UCAmI 2018 2018
DOI: 10.3390/proceedings2191230
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Technologies for Private Data Management in AmI Environments

Abstract: Blockchain enables the creation of distributed ledgers as a type of database that is shared, replicated, and synchronized among the members of a network. In this paper we analyze how distributed ledgers can be used for empowering end-users to self-manage their own data, enabling third parties to access those data under a cryptographic management model. We propose a use case where both blockchain and smart contracts are employed by using cryptographic technology to enable user empowerment of data management in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…29 Moreover, mechanisms are required to automize the interaction between electronic devices and Blockchain networks, while addressing the challenges related to remote devices and public key infrastructure (PKIs). Some solutions based on homomorphic cryptography may be found, for ambient intelligence applications, 9 water management, 30 international commerce, 31 and domestic scenarios. 8 Other solutions based on physical unclonable functions have been reported.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…29 Moreover, mechanisms are required to automize the interaction between electronic devices and Blockchain networks, while addressing the challenges related to remote devices and public key infrastructure (PKIs). Some solutions based on homomorphic cryptography may be found, for ambient intelligence applications, 9 water management, 30 international commerce, 31 and domestic scenarios. 8 Other solutions based on physical unclonable functions have been reported.…”
Section: Related Workmentioning
confidence: 99%
“…General privacy policies (contained in regulation) and user-defined privacy policies will be integrated into these SCs, enabling a PbD approach. Ambient intelligence devices and other similar components will be authorized to interact with these SCs 9 in order to automize data capture. Personal data will be stored in a trustworthy database, managed by the Blockchain network.…”
Section: Introductionmentioning
confidence: 99%
“…Some of these techniques include blockchain, cloud computing, and general cryptographic techniques as earlier mentioned. Robles et al [38] combined the building features of blockchain technology to initiate and utilize a customer-focused data management system in AMI. Since blockchain is a decentralized public digital ledger for recording transactions that cannot be changed without changing all the subsequent blocks and the consensus of the network, access control, integrity, and authentication of the involved data were therefore guaranteed via blockchain [39,40] PUFs get easily denatured/altered in the presence of extreme temperatures [27] 2…”
Section: Privacy and Security Vulnerabilities Of Amimentioning
confidence: 99%
“…As stated, Ajao L. A, et al, use the SHA-1 hash algorithm-based blockchain, encrypting a distributed ledger database, while our proposed method uses RSA encryption, which is more efficient and reliable by combining the private key of the wallet's owner with the owner's DNA-based bio-cryptography in order to construct a strongly secured blockchain. [19] proposed a method using smart contracts with blockchain technology. A cryptographic mechanism is utilized in order to enable employees to manage the data needed for anti-money laundering (AML) measures (consisting of the analysis of the distributed ledger).…”
Section: Literature Reviewmentioning
confidence: 99%