A blockchain-based data usage auditing architecture with enhanced privacy and availability
Title | A blockchain-based data usage auditing architecture with enhanced privacy and availability |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Kaaniche, N., Laurent, M. |
Conference Name | 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) |
Date Published | oct |
ISBN Number | 978-1-5386-2723-5 |
Keywords | auditable contracts, authorisation, Authorization, blockchain infrastructures, blockchain-based data usage auditing architecture, composability, contracts, cryptography, data access, data owners, data privacy, data sharing, data usage compliance, distributed infrastructures, hierarchical identity based cryptographic mechanisms, Metrics, network accountability, Peer-to-peer computing, privacy-preserving fashion, Proposals, pubcrawl, resilience, Resiliency, security breaches, tamper-proof evidences, unauthorized users, untrusted servers |
Abstract | Recent years have witnessed the trend of increasingly relying on distributed infrastructures. This increased the number of reported incidents of security breaches compromising users' privacy, where third parties massively collect, process and manage users' personal data. Towards these security and privacy challenges, we combine hierarchical identity based cryptographic mechanisms with emerging blockchain infrastructures and propose a blockchain-based data usage auditing architecture ensuring availability and accountability in a privacy-preserving fashion. Our approach relies on the use of auditable contracts deployed in blockchain infrastructures. Thus, it offers transparent and controlled data access, sharing and processing, so that unauthorized users or untrusted servers cannot process data without client's authorization. Moreover, based on cryptographic mechanisms, our solution preserves privacy of data owners and ensures secrecy for shared data with multiple service providers. It also provides auditing authorities with tamper-proof evidences for data usage compliance. |
URL | https://ieeexplore.ieee.org/document/7974335/ |
DOI | 10.1109/NCA.2017.8171384 |
Citation Key | kaaniche_blockchain-based_2017 |
- distributed infrastructures
- untrusted servers
- unauthorized users
- tamper-proof evidences
- security breaches
- Resiliency
- resilience
- pubcrawl
- Proposals
- privacy-preserving fashion
- Peer-to-peer computing
- network accountability
- Metrics
- hierarchical identity based cryptographic mechanisms
- auditable contracts
- data usage compliance
- data sharing
- data privacy
- data owners
- data access
- Cryptography
- contracts
- composability
- blockchain-based data usage auditing architecture
- blockchain infrastructures
- authorization
- authorisation