PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Protection of personal data using blockchain

Treść / Zawartość
Identyfikatory
Warianty tytułu
PL
Ochrona danych wrażliwych z wykorzystaniem blockchai
Języki publikacji
EN
Abstrakty
EN
The presented document is a scientific and technical proposal of the possibility of using blockchain in the process of protection of personal data on the Internet and inside IT systems. The key aspects of this proposal along with most pros and cons are discussed within this article. A brief discussion of prototype of proposed solution is also included.
PL
Prezentowany artykuł podejmuje dyskusję nad naukowymi i technicznymi możliwościami wykorzystania sieci blockchain w procesie ochrony danych osobowych. W artykule przedstawiono kluczowe aspekty proponowanego pomysłu, jak również większość zalet i wad. Zawarto również krótkie omówienie możliwego prototypu proponowanego rozwiązania.
Słowa kluczowe
Rocznik
Tom
Strony
89--100
Opis fizyczny
Bibliogr. 17 poz.
Twórcy
  • student, Katowice School of Technology
  • Katowice School of Technology
  • Katowice School of Technology
Bibliografia
  • [1] Stevens, G. (10 April 2012). “Data Security Breach Notification Laws”. Congressional Research Service 7-5700, R42475. Page 10. Available at: www.sgp.fas.org/crs/misc/R42475.pdf. Retrieved 8 June 2022.
  • [2] McCallister E., Grance T., Scarfone K.: “Guide to Protecting the Confidentiality of Personally Identifiable Infor-mation (PII)”. National Institute of Standards and Technology, NIST Special Publication 800-122. Page B-1. Avail-able at: www.nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf. Retrieved 8 June 2022.
  • [3] “Personal Data”. General Data Protection Regulation (GDPR). Available at www.gdpr-info.eu/issues/personal-data/. Retrieved 21 May 2022.
  • [4] Morris, David Z. (15 May 2016). “Leaderless, Blockchain-Based Venture Capital Fund Raises $100 Million, And Counting”. Fortune. Available at www.fortune.com/2016/05/15/leaderless-blockchain-vc-fund/. Retrieved 23 May 2022.
  • [5] Wikipedia contributors. (7 June 2022). “Blockchain”. In Wikipedia, The Free Encyclopedia. Available at www.en.wikipedia.org/w/index.php?title=Blockchain&oldid=1091997775. Retrieved 12 June 2022.
  • [6] Elrom, Elad (2019). The Blockchain Developer., Apress, www.doi.org/10.1007/978-1-4842-4847-8
  • [7] Fries, Martin; P. Paal, Boris (2019). Smart Contracts (in German). Mohr Siebeck. ISBN 978-3-16-156911-1
  • [8] Kuner, Christopher, Bygrave, Lee A., & Docksey, Christopher (2020). Background and Evolution of the EU General Data Protection Regulation (GDPR). The EU General Data Protection Regulation (GDPR), Oxford University Press, <www.doi.org/10.1093/oso/9780198826491.003.0001>
  • [9] Kornblum, Jesse D. (2009). Implementing BitLocker Drive Encryption for forensic analysis. Digital Investigation, 5(3), 75-84, ISSN 1742-2876, Elsevier BV, <www.doi.org/10.1016/j.diin.2009.01.001>
  • [10] Martin, Keith M. (2017). Public-Key Management. Oxford Scholarship Online, Oxford University Press, <www.doi.org/10.1093/oso/9780198788003.003.0011>
  • [11] Besancon, Leo, Silva, Catarina Ferreira Da, Ghodous, Parisa, & Gelas, Jean-Patrick (2022). A Blockchain Ontology for DApps Development. IEEE Access, 10, 49905-49933, ISSN 2169-3536, Institute of Electrical and Electronics Engineers (IEEE), <www.doi.org/10.1109/access.2022.3173313>
  • [12] Metcalfe, William (2020). Ethereum, Smart Contracts, DApps. Economics, Law, and Institutions in Asia Pacific, 77-93, ISSN 2199-8620, Springer Singapore, <www.doi.org/10.1007/978-981-15-3376-1_5>
  • [13] Gallersdörfer, Ulrich, Ebel, Jonas, & Matthes, Florian (2022). Augmenting MetaMask to Support TLS-endorsed Smart Contracts. Lecture Notes in Computer Science, 227-244, ISSN 0302-9743, Springer International Publishing, <www.doi.org/10.1007/978-3-030-93944-1_15>
  • [14] Lee, Wei-Meng (2019). Using the MetaMask Chrome Extension. Beginning Ethereum Smart Contracts Program-ming, 93-126, Apress, <www.doi.org/10.1007/978-1-4842-5086-0_5>
  • [15] Kazerani, Ali, Rosati, Domenic, & Lesser, Brian (2017). Determining the usability of bitcoin for beginners using change tip and coinbase. Proceedings of the 35th ACM International Conference on the Design of Communication, ACM, <www.doi.org/10.1145/3121113.3121125>
  • [16] Abts, Dietmar (2022). RESTful Web Services. Masterkurs Client/Server-Programmierung mit Java, 331-440, Springer Fachmedien Wiesbaden, <www.doi.org/10.1007/978-3-658-37200-2_12>
  • [17] Pimparkhede, Kunal (2021). Client side and Server Side Load Balancing. International Journal for Research in Ap-plied Science and Engineering Technology, 9(11), 30-31, ISSN 2321-9653, International Journal for Research in Applied Science and Engineering Technology (IJRASET), <www.doi.org/10.22214/ijraset.2021.38748>
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-620fa94d-7eaf-4b2e-9214-9723a5566a51
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.