Skip to main content

Advances, Systems and Applications

Table 3 Security function comparison among existing protocols

From: A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique

Protocol

Secure storage in cloud servers1

Secure channel required2

De Cristofaro and Tsudik [12]

\(\times\)

\(\times\)

Huang et al. [19]

\(\times\)

\(\times\)

Abadi et al. [16]

\(\checkmark\)

\(\checkmark\)

Dong et al. [23]

\(\times\)

\(\checkmark\)

Ours

\(\checkmark\)

\(\times\)

  1. 1The technique can store users’ data securely on cloud servers.
  2. 2The technique requires a secure connection channel between the two users