2020
DOI: 10.3389/fbloc.2020.00017
|View full text |Cite
|
Sign up to set email alerts
|

ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments

Abstract: Recent years have witnessed the trend of increasingly relying on remote and distributed infrastructures, mainly owned and managed by third parties. This increased the number of reported incidents of security breaches compromising users' personal data, where involved entities may massively collect and process massive amounts of such data. Toward these challenges, this paper combines hierarchical Identity Based Cryptographic (IBC) mechanisms with emerging blockchain technologies and introduces a blockchain-based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…Agrawal et al [262] introduced an auditing framework for determining whether a database system is adhering to its data disclosure policies by allowing users to formulate audit expressions to specify the data subject to disclosure review. Kaaniche et al [263] proposed the usage of hierarchical ID-based encryption and signature schemes. Noura et al [146] presented a security and protection audit that can be done by using an audit management system to collect and store logs in a distributed system.…”
Section: B Cybersecurity Audit Modelsmentioning
confidence: 99%
“…Agrawal et al [262] introduced an auditing framework for determining whether a database system is adhering to its data disclosure policies by allowing users to formulate audit expressions to specify the data subject to disclosure review. Kaaniche et al [263] proposed the usage of hierarchical ID-based encryption and signature schemes. Noura et al [146] presented a security and protection audit that can be done by using an audit management system to collect and store logs in a distributed system.…”
Section: B Cybersecurity Audit Modelsmentioning
confidence: 99%
“…However, if a patient register ID is forgotten or lost, it can be traced back by matching previously patient-authorized tracking tags such as type of procedure, anesthesiologist ID, date, geolocation or specific patient characteristics. The implementation of smart contracts to support data usage consent can further ensure the confidentiality of personal information shared with multiple data controllers and processors (Kaaniche et al, 2020).…”
Section: Overviewmentioning
confidence: 99%
“…Enforcing Compliance: by respecting users' privacy through ensuring data access regulatory compliance that processes CPS's big data via clouds, especially when stored by utility providers (Trusted Third Party (TTP)) to prevent any data leakage and users privacy violations. Therefore, maintaining a suitable trade-off between users privacy and systems' security and performance, while also ensuring firmer accountability measures [405,406] . 7.…”
Section: Learnt Lessonsmentioning
confidence: 99%