Blockchain Enabled Privacy Audit Logs

被引:42
作者
Sutton, Andrew [1 ]
Samavi, Reza [1 ]
机构
[1] McMaster Univ, Dept Comp & Software, 1280 Main St West, Hamilton, ON L8S 4K1, Canada
来源
SEMANTIC WEB - ISWC 2017, PT I | 2017年 / 10587卷
基金
加拿大自然科学与工程研究理事会;
关键词
Blockchain; Privacy audit log; RDF signatures; Bitcoin; Tamper-proof; Linked Data; Semantic Web; DSA; Privacy;
D O I
10.1007/978-3-319-68288-4_38
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper-proof audit logs that provide proof of log manipulation and non-repudiation. We also provide experimental validation of the scalability of our solution using an existing Linked Data privacy audit log model.
引用
收藏
页码:645 / 660
页数:16
相关论文
共 35 条
[1]  
Accorsi Rafael, 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC 2009), P398, DOI 10.1109/COMPSAC.2009.166
[2]  
Agrawal Rakesh., 2007, P INT C MANAGEMENT D, P79
[3]  
Anderson Nicolai., 2016, Blockchain technology: a game-change in accounting?
[4]  
[Anonymous], P WORKSH LINK DAT WE
[5]  
[Anonymous], TECHNICAL REPORT
[6]  
Antonopoulos A. M., 2017, Mastering Bitcoin: Unlocking Digital Cryptocurrencies, V2nd
[7]  
Bizer C., 2013, TRIG RDF DATASET LAN
[8]  
Buterin V., 2013, NEXT GENERATION SMAR
[9]   Log Design for Accountability [J].
Butin, Denis ;
Chicote, Marcos ;
Le Metayer, Daniel .
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, :1-7
[10]   Named graphs [J].
Carroll, JJ ;
Bizer, C ;
Hayes, P ;
Stickler, P .
JOURNAL OF WEB SEMANTICS, 2005, 3 (04) :247-267