Skip to main content

Advances, Systems and Applications

Table 4 Security function comparison among existing schemes

From: A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique

Scheme

Privacy1

User security2

Data callability3

Access control 4

Luo et al. [34]

\(\checkmark\)

\(\checkmark\)

\(\times\)

-

Li et al. [37]

\(\checkmark\)

\(\times\)

\(\checkmark\)

-

Li et al. [38]

\(\checkmark\)

\(\times\)

\(\checkmark\)

-

Zhang et al. [39]

\(\checkmark\)

\(\times\)

\(\times\)

\(\checkmark\)

Ours

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

  1. 1The privacy protection for user data held by data providers.
  2. 2The security of user personal information.
  3. 3The scheme can store and enable data to be recalled.
  4. 4The scheme can perform access control