TY - GEN
T1 - A blockchain-based data usage auditing architecture with enhanced privacy and availability
AU - Kaaniche, Nesrine
AU - Laurent, Maryline
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/12/8
Y1 - 2017/12/8
N2 - Recent years have witnessed the trend of increasingly relying on distributed infrastructures. This increased the number of reported incidents of security breaches compromising users' privacy, where third parties massively collect, process and manage users' personal data. Towards these security and privacy challenges, we combine hierarchical identity based cryptographic mechanisms with emerging blockchain infrastructures and propose a blockchain-based data usage auditing architecture ensuring availability and accountability in a privacy-preserving fashion. Our approach relies on the use of auditable contracts deployed in blockchain infrastructures. Thus, it offers transparent and controlled data access, sharing and processing, so that unauthorized users or untrusted servers cannot process data without client's authorization. Moreover, based on cryptographic mechanisms, our solution preserves privacy of data owners and ensures secrecy for shared data with multiple service providers. It also provides auditing authorities with tamper-proof evidences for data usage compliance.
AB - Recent years have witnessed the trend of increasingly relying on distributed infrastructures. This increased the number of reported incidents of security breaches compromising users' privacy, where third parties massively collect, process and manage users' personal data. Towards these security and privacy challenges, we combine hierarchical identity based cryptographic mechanisms with emerging blockchain infrastructures and propose a blockchain-based data usage auditing architecture ensuring availability and accountability in a privacy-preserving fashion. Our approach relies on the use of auditable contracts deployed in blockchain infrastructures. Thus, it offers transparent and controlled data access, sharing and processing, so that unauthorized users or untrusted servers cannot process data without client's authorization. Moreover, based on cryptographic mechanisms, our solution preserves privacy of data owners and ensures secrecy for shared data with multiple service providers. It also provides auditing authorities with tamper-proof evidences for data usage compliance.
U2 - 10.1109/NCA.2017.8171384
DO - 10.1109/NCA.2017.8171384
M3 - Conference contribution
AN - SCOPUS:85046552513
T3 - 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017
SP - 1
EP - 5
BT - 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017
A2 - Avresky, Dimiter R.
A2 - Gkoulalas-Divanis, Aris
A2 - Avresky, Dimiter R.
A2 - Correia, Miguel P.
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 16th IEEE International Symposium on Network Computing and Applications, NCA 2017
Y2 - 30 October 2017 through 1 November 2017
ER -