Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

Study of Access Control Techniques on the Blockchain-enabled Secure Data Sharing Scheme in Edge Computing

Author(s): Neha Mathur*, Shweta Sinha*, Rajesh Kumar Tyagi and Nishtha Jatana

Volume 17, Issue 8, 2024

Published on: 08 January, 2024

Article ID: e080124225317 Pages: 13

DOI: 10.2174/0126662558276547231213075235

Price: $65

Abstract

Background: The pervasive adoption of edge computing is reshaping real-time big data analysis, smart city management, intelligent transportation, and various other domains. Its appeal lies in its distributed nature, decentralization, low latency, mobile support, and spatial awareness. However, this ubiquity exposes data to security threats, jeopardizing privacy and integrity. Consequently, access control assumes paramount importance in securing data sharing within edge computing and blockchain technologies.

Methods: This research addresses this critical issue by conducting a comprehensive study on access control techniques within the context of edge computing and blockchain for secure data sharing. Our methodology commences with an exhaustive review of relevant articles, aiming to identify and expound upon gaps in existing research. Subsequently, we perform a meticulous analysis of access control methods, mechanisms, and performance metrics, seeking to establish a holistic understanding of the landscape.

Results: The culmination of this research effort is a multifaceted contribution. We distill insights from a diverse range of access control schemes, shedding light on their nuances and effectiveness. Our analysis extends to evaluating the performance metrics vital for ensuring robust access control. Through this research, we also pinpoint critical research gaps within traditional access control methods, creating a foundation for innovative approaches to address the evolving challenges within edge computing and blockchain environments.

Conclusion: In conclusion, this research venture paves the way for secure data sharing in edge computing and blockchain by offering a thorough examination of access control. The findings from this study are anticipated to guide future developments in access control techniques and facilitate the evolution of secure, privacy-conscious, and efficient data sharing practices in the dynamic landscape of digital technology.

Graphical Abstract


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy