Proceedings ArticleDOI
Decentralizing Privacy: Using Blockchain to Protect Personal Data
Guy Zyskind,Oz Nathan,Alex Pentland +2 more
- pp 180-184
Reads0
Chats0
TLDR
A decentralized personal data management system that ensures users own and control their data is described, and a protocol that turns a block chain into an automated access-control manager that does not require trust in a third party is implemented.Abstract:
The recent increase in reported incidents of surveillance and security breaches compromising users' privacy call into question the current model, in which third-parties collect and control massive amounts of personal data. Bit coin has demonstrated in the financial space that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger. In this paper, we describe a decentralized personal data management system that ensures users own and control their data. We implement a protocol that turns a block chain into an automated access-control manager that does not require trust in a third party. Unlike Bit coin, transactions in our system are not strictly financial -- they are used to carry instructions, such as storing, querying and sharing data. Finally, we discuss possible future extensions to block chains that could harness them into a well-rounded solution for trusted computing problems in society.read more
Citations
More filters
Journal ArticleDOI
Blockchain challenges and opportunities: a survey
TL;DR: The blockchain taxonomy is given, the typical blockchain consensus algorithms are introduced, typical blockchain applications are reviewed, and the future directions in the blockchain technology are pointed out.
Proceedings ArticleDOI
MedRec: Using Blockchain for Medical Data Access and Permission Management
TL;DR: This paper proposes MedRec: a novel, decentralized record management system to handle EMRs, using blockchain technology, and incentivizes medical stakeholders to participate in the network as blockchain “miners”, enabling the emergence of data economics.
Journal ArticleDOI
A systematic literature review of blockchain-based applications: Current status, classification and open issues
TL;DR: A comprehensive classification of blockchain-enabled applications across diverse sectors such as supply chain, business, healthcare, IoT, privacy, and data management is presented, and key themes, trends and emerging areas for research are established.
Journal ArticleDOI
On blockchain and its integration with IoT. Challenges and opportunities
TL;DR: This paper focuses on the relationship between blockchain and IoT, investigates challenges in blockchain IoT applications, and surveys the most relevant work in order to analyze how blockchain could potentially improve the IoT.
Journal ArticleDOI
Designing microgrid energy markets : A case study : The Brooklyn Microgrid
Esther Mengelkamp,Johannes Gärttner,Kerstin Rock,Scott Kessler,Lawrence Orsini,Christof Weinhardt +5 more
TL;DR: In this paper, the authors present the concept of a blockchain-based microgrid energy market without the need for central intermediaries, where consumers and prosumers can trade self-produced energy in a peer-to-peer fashion.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI
k -anonymity: a model for protecting privacy
TL;DR: The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Proceedings ArticleDOI
Fully homomorphic encryption using ideal lattices
TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Book ChapterDOI
Differential privacy
TL;DR: In this article, the authors give a general impossibility result showing that a formalization of Dalenius' goal along the lines of semantic security cannot be achieved, and suggest a new measure, differential privacy, which, intuitively, captures the increased risk to one's privacy incurred by participating in a database.
Journal ArticleDOI
L-diversity: Privacy beyond k-anonymity
TL;DR: This paper shows with two simple attacks that a \kappa-anonymized dataset has some subtle, but severe privacy problems, and proposes a novel and powerful privacy definition called \ell-diversity, which is practical and can be implemented efficiently.