2019
DOI: 10.1007/978-3-030-34986-8_27
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Government Data Sharing Based on Hyperledger Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…For example, data sharing in a business-to-business (B2B) context between different companies may be subject to different requirements or challenges than data sharing between individuals (customers) and companies (B2C or C2B) (Abbas et al, 2021;Agahari et al, 2021). In addition, the literature reviewed also mentions the possibility of data sharing between governments (G2G), between governments and businesses (G2B), or individuals (G2C) as a potential implementation of data sharing (Hao et al, 2020;Omar et al, 2014;Susha et al, 2017). This shows that many actors and segments can engage in data sharing across domains (Gelhaar & Otto, 2020;Pujol Priego & Wareham, 2020;Zhong et al, 2011).…”
Section: Characteristics Of Data Sharingmentioning
confidence: 99%
“…For example, data sharing in a business-to-business (B2B) context between different companies may be subject to different requirements or challenges than data sharing between individuals (customers) and companies (B2C or C2B) (Abbas et al, 2021;Agahari et al, 2021). In addition, the literature reviewed also mentions the possibility of data sharing between governments (G2G), between governments and businesses (G2B), or individuals (G2C) as a potential implementation of data sharing (Hao et al, 2020;Omar et al, 2014;Susha et al, 2017). This shows that many actors and segments can engage in data sharing across domains (Gelhaar & Otto, 2020;Pujol Priego & Wareham, 2020;Zhong et al, 2011).…”
Section: Characteristics Of Data Sharingmentioning
confidence: 99%
“…Li et al [34] proposed a cross-sector-based information-sharing model that includes an on-chain model and an off-chain model, where the former uses a blockchain to share information segments in XML format and the latter uses addresses to access the intelligence information center; this ensures that information can be transferred efficiently within the limitations of storage capacity on the blockchain, but the security of the off-chain model must be improved, and their model is applicable only for cases in which the shared content is relatively fixed. Hao et al [35] proposed a sharing blockchain framework for private data based on the risk that the privacy of citizens or enterprises may be revealed in government data sharing; however, the problem with their scheme is that it has no high performance for concurrent events and cannot handle high-scale concurrent events. On the other hand, Liu et al [36] built a local differential privacy protection framework through a private chain; this method protects the privacy of the processed data when shared and used, and it enhances the security, credibility, and relevance of information sharing, but different data sources may cause information loss when processing.…”
Section: G2gmentioning
confidence: 99%
“…Therefore, restricting the ledger deployment on a geographical basis would seriously limit the reference architecture’s applicability. Hao et al (2020) [ 39 ] studied a similar scenario where private organizations share data with governmental agencies. In their proof of concept work, the sensitive data is distributed through a network-attached file share without applying encryption, similar to the “Use-case 3” described in previous sections.…”
Section: Reference Architecturementioning
confidence: 99%
“…OAuth, SAML, and Kerberos-based single sign-on (SSO) and authentication schemas are among the most popular technologies applied to IPFS scenarios. In fact, Hao et al (2020) [ 39 ] studied a similar use-case with IPFS and blockchain and proposed to authenticate the users with OAuth authentication schema. The reference architecture employs an enterprise-wide LDAP that can produce Kerberos authentication tickets, which is the basis for controlling access on IPFS.…”
Section: Reference Architecturementioning
confidence: 99%