Tasnim et al., 2018 - Google Patents

Crab: Blockchain based criminal record management system

Tasnim et al., 2018

View PDF
Document ID
4533817643109944442
Author
Tasnim M
Omar A
Rahman M
Bhuiyan M
Publication year
Publication venue
International conference on security, privacy and anonymity in computation, communication and storage

External Links

Snippet

Criminal records are highly sensitive public records. By incorporating criminal records in a blockchain, authenticity and rigidity of records can be maintained; which also helps to keep the data safe from adversaries. A peer to peer cloud network enables the decentralization of …
Continue reading at omarcsbd.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting

Similar Documents

Publication Publication Date Title
Tasnim et al. Crab: Blockchain based criminal record management system
Li et al. Blockchain-based data preservation system for medical data
Kuo et al. Blockchain distributed ledger technologies for biomedical and health care applications
US11949794B2 (en) Data anonymization of blockchain-based processing pipeline
Sun et al. Data security and privacy in cloud computing
US8543806B2 (en) System, method and apparatus for electronically protecting data and digital content
US7937579B2 (en) System, method and apparatus for electronically protecting data and digital content
US8613107B2 (en) System, method and apparatus for electronically protecting data associated with RFID tags
US11907199B2 (en) Blockchain based distributed file systems
US20200193057A1 (en) Privacy enhanced data lake for a total customer view
EP3245569A1 (en) Record level data security
US11868339B2 (en) Blockchain based distributed file systems
Wheeler et al. Cloud storage security: A practical guide
EP3744071B1 (en) Data isolation in distributed hash chains
Sharma et al. MapSafe: A complete tool for achieving geospatial data sovereignty
CN113302610A (en) Trusted platform based on block chain
Salunke et al. Decentralized evidence storage system using blockchain and IPFS
CN113491090B (en) Trusted platform based on blockchain
Yinka et al. Improving the data access control using blockchain for healthcare domain
Divadari et al. Managing data protection and privacy on cloud
Jain et al. Privacy-preserving record linkage with block-chains
Sudarsan et al. Security and privacy of big data
Hua et al. International trade privacy data management system combining Internet of Things blockchain
Tasnim¹ et al. Record Management System
Jahan et al. Utilizing hyperledger-based private blockchain to secure e-passport management