Table 2.
Author | Year | Main Focus | Key Generation | Grant Access | Revoke Access | Encrypt Data | Manage Location |
---|---|---|---|---|---|---|---|
Roehrs et al. [4] | 2017 | Interoperability | X | - | - | X | X |
Sonkamble et al. [37] | 2017 | Interoperability | - | X | X | - | - |
Ghadamyari and Shame [20] | 2019 | Data Analysis | - | - | - | - | - |
She et al. [21] | 2019 | Privacy | - | - | - | X | - |
Radhakrishnan et al. [38] | 2019 | Security | - | X | - | - | - |
Niu et al. [39] | 2019 | Interoperability | - | X | - | - | - |
Yazdinejad et al. [22] | 2020 | Authentication | - | X | - | - | - |
Zhuang et al. [40] | 2020 | Information Exchange | - | X | - | - | - |
Muizz Mahdy [41] | 2020 | Interoperability | X | X | - | - | - |
Misbhauddin et al. [19] | 2020 | Scalability | X | X | X | - | - |
Madine et al. [42] | 2020 | Interoperability | X | X | - | X | - |
Sun et al. [26] | 2020 | Security | - | - | - | - | - |
Ghani et al. [43] | 2020 | Information Exchange | X | X | X | - | - |
Mubashar et al. [32] | 2021 | Information Exchange | - | - | - | - | - |
Wang et al. [44] | 2021 | Interoperability | X | X | - | X | X |
Proposed Model | 2022 | Interoperability | X | X | X | X | X |