System architecture diagram.

System architecture diagram.

Source publication
Article
Full-text available
The subscription economy was born because the relationship between creators and customers is different than it used to be. The era of the creator economy seems to be filled with boundless promise, but at the end of the day, creators are just slaves to tech giants. Neither the control of the content created, nor the money made in their pockets is in...

Contexts in source publication

Context 1
... main parties of the system include the Blockchain Center (BCC), Certificate Authority (CA), Digital Media Cloud (DMC), Owner (OR), Licensee (LE), and Bank (BK). The system architecture is shown in Figure 1. ...
Context 2
... Licensee (LE) can use the decryption parameters of the proxy re-encryption operation to view the digital content. The flowchart of the digital media browsing phase is shown in Figure 10. Step 1: LE generates a random value k LE−DMC , and calculates ...
Context 3
... the LE requests arbitration from the Arbitration Institution (AI), the AI compares blockchain data through the signature message to confirm the subscription contract. The arbitration mechanism verification phase is shown in Figure 11. ...

Citations

... Although the architecture proposed by this scheme has relatively complete functions, the authors do not provide the implementation details of the specific scheme algorithm. Huang et al. (2022) proposed a mechanism for subscribing to digital media based on the Hyperledger blockchain architecture, using symmetric and asymmetric cryptography and creating corresponding smart contracts to design access control protocols for the creator's content. When an authorized user fails to comply with the agreement signed with the creator, authorized users' access rights to digital media can be revoked by the creator, providing security and convenience in the transmission of digital media. ...
Article
Full-text available
In medical data sharing, the data access control authorities of the sharing entities and computing capabilities of the sharing platforms are asymmetric. This asymmetry leads to poor patient control over their data, privacy disclosure, and difficulties in tracking data sharing. This aarticle proposes a cooperation model of cloud and chain (CMCC) for the secure sharing of medical data. In the CMCC, the power equivalence of blockchain nodes limits the control authority asymmetry between doctors and patients in medical data sharing. Moreover, a cloud server is used to store medical data, and some of the node-side computations are handed over to the cloud, which addresses the asymmetric computing capability asymmetry between the cloud and ordinary nodes. Based on the CMCC, a secure medical data sharing scheme based on proxy re-encryption mechanism is proposed. This scheme realizes secure medical data sharing, especially the patient's complete control of the data. The security and performance analysis show that the proposed scheme outperforms the existing ones.
... The identity verification of the device can be effectively achieved, and the operating cost can be effectively reduced. Huang et al. [4] proposed a digital media subscription mechanism based on the Hyperledger blockchain architecture combined with proxy re-encryption. The authors used symmetric and asymmetric cryptography, smart contracts, and algorithms to design the protocol. ...
Article
Full-text available
The technology that is most likely to change the corporate world in the next ten years is not social networks, Big Data, cloud computing, robots, not even artificial intelligence, but blockchain [...]
... In [20], a blockchain-based system for IoT data sharing is proposed that integrates ciphertext-policy attribute-based encryption and fully homomorphic encryption to realize secure IoT data sharing. A digital media subscription mechanism based on the Hyperledger blockchain architecture combined with proxy re-encryption is reported in [21] where symmetric and asymmetric cryptography and smart contracts are employed to design the subscription protocol so that when the licensee violates the agreement with the creator, the creator can revoke the access rights to the digital media. A decentralized, blockchain-based solution for hybrid access control in Industrial Internet-of-Thins (IIoT) is proposed in [22]. ...
Article
Full-text available
This paper considers the problem of data access control when the subscribers are IoT devices with initialization that cannot be updated during the entire life cycle. A generic framework and a particular instance for conditional data access control within IoT are proposed. The generic framework is based on the employment of a dedicated secret key-based broadcast encryption scheme where encrypted credentials for conditional data access is available in the blockchain and encrypted data subject to conditional access are available in an off-chain source of streaming data. Reduction of the keys management overhead in comparison with a straightforward decryption keys delivery is experimentally illustrated. An instance of the proposed framework built over the Ethereum blockchain platform is developed and experimentally evaluated.