Decentralizing Privacy: Using Blockchain to Protect Personal Data
Top Cited Papers
- 1 May 2015
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 180-184
- https://doi.org/10.1109/spw.2015.27
Abstract
The recent increase in reported incidents of surveillance and security breaches compromising users' privacy call into question the current model, in which third-parties collect and control massive amounts of personal data. Bit coin has demonstrated in the financial space that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger. In this paper, we describe a decentralized personal data management system that ensures users own and control their data. We implement a protocol that turns a block chain into an automated access-control manager that does not require trust in a third party. Unlike Bit coin, transactions in our system are not strictly financial -- they are used to carry instructions, such as storing, querying and sharing data. Finally, we discuss possible future extensions to block chains that could harness them into a well-rounded solution for trusted computing problems in society.Keywords
This publication has 10 references indexed in Scilit:
- openPDS: Protecting the Privacy of Metadata through SafeAnswersPLOS ONE, 2014
- Unique in the Crowd: The privacy bounds of human mobilityScientific Reports, 2013
- Fully homomorphic encryption using ideal latticesPublished by Association for Computing Machinery (ACM) ,2009
- t-Closeness: Privacy Beyond k-Anonymity and l-DiversityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- L -diversityACM Transactions on Knowledge Discovery From Data, 2007
- Kademlia: A Peer-to-Peer Information System Based on the XOR MetricLecture Notes in Computer Science, 2002
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- The Elliptic Curve Digital Signature Algorithm (ECDSA)International Journal of Information Security, 2001
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- How to share a secretCommunications of the ACM, 1979