2019
DOI: 10.1109/access.2019.2956628
|View full text |Cite
|
Sign up to set email alerts
|

Modifiable Public Blockchains Using Truncated Hashing and Sidechains

Abstract: The immutability of the blockchain technology facilitates it to establish a general consensus in a trustless environment, enabling a wide range of new applications, including distributed general-purpose data management and digital data sharing marketplace. This immutability, however, presents disadvantages for the blockchain technology, when it is used in other areas where the modification of data in blockchain is demanded. In this study, we propose a method for building modifiable blockchains in decentralized… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 26 publications
0
19
0
1
Order By: Relevance
“…In this paper, the blockchain model is proposed and each module is abstracted to make the platform modifiable easily. When the network is heterogeneous and privacy issue becomes important, the auction module could be supported with cryptographic applications like sealed auctions, or encrypted comparisons to find the highest bid as in [59]- [61]. In that case, the gas price will increase but the system can deal with the privacy issue.…”
Section: Security Discussionmentioning
confidence: 99%
“…In this paper, the blockchain model is proposed and each module is abstracted to make the platform modifiable easily. When the network is heterogeneous and privacy issue becomes important, the auction module could be supported with cryptographic applications like sealed auctions, or encrypted comparisons to find the highest bid as in [59]- [61]. In that case, the gas price will increase but the system can deal with the privacy issue.…”
Section: Security Discussionmentioning
confidence: 99%
“…The controller's responsibility regarding the data processing upon the user's permission is discussed [31]. The user has the right to give permissions, withdraw consent for processing and storage [31], [51]. Users' data cannot be stored and processed without their consent [52].…”
Section: ) Consent Management (Article 7)mentioning
confidence: 99%
“…• Original data can be stored in the off chain and the proof of existence can be stored on-chain using a hash[28,47,37,42,35]. • Key management protocols can be used that will be linked with the main chain with hashes [59,51,37,44]…”
mentioning
confidence: 99%
“…More detailed explanation will be given in Section 3.3.3. The proposed method uses AC, which has a modifiable blockchain structure [46], to record SPDC account information in Table 3. The modifiability of AC is used to efficiently record frequently changing account information, for example, Z s .…”
Section: Accountchainmentioning
confidence: 99%