Blockchain-Based Data Sharing and Managing Sensitive Data
Blockchain-Based Data Sharing and Managing Sensitive Data
IT advancements have produced huge amount of data including personal and sensitive information. People have no control on data thatis stored, processed and controlled by third parties who could harm user privacy. Meanwhile blockchain technology has potential todrive research and applications and will weave together as we look at digital economy processing personal data. In this research work,a blockchain that is underlying technology behind Bitcoin based access control mechanism is introduced to protect users’ privacy. Ablockchain is a growing list of distributed records that are connected to each other through the usage of crytography. The distributedconsensus and anonymity form two major characteristics of the blockchain technology. The proposed system implements a protocolthat utilizes blockchain technology to manage access control to users’ data without depending on a third party.
___
- ScienceDaily, "Big Data, for better or worse: 90% of world's
data generated over last two years," [Online]. Available:
www.sciencedaily.com/releases/2013/05/130522085217.htm.
[Accessed 29 June 2018].
- T. P. Morgan, "How Facebook Compresses Its 300 PB Data
Warehouse," 11 April 2014. [Online]. Available:
https://www.enterprisetech.com/2014/04/11/facebookcompresses-300-pb-data-warehouse/.
[Accessed 29 June 2018].
- K. Schwab, A. Marcus, J. R. Oyola, W. Hoffman and M.
Luzi, "Personal Data: The Emergence of a New Asset Class,"
World Economic Forum, 2011.
- M. B. Kelley, "NSA's Prism surveillance program: how it
works and what it can do," 15 June 2013. [Online]. Available:
http://www.businessinsider.com/how-prism-surveillance-works2013-6.
[Accessed 29 June 2018].
- V. Goel, "Facebook Tinkers With Users’ Emotions in News
Feed Experiment, Stirring Outcry," 29 June 2014. [Online].
Available:
https://www.nytimes.com/2014/06/30/technology/facebooktinkers-with-users-emotions-in-news-feed-experiment-stirringoutcry.html.
[Accessed 29 June 2018].
- E. Commission, "Commission proposes a comprehensive
reform of data protection rules to increase users' control of their
data and to cut costs for businesses," European Commission,
Brussels, 2012.
- K. Zezima, "Obama proposes legislation on data breaches,
student privacy," 12 January 2015. [Online]. Available:
https://www.washingtonpost.com/news/postpolitics/wp/2015/01/12/obama-to-propose-legislation-on-databreaches-studentprivacy/?noredirect=on&utm_term=.f36a340e9816.
[Accessed
2018 June 29].
- R. Gross and A. Acquisti, "Information revelation and
privacy in online social networks," in In Proceedings of the 2005
ACM workshop on Privacy in the electronic society, 2005.
- D. L. Hoffman, T. P. Novak and M. Peralta, "Building
consumer trust online," Communications of the ACM, vol. 42, no.
4, pp. 80-85, 1999.
- I. E. T. F. (IETF), "The OAuth 2.0 Authorization
Framework," October 2012. [Online]. Available:
https://tools.ietf.org/html/rfc6749. [Accessed 29 June 2018].
- L. Sweeney, "k-anonymity: A model for protecting
privacy," International Journal of Uncertainty, Fuzziness and
Knowledge-Based Systems, vol. 10, no. 05, pp. 557-570, 2002.
- A. Machanavajjhala, J. Gehrke, D. Kifer and M.
Venkitasubramaniam, "l-diversity: Privacy beyond kanonymity,"
in Proceedings of the 22nd International Conference
on Data Engineering, 2006., 2006.
- N. Li, T. Li and S. Venkatasubramanian, "t-closeness:
Privacy beyond k-anonymity and l-diversity," in IEEE 23rd
International Conference on Data Engineering (ICDE 2007),
2007.
- Y.-A. De Montjoye, C. A. Hidalgo, M. Verleysen and V.
D. Blondel, "Unique in the crowd: The privacy bounds of human
mobility," Scientific reports, 2013.
- A. Narayanan and V. Shmatikov, "How to break
anonymity of the netflix prize dataset.," arXiv preprint, vol.
cs/0610105, 2006.
- C. Gentry and S. Halevi, "Implementing gentry’s fullyhomomorphic
encryption scheme," in Annual International
Conference on the Theory and Applications of Cryptographic
Techniques, 2011.
- S. Underwood, "Blockchain beyond bitcoin,"
Communications of the ACM, vol. 59, no. 11, pp. 15-17, 2016.
- V. L. Lemieux, «Trusting records: is Blockchain
technology the answer?,» Records Management Journal, cilt 26,
no. 2, pp. 110-139, 2016.
- M. Mettler, «Blockchain technology in healthcare: The
revolution starts here,» %1 içinde IEEE 18th International
Conference on e-Health Networking, Applications and Services
(Healthcom), Germany, 2016.
- M. Atzori, «Blockchain technology and decentralized
governance: Is the state still necessary?,» SSRN, London, 2015.
- F. Tian, «An agri-food supply chain traceability system
for China based on RFID & blockchain technology,» %1 içinde
IEEE 13th International Conference on Service Systems and
Service Management (ICSSSM), China, 2016.
- P. Maymounkov and D. Mazieres, "Kademlia: A peer-topeer
information system based on the xor metric," in In
International Workshop on Peer-to-Peer Systems, Springer,
Berlin, 2002.
- D. Johnson, A. Menezes and S. Vanstone, "The elliptic
curve digital signature algorithm (ECDSA)," International journal
of information security, vol. 1, no. 1, pp. 36-6, 2001.
- N. I. o. S. a. Technology, "FIPS 180-4, Secure Hash
Standard (SHS)," August 2015. [Online]. Available:
https://csrc.nist.gov/publications/detail/fips/180/4/final.
[Accessed 29 June 2018].
- S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash
system," 2008.