Blockchain Enabled Privacy Audit Logs

被引:43
作者
Sutton, Andrew [1 ]
Samavi, Reza [1 ]
机构
[1] McMaster Univ, Dept Comp & Software, 1280 Main St West, Hamilton, ON L8S 4K1, Canada
来源
SEMANTIC WEB - ISWC 2017, PT I | 2017年 / 10587卷
基金
加拿大自然科学与工程研究理事会;
关键词
Blockchain; Privacy audit log; RDF signatures; Bitcoin; Tamper-proof; Linked Data; Semantic Web; DSA; Privacy;
D O I
10.1007/978-3-319-68288-4_38
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper-proof audit logs that provide proof of log manipulation and non-repudiation. We also provide experimental validation of the scalability of our solution using an existing Linked Data privacy audit log model.
引用
收藏
页码:645 / 660
页数:16
相关论文
共 35 条
[21]  
Manu S, 2017, LINK DAT DISTR LEDG
[22]  
Merkle R. C., 1980, Proceedings of the 1980 Symposium on Security and Privacy, P122
[23]  
Nakamoto S., 2008, Bitcoin: A Peer-to-Peer Electronic Cash System
[24]  
OpenLink Software, VIRT UN SERV
[25]  
Pilkington M, 2016, RESEARCH HANDBOOK ON DIGITAL TRANSFORMATIONS, P225
[26]  
Rodriguez A., 2008, RESTful Web services: The basics, V33, P18, DOI DOI 10.1115/1.4026392
[27]   L2TAP+SCIP: An Audit-based Privacy Framework Leveraging Linked Data [J].
Samavi, Reza ;
Consens, Mariano P. .
PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, :719-726
[28]  
Sambra A., 2014, Webid 1.0, web identity and discovery
[29]  
Sayers C., 2004, TECHNICAL REPORT
[30]  
Spoke M., 2015, BLOCKCHAIN TECH WILL