Blockchain Enabled Privacy Audit Logs
نویسندگان
چکیده
Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper-proof audit logs that provide proof of log manipulation and non-repudiation. We also provide experimental validation of the scalability of our solution using an existing Linked Data privacy audit log model.
منابع مشابه
A Logical Method for Policy Enforcement over Evolving Audit Logs
We present an iterative algorithm for enforcing policies represented in a first-order logic,which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule.The logic has three features that raise challenges for enforcement — uninterpreted predicates(used to model subjective concepts in privacy policies), real-time temporal properties, and quan-tifica...
متن کاملA Logical Method for Policy Enforcement over Evolving Audit Logs (CMU-CyLab-11-002)
We present an iterative algorithm for enforcing policies represented in a first-order logic,which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule.The logic has three features that raise challenges for enforcement — uninterpreted predicates(used to model subjective concepts in privacy policies), real-time temporal properties, and quan-tifica...
متن کاملImproved Security of Audit Trail Logs in Multi-Tenant Cloud Using ABE Schemes
Cloud computing is delivery of services rather than a product and among different cloud deployment models, the public cloud provides improved scalability and cost reduction when compared to others. Security and privacy of data is one of the key factors in transitioning to cloud. Typically the cloud providers have a demilitarized zone protecting the data center along with a reverse proxy setup. ...
متن کاملThe Challenges and Trends of Deploying Blockchain in the Real World for the Users’ Need
Blockchain technology is a decentralized and open database maintained by a peer-to-peer network, offering a “trustless trust” for untrusted parties. Despite the fact that some researchers consider blockchain as a bubble, blockchain technology has the genuine potential to solve problems across industries. In this article, we provide an overview of the development that Blockchain technology has h...
متن کاملAuditGuard: a system for database auditing under retention restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a historical record of the past that can also pose a serious threat to privacy. In many domains, retention policies govern how long data can be preserved by an institution. Regulations like FERPA and HIPAA (in the U.S.) or th...
متن کامل