Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply Chain

Full metadata record
DC Field Value Language
dc.contributor.authorCha, Sungyong-
dc.contributor.authorBaek, Seungsoo-
dc.contributor.authorKim, Seungjoo-
dc.date.accessioned2021-08-31T16:03:49Z-
dc.date.available2021-08-31T16:03:49Z-
dc.date.created2021-06-19-
dc.date.issued2020-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/58976-
dc.description.abstractThe security of operation and maintenance phase in systems that share long-life cycles like weapon systems is of great importance. Even if the system passes the security evaluation at the development stage before release, it can be adversely affected by the penetration of counterfeit components (parts) during the operation and maintenance phase. Such security issues are concatenated with data related to supply chain, accordingly, system parts need to fulfill the traceability on a fundamental basis. In addition to traceability, supply chains should also meet the data security standards of availability, integrity and confidentiality in the long run. Also, even without trusted third party, these data should be available to users. In this paper, we, therefore, propose a framework that utilizes blockchain and key escrow encryption system in a bid to optimize the security of supply chains for long-lifecycle systems and provide better measures to improve services for global business survivability.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleBlockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply Chain-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Seungjoo-
dc.identifier.doi10.1109/ACCESS.2020.3017871-
dc.identifier.scopusid2-s2.0-85090989624-
dc.identifier.wosid000566116600001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.8, pp.154269 - 154280-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume8-
dc.citation.startPage154269-
dc.citation.endPage154280-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorBlockchain-
dc.subject.keywordAuthorsupply chain-
dc.subject.keywordAuthorkey escrow system-
dc.subject.keywordAuthorkey recovery-
dc.subject.keywordAuthorweapon system-
dc.subject.keywordAuthorSDLC-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Seung joo photo

Kim, Seung joo
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE