2017
DOI: 10.48550/arxiv.1709.10000
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Using Blockchain and smart contracts for secure data provenance management

Abstract: Blockchain technology has evolved from being an immutable ledger of transactions for cryptocurrencies to a programmable interactive environment for building distributed reliable applications. Although, blockchain technology has been used to address various challenges, to our knowledge none of the previous work focused on using blockchain to develop a secure and immutable scientific data provenance management framework that automatically verifies the provenance records. In this work, we leverage blockchain as a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(24 citation statements)
references
References 9 publications
0
24
0
Order By: Relevance
“…• To diagnose data forgery during data transition, potential solutions involve, i) reliance on provenance data to identify the faulty entity in the underlying chained processes and ii) leveraging twinned data to identify anomalies in the system that can be detected based on the digital-physical mapping. • To identify a rogue participating entity through, i) issuing or revoking participation certificates by conducting a periodic on-site inspection of the units to ascertain that industrial processes are abiding by environment-friendly operations and ethical practices, and ii) deploying a monetary punishment mechanism [70] to reward honest entities while penalizing or revoking trader's participation.…”
Section: Trustworthy Sourcesmentioning
confidence: 99%
“…• To diagnose data forgery during data transition, potential solutions involve, i) reliance on provenance data to identify the faulty entity in the underlying chained processes and ii) leveraging twinned data to identify anomalies in the system that can be detected based on the digital-physical mapping. • To identify a rogue participating entity through, i) issuing or revoking participation certificates by conducting a periodic on-site inspection of the units to ascertain that industrial processes are abiding by environment-friendly operations and ethical practices, and ii) deploying a monetary punishment mechanism [70] to reward honest entities while penalizing or revoking trader's participation.…”
Section: Trustworthy Sourcesmentioning
confidence: 99%
“…It would record different parties' actions to change the data and store the records on the blockchain using smart contracts. The proposed architecture in [29] using on-chain voting smart contract protects the document against unauthorized users or changes that are not verified by the majority of authorized users.…”
Section: Blockchainmentioning
confidence: 99%
“…Additionally, DRM technologies do not allow for researchers to comply with the GDPR rights to access, rectification and erasure, which is necessary when they share data pertaining to individuals. Data provenance are the meta-data describing the history of data, such as where they originate from, their owner and the changes made to them, as well as by whom these changes were made [22,14]. DataProv [22] and ProvChain [14] are both blockchainbased solution for data provenance accountability.…”
Section: Related Workmentioning
confidence: 99%
“…Data provenance are the meta-data describing the history of data, such as where they originate from, their owner and the changes made to them, as well as by whom these changes were made [22,14]. DataProv [22] and ProvChain [14] are both blockchainbased solution for data provenance accountability. Once collected, data provenance records are published to the blockchain network, verified and eventually added to the blockchain.…”
Section: Related Workmentioning
confidence: 99%