A blockchain-based data usage auditing architecture with enhanced privacy and availability

Conference object English OPEN
Kaaniche , Nesrine; Laurent , Maryline;
(2017)
  • Publisher: IEEE Computer Society
  • Related identifiers: doi: 10.1109/NCA.2017.8171384
  • Subject: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] | [ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI] | [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] | Blockchain | Data usage auditing architecture | Privacy | [ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR] | Availability

International audience; Recent years have witnessed the trend of increasingly relying on distributed infrastructures. This increased the number of reported incidents of security breaches compromising users' privacy, where third parties massively collect, process and man... View more
  • References (12)
    12 references, page 1 of 2

    [1] O. Blazy, E. Kiltz, and J. Pan. (hierarchical) identity-based encryption from affine message authentication. In International Cryptology Conference. Springer, 2014.

    [2] M. Crosby, P. Pattanayak, S. Verma, and V. Kalyanaraman. Blockchain technology: Beyond bitcoin. Applied Innovation, 2:6-10, 2016.

    [3] C. Europe. Proposal for a regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. In General Data Protection Regulation, January 2016, 2016.

    [4] A. Fu, S. Yu, Y. Zhang, H. Wang, and C. Huang. Npp: A new privacyaware public auditing scheme for cloud data sharing with group users. IEEE Transactions on Big Data, 2017.

    [5] C. Gentry and S. Halevi. Hierarchical identity based encryption with polynomially many levels. In Theory of Cryptography Conference, pages 437-456. Springer, 2009.

    [6] G. Karame, E. Androulaki, M. Roeschlin, A. Gervais, and S. Capkun. Misbehavior in bitcoin: A study of double-spending and accountability. ACM Transactions on Information and System Security, 2015.

    [7] X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, and L. Njilla. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2017.

    [8] L. Linn and M. Koo. Blockchain for health data and its potential use in health it and health care related research, 2016.

    [9] A. Ouaddah, A. Abou Elkalam, and A. Ait Ouahman. Fairaccess: a new blockchain-based access control framework for the internet of things. Security and Communication Networks, 9(18), 2016.

    [10] M. Swan. Blockchain: Blueprint for a new economy. O'Reilly Media, Inc., 2015.

  • Metrics
    No metrics available
Share - Bookmark