4.1 Article

A Data Sharing Scheme for GDPR-Compliance Based on Consortium Blockchain

Journal

FUTURE INTERNET
Volume 13, Issue 8, Pages -

Publisher

MDPI
DOI: 10.3390/fi13080217

Keywords

data security; privacy-preservation; big data; blockchain; GDPR

Funding

  1. National Key Research and Development Program of China [2018YFC1604000]
  2. Fundamental Research Funds for the Central Universities [2042017gf0035]

Ask authors/readers for more resources

This study proposes a blockchain-based GDPR compliance data sharing scheme to promote compliance with regulations, ensure user data security, and facilitate interaction between users and service providers. By utilizing the zk-SNARK algorithm to protect data, the scheme ensures confidentiality and availability while preventing malicious behavior from nodes. The scheme's Proof of Authority consensus and reputation incentive mechanism provide mutual authentication and deter nodes from acting maliciously, showcasing efficiency and superior privacy protection compared to other schemes.
After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished financially for this reason. This study proposes a blockchain-based GDPR compliance data sharing scheme, aiming to promote compliance with regulations and provide a tool for interaction between users and service providers to achieve data security sharing. The zero-knowledge Succinct Non-Interactive Arguments of Knowledge (zk-SNARK) algorithm is adopted for protecting data and ensure that the user's private data can satisfy the individual requirements of the service provider without exposing user data. The proposed scheme ensures mutual authentication through the Proof of Authority consensus based on the Committee Endorsement Mechanism (CEM-PoA), and prevents nodes from doing evil using the reputation incentive mechanism. Theoretical analysis and performance comparison indicate that the scheme meets the confidentiality, availability, and other indicators. It has superiority in efficiency and privacy protection compared with other schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.1
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available