Additionally, the DPMS improves the users’ pri-
vacy and protects them from data leakages, as it takes
the data away from the service providers and places
the data in a secured peer-to-peer system. However,
a few limitations still must be addressed before our
system can be deployed for public use.
Trusted computing modules and a verified client
software might be used to stop service providers from
locally storing the user data.
Time spent searching transactions could be re-
duced by using an external index, that allows to find
blocks and transactions with reasonable efficiency.
The system could be extended to allow services to
write data into users’ data sets. Allowing the user to
share data between different services, e.g. shared im-
ages or computed interests could be shared between
multiple social media platforms.
In the future the suggested distributed hash table
could be specified in more detail. Once the DHT is
specified, an implementation of the system would be
possible. The implemented system can then be used
to evaluate the proposed approach of managing per-
sonal data.
Future work could also investigate other storage
systems like the inter planetary file system (IPFS)
6
to
replace the DHT.
Instead of sharing the encryption key directly via
an encrypted connection a group key management
method could be used. Examples for such methods
are the certificateless public key cryptography (Al-
Riyami and Paterson, 2003) or attribute-based group
key management (Nabeel and Bertino, 2014).
REFERENCES
Al-Riyami, S. S. and Paterson, K. G. (2003). Certificateless
public key cryptography. In International Conference
on the Theory and Application of Cryptology and In-
formation Security, pages 452–473. Springer.
Dworkin, M. J. (2015). SHA-3 standard: Permutation-
based hash and extendable-output functions. Stan-
dard, Federal Information Processing Standards.
Kiayias, A., Russell, A., David, B., and Oliynykov, R.
(2017). Ouroboros: A provably secure proof-of-stake
blockchain protocol. In Advances in Cryptology –
CRYPTO 2017, pages 357–388. Springer International
Publishing.
Maymounkov, P. and Mazi
`
eres, D. (2002). Kademlia: A
peer-to-peer information system based on the xor met-
ric. Lecture Notes in Computer Science, 2429:53–65.
Nabeel, M. and Bertino, E. (2014). Attribute based group
key management. Transactions on Data Privacy, 7(3).
6
https://ipfs.io/
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic
cash system. https://bitcoin.org/bitcoin.pdf.
Norta, A., Hawthorne, D., and Engel, S. L. (2018).
A privacy-protecting data-exchange wallet with
ownership-and monetization capabilities. In 2018
International Joint Conference on Neural Networks
(IJCNN), pages 1–8. IEEE.
Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., and
Balakrishnan, H. (2001). Chord: A scalable peer-to-
peer lookup service for internet applications. Acm Sig-
comm Computer Communication Review, 31(4):149–
160.
Xia, Q., Sifah, E. B., Smahi, A., Amofa, S., and Zhang,
X. S. (2017). Bbds: Blockchain-based data sharing
for electronic medical records in cloud environments.
Information, 8(2):44.
Yli-Huumo, J., Ko, D., Choi, S., Park, S., and Smolan-
der, K. (2016). Where is current research on
blockchain technology?-a systematic review. PLoS
One, 11(10):e0163477.
Yue, X., Wang, H. J., Jin, D. W., Li, M. Q., and Jiang,
W. (2016). Healthcare data gateways: Found health-
care intelligence on blockchain with novel privacy risk
control. Journal of Medical Systems, 40(10):218.
Zhang, N., Li, J., Lou, W., and Hou, Y. T. (2018). Privacy-
guard: Enforcing private data usage with blockchain
and attested execution. In Data Privacy Management,
Cryptocurrencies and Blockchain Technology, pages
345–353. Springer International Publishing.
Zyskind, G., Nathan, O., and Pentland, A. (2015a). De-
centralizing privacy: Using blockchain to protect per-
sonal data. In 2015 IEEE Security and Privacy Work-
shops, pages 180–184.
Zyskind, G., Nathan, O., and Pentland, A. (2015b). Enigma:
Decentralized computation platform with guaranteed
privacy. https://arxiv.org/pdf/1506.03471.pdf.
Architecture to Manage and Protect Personal Data Utilising Blockchain
349