Blockchain Enabled Privacy Audit Logs

نویسندگان

  • Andrew Sutton
  • Reza Samavi
چکیده

Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper-proof audit logs that provide proof of log manipulation and non-repudiation. We also provide experimental validation of the scalability of our solution using an existing Linked Data privacy audit log model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Logical Method for Policy Enforcement over Evolving Audit Logs

We present an iterative algorithm for enforcing policies represented in a first-order logic,which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule.The logic has three features that raise challenges for enforcement — uninterpreted predicates(used to model subjective concepts in privacy policies), real-time temporal properties, and quan-tifica...

متن کامل

A Logical Method for Policy Enforcement over Evolving Audit Logs (CMU-CyLab-11-002)

We present an iterative algorithm for enforcing policies represented in a first-order logic,which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule.The logic has three features that raise challenges for enforcement — uninterpreted predicates(used to model subjective concepts in privacy policies), real-time temporal properties, and quan-tifica...

متن کامل

Improved Security of Audit Trail Logs in Multi-Tenant Cloud Using ABE Schemes

Cloud computing is delivery of services rather than a product and among different cloud deployment models, the public cloud provides improved scalability and cost reduction when compared to others. Security and privacy of data is one of the key factors in transitioning to cloud. Typically the cloud providers have a demilitarized zone protecting the data center along with a reverse proxy setup. ...

متن کامل

The Challenges and Trends of Deploying Blockchain in the Real World for the Users’ Need

Blockchain technology is a decentralized and open database maintained by a peer-to-peer network, offering a “trustless trust” for untrusted parties. Despite the fact that some researchers consider blockchain as a bubble, blockchain technology has the genuine potential to solve problems across industries. In this article, we provide an overview of the development that Blockchain technology has h...

متن کامل

AuditGuard: a system for database auditing under retention restrictions

Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a historical record of the past that can also pose a serious threat to privacy. In many domains, retention policies govern how long data can be preserved by an institution. Regulations like FERPA and HIPAA (in the U.S.) or th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017