2019
DOI: 10.24251/hicss.2019.821
|View full text |Cite
|
Sign up to set email alerts
|

BPDIMS:A Blockchain-based Personal Data and Identity Management System

Abstract: Recent scandals on the abuse of personal information from social media platforms and numerous user identity data breaches raise concerns about technical, commercial, and ethical aspects of privacy and security of user data. European Union's new General Data Protection Regulation (GDPR) is one of the largest changes in data privacy regulation and entails several key regulatory measures for both data controllers and data processors to empower and protect EU citizens' privacy. In this research work, we propose a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
32
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 73 publications
(35 citation statements)
references
References 20 publications
0
32
0
Order By: Relevance
“…In the context of the personal data management, a c-ID of a dataset m comprises an asymmetric key pair of the DS, an asymmetric key pair the DC, and an asymmetric key pair of the data pointer (denoted as p m ) of m. As the data usage policy depends on the requester's role (i.e., DS, DC, or DP), the way we define c-ID specifies the entities associated with m, and simplifies the process of verification. Any digital signature scheme such as Digital Signature Algorithm (DSA) or Elliptic Curve Digital Signature Algorithm (ECDSA) 10 can be used to generate and manage the c-ID, which is formally defined as a triple of probabilistic polynomial-time algorithms (G, S, V):…”
Section: ) Identity Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…In the context of the personal data management, a c-ID of a dataset m comprises an asymmetric key pair of the DS, an asymmetric key pair the DC, and an asymmetric key pair of the data pointer (denoted as p m ) of m. As the data usage policy depends on the requester's role (i.e., DS, DC, or DP), the way we define c-ID specifies the entities associated with m, and simplifies the process of verification. Any digital signature scheme such as Digital Signature Algorithm (DSA) or Elliptic Curve Digital Signature Algorithm (ECDSA) 10 can be used to generate and manage the c-ID, which is formally defined as a triple of probabilistic polynomial-time algorithms (G, S, V):…”
Section: ) Identity Managementmentioning
confidence: 99%
“…Hash is a type of the data pointer used in a content-addressed storage system such as DHT, IPFS, and Stoij 10. https://en.wikipedia.org/wiki/Elliptic Curve Digital Signature Algorithm…”
mentioning
confidence: 99%
“…A consortium blockchain makes data more private [57] by restricting access to it to selected organizations [58]. The Blockchain-based Personal Data and Identity Management System (BPDIMS) [59] is a proposed solution that uses multiple blockchains to share personal data-whereas the blockchain is publicly-visible, contributions to it are permissioned. Grishin et al [60] achieve a similar model using the Exonum [61] blockchain.…”
Section: Blockchain In Healthcarementioning
confidence: 99%
“…In the case of My Health My Data, which plans to store consent information in the blockchain, this characteristic clashes with the GDPR to the point that the right to erasure is not planned to be offered to patients [72]. However, the general trend of storing data offchain helps make existing or prospective systems more compliant [59]. For example, MedRec is primarily a blockchain solution, but it stores sensitive personal information in a more traditional, centralized off-chain database from wherein data can be removed.…”
Section: Blockchain In Healthcarementioning
confidence: 99%
“…Igor et al propose the use of blockchain technology to ensure the integrity of files on the cloud. Hashes of the files are added on the blockchain as a reference of the change [25]. Though the authors do not deal directly with personal data, the files may contain personal data, indicating a change in personal data whenever a new hash is posted.…”
Section: Blockchain For Data Integritymentioning
confidence: 99%