A systematic literature review on sensitive data protection in blockchain applications

被引:6
作者
Khanum, Saba [1 ,2 ]
Mustafa, Khurram [2 ]
机构
[1] MSIT, Delhi, India
[2] JMI, Delhi, India
关键词
blockchain; cryptocurrency; distributed ledger; protection; security; TECHNOLOGY; SECURITY;
D O I
10.1002/cpe.7422
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Since inception, blockchain has earned significant attention due to its exclusive characteristics and advantages. It has changed the way the transactions are conducted by eradicating the role of third parties and promises to ensure trust among the participants. This technology is emerging as a potential solution to several issues but not without certain security vulnerabilities. In particular, protection of sensitive data is a more critical issue in the absence of a third party. This paper is aimed to report and share the state of the art of sensitive data protection in blockchain applications. The covered aspects include identification of sensitive data, existing techniques to protect sensitive data and to know how real time data compromised by security risks, attacks, threats and vulnerabilities concerning blockchain applications. This paper analysis the tools and techniques used in the past for protecting sensitive data and categorized them. On the basis of research and intuitive findings, methods and techniques are elaborated which can contribute in future in the designing a framework for protection of sensitive data in blockchain applications.
引用
收藏
页数:23
相关论文
共 145 条
[11]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[12]   Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain [J].
Augot, Daniel ;
Chabanne, Herve ;
Clemot, Olivier ;
George, William .
2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, :25-34
[13]  
Azarias D., 2020, COMPREHENSIVE LIST C
[14]  
Back Adam, 1997, Hashcash
[15]   Decentralized privacy preserving services for Online Social Networks [J].
Bahri, Leila ;
Carminati, Barbara ;
Ferrari, Elena .
Online Social Networks and Media, 2018, 6 :18-25
[16]  
Bahrynovska T., 2017, History of Ethereum Security Vulnerabilities, Hacks and Their Fixes
[17]  
BellesMunoz MB, 2021, NEW PRIVACY PRACTICE
[18]   Revisiting the governance of privacy: Contemporary policy instruments in global perspective [J].
Bennett, Colin J. ;
Raab, Charles D. .
REGULATION & GOVERNANCE, 2020, 14 (03) :447-464
[19]   Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash [J].
Biryukov, Alex ;
Tikhomirov, Sergei .
PERVASIVE AND MOBILE COMPUTING, 2019, 59
[20]   Analysis of barriers to implement blockchain in industry and service sectors [J].
Biswas, Baidyanath ;
Gupta, Rohit .
COMPUTERS & INDUSTRIAL ENGINEERING, 2019, 136 :225-241