Protecting Personal Data with Blockchain Technology

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 738)

Abstract

Service providers depend on the ability to host, analyze, and exchange the personal data of users. Legal and contractual frameworks aim to protect the rights of users regarding this data. However, a confluence of factors render these rights difficult to guarantee. This paper evaluates the potential of blockchain technology as a mechanism for achieving transparency and accountability in the realm of personal data collection.

Keywords

Security Cybersecurity Neural networks Machine learning Network security Intrusion detection Artificial intelligence 

References

  1. 1.
    Data Policy. Facebook, 2017, www.facebook.com/about/privacy
  2. 2.
    Apple Legal—Legal—Privacy Policy—Apple. Apple, Apple Legal, 2017, www.apple.com/legal/privacy/en-ww/
  3. 3.
    Privacy Policy—Privacy & Terms—Google. Google, 2017, www.google.com/policies/privacy
  4. 4.
    Privacy—Microsoft Privacy. Microsoft, 2017, privacy. microsoft.com/en-US
  5. 5.
    Google’s ad revenue from 2001 to 2016 (in billion U.S.dollars). Statista, 2017, www.statista.com/statistics/266249/advertising-revenue-of-google
  6. 6.
    Tam, Donna. Facebook processes more than 500 TB of data daily. CNET, 2012, www.cnet.com/news/facebook-processes-more-than-500-tb-of-data-daily
  7. 7.
    J. Dean, S. Ghemawat, MapReduce: Simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)CrossRefGoogle Scholar
  8. 8.
    Privacy Shield Framework. Privacy Shield, 2017, www.privacyshield.gov/EU-US-Framework
  9. 9.
    Minelli, Michael, et al., Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today’s Businesses, Hoboken, Wiley, 2012, pp. 151–167Google Scholar
  10. 10.
    Your guide to AdWords. Google, 2017, support. google.com/adwords/answer/6146252hl=en&ref_topic=311 9071,3181080,3126923
  11. 11.
    Shute, Jeff, et al., F1: the fault-tolerant distributed RDBMS supporting Google’s Ad business, in Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, 2012, pp. 777–778Google Scholar
  12. 12.
    Protocol Buffers. Google, 2017, developers. google.com/protocol-buffers/docs/overview
  13. 13.
    C. Garcia, Demystifying MapReduce. Procedia Computer Science 20, 484–489 (2013)CrossRefGoogle Scholar
  14. 14.
    Nakamoto, Satoshi. Bitcoin: A Peer-to-Peer Electronic Cash System, Bitcoin, 2008, bitcoin.org/bitcoin.pdf
  15. 15.
    Judmayer, Aljosha, et al, Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms, 2017CrossRefGoogle Scholar
  16. 16.
    Greenleaf, Graham. Global Data Privacy Laws: 89 Countries, and Accelerating. Privacy Laws & Business International Report, no. 115, 2012., papers.ssrn.com/sol3/papers.cfm?abstract_id=2000034
  17. 17.
    Participant Search. Export.gov, International Trade Administration, 2017, www.export.gov/participant_search
  18. 18.
    S. Underwood, Blockchain beyond Bitcoin. Commun. ACM 59(11), 15–17 (2016)CrossRefGoogle Scholar
  19. 19.
    J. Yli-Huumo et al., Where is current research on Blockchain technology?-a systematic review. PLoS One 11(10), e0163477 (2016)CrossRefGoogle Scholar
  20. 20.
    A. Kiayias et al., Ouroboros: A provably secure proof-of-stake Blockchain protocol. Advances in Cryptology 10401 (2017)Google Scholar
  21. 21.
    Mehmood, Abid, et al, Protection of big data privacy. Access, IEEE, vol. 4, 2016, pp. 1821–1834Google Scholar
  22. 22.
    Gao, C., & Iwane, N., A social network model for big data privacy preserving and accountability assurance. in Consumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE, pp. 19–22Google Scholar
  23. 23.
    Backes, Michael, et al, Data lineage in malicious environments. in Dependable and Secure Computing, IEEE Transactions On, vol. 13, no. 2, 2016, pp. 178–191CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer ScienceCalifornia State UniversityFullertonUSA

Personalised recommendations