A systematic literature review on sensitive data protection in blockchain applications

被引:6
作者
Khanum, Saba [1 ,2 ]
Mustafa, Khurram [2 ]
机构
[1] MSIT, Delhi, India
[2] JMI, Delhi, India
关键词
blockchain; cryptocurrency; distributed ledger; protection; security; TECHNOLOGY; SECURITY;
D O I
10.1002/cpe.7422
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Since inception, blockchain has earned significant attention due to its exclusive characteristics and advantages. It has changed the way the transactions are conducted by eradicating the role of third parties and promises to ensure trust among the participants. This technology is emerging as a potential solution to several issues but not without certain security vulnerabilities. In particular, protection of sensitive data is a more critical issue in the absence of a third party. This paper is aimed to report and share the state of the art of sensitive data protection in blockchain applications. The covered aspects include identification of sensitive data, existing techniques to protect sensitive data and to know how real time data compromised by security risks, attacks, threats and vulnerabilities concerning blockchain applications. This paper analysis the tools and techniques used in the past for protecting sensitive data and categorized them. On the basis of research and intuitive findings, methods and techniques are elaborated which can contribute in future in the designing a framework for protection of sensitive data in blockchain applications.
引用
收藏
页数:23
相关论文
共 145 条
[1]  
Abd Halim N S, 2017, INT C REL INF COMM T, P739
[2]  
Adkins DA., 2020, 2 ACM C ADV FINANCIA
[3]  
Aileni RS, 2020, DECENTRALISED INTERN, V71
[4]   Framework of data privacy preservation and location obfuscation in vehicular cloud networks [J].
Al-Balasmeh, Hani ;
Singh, Maninder ;
Singh, Raman .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05)
[5]   A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filter [J].
Al-Tariq, Abdullah ;
Kamal, Abu Raihan Mostofa ;
Hamid, Md. Abdul ;
Abdullah-Al-Wadud, M. ;
Hassan, Mohammad Mehedi ;
Rahman, S. K. Md. Mizanur .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23)
[6]   A Decentralized Personal Data Store based on Ethereum: Towards GDPR Compliance [J].
Alessi, Marco ;
Camillo, Alessio ;
Giangreco, Enza ;
Matera, Marco ;
Pino, Stefano ;
Storelli, Davide .
JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2019, 15 (02) :79-88
[7]   User perception of Bitcoin usability and security across novice users [J].
Alshamsi, Abdulla ;
Andras, Peter .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 126 :94-110
[8]  
Amo D, 2019, ADV INTELL SYST COMP, V932, P371, DOI 10.1007/978-3-030-16187-3_36
[9]   Virtual Private Ledgers: Embedding Private Distributed Ledgers over a Public Blockchain by Cryptography [J].
Arena, Antonio ;
Perazzo, Pericle ;
Dini, Gianluca .
IDEAS '19: PROCEEDINGS OF THE 23RD INTERNATIONAL DATABASE APPLICATIONS & ENGINEERING SYMPOSIUM (IDEAS 2019), 2019, :78-86
[10]  
Asma Alnemari SV., 2018, INT FEDERATION INFOR, P113