Related references
Note: Only part of the references are listed.
Article
Computer Science, Hardware & Architecture
Gislaine Parra Freund et al.
Summary: This article analyzes the privacy principles of personal data under the General Data Protection Regulation and the treatment of data in Blockchain technology, guided by the phases of the Data Life Cycle. By considering the phases of the Data Lifecycle, it was possible to identify the influence on compliance with legislation and treatment of data performed on Blockchain technology. The results of this analysis can be used as a support tool for organizations to systematize the process of adapting to the law.
MOBILE NETWORKS & APPLICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Hui Lu et al.
Summary: This article proposes a solution to combat attacks targeting blockchain wallet applications, by implementing an unpacking system in Android ART to restore Dex files. The method successfully repairs the function-extracting protection component in Dex, eliminating the risk of malicious code hiding.
Article
Computer Science, Information Systems
Geetanjali Rathee et al.
Summary: Industrial Internet-of-Things (IIoT) utilizes connected machines for real-time data collection, analysis, recording, and control of activities to enhance quality and reduce production costs. Despite existing schemes, there are concerns with current systems and IoT devices are vulnerable to attacks. Blockchain offers protection and secrecy to address these issues, with a proposed hybrid mechanism showing significant efficiency improvements in security metrics.
INFORMATION PROCESSING & MANAGEMENT
(2021)
Article
Computer Science, Information Systems
Lelio Campanile et al.
Summary: Blockchain technology and distributed ledgers can be used to create trustable data logging systems for Internet of Vehicles, improving safety and legal issues. However, privacy concerns must be considered, as tracked information may include private, commercial, and sensitive data.
INFORMATION PROCESSING & MANAGEMENT
(2021)
Article
Automation & Control Systems
Dongliang Xu et al.
Summary: This study proposes a multi-candidate voting model based on blockchain technology, which solves the problems in traditional electronic voting by introducing encryption and anonymity protection algorithms, displaying real-time voting results while satisfying voting security and privacy requirements.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA
(2021)
Article
Computer Science, Information Systems
Liang Tan et al.
Summary: The Green Internet of things (GIoT) is a new generation design concept that aims to save energy and reduce emissions through green smart devices (GSD). However, the lack of a unified GSD management system has made user access and control of heterogeneous GSDs more complex. To address this problem, a blockchain-empowered general GSD access control framework was proposed, providing users with a unified platform for managing GSDs.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY
(2021)
Proceedings Paper
Computer Science, Information Systems
Hauke Precht et al.
Summary: This paper provides an overview of the current research areas surrounding GDPR and blockchain, showing that GDPR is often considered a limitation for blockchain use cases but also how data protection for data subjects is improving with blockchain technology. The evaluation of a GDPR enforcing blockchain using smart contracts within Hyperledger Fabric is discussed, emphasizing the need to further evaluate and combine different research areas in order to create GDPR enforcing blockchain systems.
INNOVATION THROUGH INFORMATION SYSTEMS, VOL II: A COLLECTION OF LATEST RESEARCH ON TECHNOLOGY ISSUES
(2021)
Article
Computer Science, Information Systems
Yangheran Piao et al.
Summary: This study proposes a blockchain-based GDPR compliance data sharing scheme to promote compliance with regulations, ensure user data security, and facilitate interaction between users and service providers. By utilizing the zk-SNARK algorithm to protect data, the scheme ensures confidentiality and availability while preventing malicious behavior from nodes. The scheme's Proof of Authority consensus and reputation incentive mechanism provide mutual authentication and deter nodes from acting maliciously, showcasing efficiency and superior privacy protection compared to other schemes.
Proceedings Paper
Computer Science, Information Systems
Michelle Poelman et al.
Summary: Researchers investigated whether blockchain can comply with GDPR, with results showing different views from purists and fundamentalists, indicating no definitive answer on this issue.
2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP)
(2021)
Proceedings Paper
Computer Science, Information Systems
Michael Kuperberg
2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020)
(2020)
Article
Computer Science, Theory & Methods
Nguyen Binh Truong et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2020)
Article
Computer Science, Information Systems
Xianji Cai et al.
Article
Computer Science, Information Systems
Zhihong Tian et al.
INFORMATION SCIENCES
(2019)
Proceedings Paper
Computer Science, Theory & Methods
Martin Florian et al.
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW)
(2019)
Proceedings Paper
Engineering, Electrical & Electronic
Kondapally Ashritha et al.
2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS)
(2019)
Proceedings Paper
Computer Science, Information Systems
Giuseppe Ateniese et al.
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P)
(2017)