2015 IEEE Security and Privacy Workshops 2015
DOI: 10.1109/spw.2015.27
|View full text |Cite
|
Sign up to set email alerts
|

Decentralizing Privacy: Using Blockchain to Protect Personal Data

Abstract: The recent increase in reported incidents of surveillance and security breaches compromising users' privacy call into question the current model, in which third-parties collect and control massive amounts of personal data. Bitcoin has demonstrated in the financial space that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger. In this paper, we describe a decentralized personal data management system that ensures users own and control their data. We im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
933
0
16

Year Published

2016
2016
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 1,870 publications
(950 citation statements)
references
References 11 publications
1
933
0
16
Order By: Relevance
“…a) Blockchain-based Access Control: The work of Zyskind et al [12] offers a decentralized privacy solution for personal data that is collected and controlled by a third-party. This model depends on a blockchain, which acts as an access control manager to guarantee transparency over data and retains only pointers (hash) to the data and an off-blockchain Distributed Hashtable (DHT), which can be accessed through the blockchain and stores the encrypted data.…”
Section: Initializementioning
confidence: 99%
See 1 more Smart Citation
“…a) Blockchain-based Access Control: The work of Zyskind et al [12] offers a decentralized privacy solution for personal data that is collected and controlled by a third-party. This model depends on a blockchain, which acts as an access control manager to guarantee transparency over data and retains only pointers (hash) to the data and an off-blockchain Distributed Hashtable (DHT), which can be accessed through the blockchain and stores the encrypted data.…”
Section: Initializementioning
confidence: 99%
“…Enigma deploys a public blockchain to ensure data correctness and an off-chain distributed hash-table (DHT) to assure data privacy. Unlike [12], only references to the data is stored in the DHT, while the actual data is divided over several nodes across the network. Thereby, nodes can compute functions together without leaking information to other nodes.…”
Section: Initializementioning
confidence: 99%
“…Block chain technology with its distributed data acquisition and storage capacity, unchangeable timestamp, etc. designed contract [6], after module 1 having completed the data collection and data transmission, combined with the front-end embedded decentralized risk pricing model and the terminal centralized risk pricing model. Borrower credit risk pricing is completed by the two centralized and decentralized systems together, constructing "centralized + decentralized" credit system based on the "block chain +".…”
Section: Middle-end "Block Chain +"Credit Risk Pricing Module (Module 2)mentioning
confidence: 99%
“…From distributed storage for private information, to distributed online marketing, blockchain can be used to provide distributed audit records (Zyskind et al, 2015). Blockchain distributed agreement is a good choice for smart community negotiation and coordination protocols since it can provide the means to build and maintain a distributed storage of privacysensitive energy usage information without a single owner.…”
Section: Decentralized Coordination Using Blockchainmentioning
confidence: 99%