Abstract
With the development of ICT technology, users are actively participated in content creation and sharing. Service providers have provided more diverse and extensive information services. With the recent evolution to a customized service, the demand for the use of personal information is increasing. However, it affects the efficiency and convenience of service provision, as social problems and security threats such as personal information leakage, human trafficking, and misuse increase. In this article, we proposed an intelligent mediator-based enhanced smart contract for privacy protection. The proposed approach performs the tasks, which are mediation transactions, authorization, and transaction record management, with blockchain-based personal information management. Then it is possible to prevent misuse of personal information and to support rational decision-making on the transparency of information and the use of personal information by autonomously performing personal information management.
- J. Barcelo. 2014. User privacy in the public bitcoin blockchain. Retrieved from http://www.dtic.upf.edu/∼jbarcelo/papers/20140704_User_Privacy_in_the_Public_Bitcoin_Blockchain/paper.pdf.Google Scholar
- I. Bilogrevic, K. Huguenin, B. Agir, M. Jadliwala, M. Gazaki, and J. P. Hubaux. 2016. A machine learning based approach to privacy-aware information-sharing in mobile social networks. Pervas. Mob. Comput. 25, 125--142.Google Scholar
Digital Library
- V. Buterin. 2014. A next-generation smart contract and decentralized application platform. Retrieved from https://github.com/ethereum/wiki/wiki/White-Paper.Google Scholar
- C. Cadwalladr and E. Graham-Harrison. 2018. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian 17, 22. https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election.Google Scholar
- S. De Angelis. 2018. Assessing security and performances of consensus algorithms for permissioned blockchains. Arxiv Preprint Arxiv:1805.03490. (2018).Google Scholar
- I. Eyal, A. E. Gencer, E. G. Sirer, and R. Van Renesse. 2016. Bitcoin-NG: A scalable blockchain protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16). 45--59.Google Scholar
- A. Guadamuz and C. Marsden. 2015. Blockchains and bitcoin: Regulatory responses to cryptocurrencies. First Mond. 20 (12-7). Retrieved from https://ssrn.com/abstract=2704852.Google Scholar
- V. C. Hu, D. R. Kuhn, D. F. Ferraiolo, and J. Voas. 2015. Attribute-based access control. Computer 48, 2 (2015), 85--88.Google Scholar
Digital Library
- N. Kaaniche and M. Laurent. 2017. A blockchain-based data usage auditing architecture with enhanced privacy and availability. In Proceedings of the IEEE 16th International Symposium on Network Computing and Applications (NCA’17). 1--5.Google Scholar
- M. Kim and S. O. Park. 2013. Group affinity based social trust model for an intelligent movie recommender system. Multim. Tools Applic. 64, 2 (2013), 505--516.Google Scholar
Digital Library
- M. Kim, J. Seo, S. Noh, and S. Han. 2012. Identity management-based social trust model for mediating information sharing and privacy enhancement. Secur. Commun. Netw. 5, 8 (2012), 887--897.Google Scholar
Digital Library
- Korea Law Information Center. 2018. degree of the Personal Information Protection Act/(20190101,29421,20181224)/ Retrieved from https://www.law.go.kr/LSW/eng/engLsSc.do?menuId=28section=lawNm8query=degree+of+the+Personal+Information+Protection8x=208y=27#liBgcolor17.Google Scholar
- A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou. 2016. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of the IEEE Symposium on Security and Privacy (SP’16). 839--858.Google Scholar
- X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, and L. Njilla. 2017. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. 468--477. IEEE Press.Google Scholar
- P. Maymounkov and D. Mazieres. 2002. Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of the International Workshop on Peer-to-peer Systems, Vol. 2429. 53--65. Springer, Berlin. DOI:https://doi.org/10.1007/3-540-45748-8_5Google Scholar
- R. Mercer. 2016. Privacy on the blockchain: Unique ring signatures. ArXiv Preprint Arxiv:1612.01188. (2016).Google Scholar
- Ministry of the Interior and Safety. 2018. 2018 Privacy Protection Survey Report (Report No.: 11-1312000-000035-10), Ministry of the Interior and Safety, 115--134. https://www.korea.kr/archive/expDocView.do?docId=39045Google Scholar
- S. Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Retrieved from https://bitcoin.org/bitcoin.pdf.Google Scholar
- S. Nathan, C. Govindarajan, A. Saraf, M. Sethi, and P. Jayachandran. 2019. Blockchain meets database: Design and implementation of a blockchain relational database. Proc. VLDB Endow. 12, 11 (1539--1552).Google Scholar
- A. Ouaddah, A. Abou Elkalam, and A. Ait Ouahman. 2016. FairAccess: A new blockchain-based access control framework for the internet of things. Secur. Commun. Netw. 9, 18 (2016), 5943--5964.Google Scholar
Cross Ref
- A. Passant, P. Laublet, J. G. Breslin, and S. Decker. 2009. A URI is worth a thousand tags: From tagging to linked data with MOAT. Int. J. Semant. Web Inf. Syst. 5, 3 (2009), 71--94. DOI:10.4018/jswis.2009081904Google Scholar
Cross Ref
- J. Poon and V. Buterin. 2018. Plasma: Scalable autonomous smart contracts. Retrieved from https://plasma.io, 72.Google Scholar
- J. Poon and T. Dryja. 2016. The bitcoin lightning network: Scalable off-chain instant payments. Retrieved from https://lightning.network/lightning-network-paper.pdf.Google Scholar
- K. Rantos, G. Drosatos, K. Demertzis, C. Ilioudis, and A. Papanikolaou. 2018. Blockchain-based consents management for personal data processing in the IoT ecosystem. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. 738--743. DOI:https://doi.org/10.5220/0006911007380743Google Scholar
- J. Teutsch and C. Reitwießner. 2019. A scalable verification solution for blockchains. Arxiv Preprint Arxiv:1908.04756. (2019).Google Scholar
- G. Zyskind and O. Nathan. 2015. Decentralizing privacy: Using blockchain to protect personal data. In Proceedings of the IEEE Security and Privacy Workshops. 180--184.Google Scholar
Index Terms
Intelligent Mediator-based Enhanced Smart Contract for Privacy Protection
Recommendations
Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks
Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533Online Social Networks (OSNs) such as Facebook, Twitter, and so on recently are major impact in communication and social interaction. Users can share any information with others. However, they have concerns about losing privacy due to lack of an ...
Privacy Breaches in Smart Contract due to Solidity Language and its Protection
ICFNDS 2021: The 5th International Conference on Future Networks & Distributed SystemsAbstract - Smart contracts are essentially agreements between two parties, and the information included within them must be kept private and not shared with the outside community. Simultaneously, the most typical smart contract systems’ public nature ...
User-Directed Privacy Protection in the Ubiquitous Environment
EUC '08: Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02In the ubiquitous environment, when a user obtains services from a domain and goes between domains, there is a need to move freely and have services provided continuously. Also, the service provider wants to authenticate a user easily. But a serious ...






Comments