2019
DOI: 10.1007/978-3-030-22312-0_26
|View full text |Cite
|
Sign up to set email alerts
|

Towards Contractual Agreements for Revocation of Online Data

Abstract: Once personal data is published online, it is out of the control of the user and can be a threat to users' privacy. Retroactively deleting data after it has been published is notoriously unreliable due to the distributed and open nature of the Internet. Cryptographic approaches implementing data revocation address this problem, but have serious limitations when considering practical deployment, and they have not been broadly adopted. In this paper, we tackle the problem of data revocation from a different pers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Another proposal is to manage the keys within a blockchain [54,10,52] instead of a trusted third party. For Steichen et al [54], the blockchain was used to store the access control list.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another proposal is to manage the keys within a blockchain [54,10,52] instead of a trusted third party. For Steichen et al [54], the blockchain was used to store the access control list.…”
Section: Related Workmentioning
confidence: 99%
“…In distributed storage solutions, common solutions rely on a distributed consensus [34] and generally use a blockchain, but it is sometimes not enough for a single node to make the decision to deliver the piece of data to a user. In this case, Schnitzler et al [52] proposed an incentive to the nodes to revoke the access and delete the pieces of data when needed, but it does not guarantee that Byzantine faults are avoided.…”
Section: Related Workmentioning
confidence: 99%
“…For example, one interface element is to establish an expiration date for information [29], [30], [61]. Users can customize, at the point of disclosure, when their information will be revoked or destroyed [32], [33]. Alternatively, service providers can set a standard expiration date.…”
Section: Finding I: Time As Duration -Age Of Information Technologymentioning
confidence: 99%