uncertainty and mutability pose challenges when resources sharing must happen in the collaborative environment. In order to address the above challenges, we propose a framework to integrate trust management into a usage control model in order to support decision making in an ever-changing collaborative environment. First, a trust value of a principal is evaluated based on both observed behaviors and peer recommendations. Second, the usage-based access control rules are checked to make decisions on resource exchanges. Our framework handles uncertainty and mutability by dynamically disenrolling untrusted principals and revoking granted on-going access if access control rules are no longer met. We have applied our trust-based usage control framework to an application of file sharing.


Author(s):  
Stefania Marrara ◽  
Mirjana Pejic-Bach ◽  
Sanja Seljan ◽  
Amir Topalovic

In this chapter, a study about how Italian SMEs understand and use FinTech technologies is presented. The study focuses on FinTech-aided banking services, in particular, due to the fact that these are, at present, the most widely used FinTech technologies available in Italy. The study shows how, despite FinTech entering Italy only in recently, the Italian SMEs market is very active and fruitful for digital companies. In the last years, a continuous growth of investment has seen the development of FinTech technologies in multiple areas, such as mobile networks, big data, trust management, mobile embedded systems, cloud computing, image processing, and data analytic techniques.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 7234-7243 ◽  
Author(s):  
Weizhi Meng ◽  
Wenjuan Li ◽  
Chunhua Su ◽  
Jianying Zhou ◽  
Rongxing Lu

Author(s):  
Li Yang ◽  
Chang Phuong ◽  
Andy Novobilski ◽  
Raimund K. Ege

Most access control models have formal access control rules to govern the authorization of a request from a principal. In pervasive and collaborative environments, the behaviors of a principal are uncertain due to partial information. Moreover, the attributes of a principal, requested objects, and contexts of a request are mutable during the collaboration. A variety of such uncertainty and mutability pose challenges when resources sharing must happen in the collaborative environment. In order to address the above challenges, we propose a framework to integrate trust management into a usage control model in order to support decision making in an ever-changing collaborative environment. First, a trust value of a principal is evaluated based on both observed behaviors and peer recommendations. Second, the usage-based access control rules are checked to make decisions on resource exchanges. Our framework handles uncertainty and mutability by dynamically disenrolling untrusted principals and revoking granted on-going access if access control rules are no longer met. We have applied our trust-based usage control framework to an application of file sharing.


Author(s):  
Li Yang ◽  
Chang Phuong ◽  
Andy Novobilski ◽  
Raimund K. Ege

Most access control models have formal access control rules to govern the authorization of a request from a principal. In pervasive and collaborative environments, the behaviors of a principal are uncertain due to partial information. Moreover, the attributes of a principal, requested objects, and contexts of a request are mutable during the collaboration. A variety of such uncertainty and mutability pose challenges when resources sharing must happen in the collaborative environment. In order to address the above challenges, we propose a framework to integrate trust management into a usage control model in order to support decision making in an ever-changing collaborative environment. First, a trust value of a principal is evaluated based on both observed behaviors and peer recommendations. Second, the usage-based access control rules are checked to make decisions on resource exchanges. Our framework handles uncertainty and mutability by dynamically disenrolling untrusted principals and revoking granted on-going access if access control rules are no longer met. We have applied our trust-based usage control framework to an application of file sharing.


Sign in / Sign up

Export Citation Format

Share Document