“…Global Log + TTP Global Log + P2P Completeness ---Confidentiality MAC [2,7,14,15], FssAgg [10], PKI [7,10] MAC [1,6,11,12], PKI [20], unlinkability [6,11,12] MAC [15], PKI [16], compound identities [15,21] Correctness ---Immutability cipher chains [2], hash chains [7,15] hash chains [7,15] network of peers [16,19] blockchain [21] Integrity forward integrity [2,7,10,14,15] MAC security proof [2] forward integrity [1,6,11,12] forward integrity [15] Interoperability Performance: When it comes to the processing of the event data, various optimisations such as parallel processing and/or indexing should be used to improve processing efficiency. Scalability: Given the volume of events and policies that will need to be handled, the scalability of event data processing is a major consideration.…”