GDPR-Compliant Use of Blockchain for Secure Usage Logs

04/20/2021
by   Valentin Zieglmeier, et al.
0

The unique properties of blockchain enable central requirements of distributed secure logging: Immutability, integrity, and availability. Especially when providing transparency about data usages, a blockchain-based secure log can be beneficial, as no trusted third party is required. Yet, with data governed by privacy legislation such as the GDPR or CCPA, the core advantage of immutability becomes a liability. After a rightful request, an individual's personal data need to be rectified or deleted, which is impossible in an immutable blockchain. To solve this issue, we exploit a legal property of pseudonymized data: They are only regarded personal data if they can be associated with an individual's identity. We make use of this fact by presenting P3, a pseudonym provisioning system for secure usage logs including a protocol for recording new usages. For each new block, a one-time transaction pseudonym is generated. The pseudonym generation algorithm guarantees unlinkability and enables proof of ownership. These properties enable GDPR-compliant use of blockchain, as data subjects can exercise their legal rights with regards to their personal data. The new-usage protocol ensures non-repudiation, and therefore accountability and liability. Most importantly, our approach does not require a trusted third party and is independent of the utilized blockchain software.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/21/2023

Decentralized Inverse Transparency With Blockchain

Employee data can be used to facilitate work, but their misusage may pos...
research
11/28/2019

Randpay: The Technology for Blockchain Micropayments and Transactions Which Require Recipient's Consent

Randpay is a technology developed in Emercoin for blockchain micropaymen...
research
04/17/2019

Truxen: A Trusted Computing Enhanced Blockchain

Truxen is a Trusted Computing enhanced blockchain that uses Proof of Int...
research
09/13/2019

A transparent referendum protocol with immutable proceedings and verifiable outcome for trustless networks

High voter turnout in elections and referendums is very desirable in ord...
research
07/21/2019

Secure and Transparent Audit Logs with BlockAudit

Audit logs serve as a critical component in enterprise business systems ...
research
03/30/2019

NEWSTRADCOIN: A Blockchain Based Privacy Preserving Secure NEWS Trading Network

In order to stay up to date with world issues and cutting-edge technol-o...
research
05/21/2022

All You Need Is Logs: Improving Code Completion by Learning from Anonymous IDE Usage Logs

Integrated Development Environments (IDE) are designed to make users mor...

Please sign up or login with your details

Forgot password? Click here to reset