Abstract

This paper presents a design for a blockchain solution aimed at the prevention of unauthorized secondary use of data. This solution brings together advances from the fields of identity management, confidential computing, and advanced data usage control. In the area of identity management, the solution is aligned with emerging decentralized identity standards: decentralized identifiers (DIDs), DID communication and verifiable credentials (VCs). In respect to confidential computing, the Cheon-Kim-Kim-Song (CKKS) fully homomorphic encryption (FHE) scheme is incorporated with the system to protect the privacy of the individual’s data and prevent unauthorized secondary use when being shared with potential users. In the area of advanced data usage control, the solution leverages the PRIV-DRM solution architecture to derive a novel approach to licensing of data usage to prevent unauthorized secondary usage of data held by individuals. Specifically, our design covers necessary roles in the data-sharing ecosystem: the issuer of personal data, the individual holder of the personal data (i.e., the data subject), a trusted data storage manager, a trusted license distributor, and the data consumer. The proof-of-concept implementation utilizes the decentralized identity framework being developed by the Hyperledger Indy/Aries project. A genomic data licensing use case is evaluated, which shows the feasibility and scalability of the solution.

Highlights

  • The Great Hack, a 2019 documentary film about the Facebook-Cambridge Analytica data scandal, has come to symbolize the kinds of data abuse associated with many social media and sharing economy platforms.[1]

  • We aim to combine and build upon the previously-discussed research on privacy-enhancing technologies, including data usage control, decentralized identity systems, and homomorphic encryption, to provide a novel design and implementation of a fully-decentralized and privacy-preserving usage control enforcement infrastructure that overcomes the limitations of centralized data usage control wherein (1) formulation of the data usage policies and subsequent data usage is under the control of the individual data subject, (2) the data subject receives compensation for the use of their data, and (3) secondary use of the data that has not been authorized by the data subject is prevented

  • We base the data held by the individual on that available in the Molecular Taxonomy of Breast Cancer International Consortium (METABRIC) database, and make the assumption that several individuals have been issued verifiable credentials (VCs) containing data elements relating to themselves consistent with the data available in this database

Read more

Summary

Introduction

The Great Hack, a 2019 documentary film about the Facebook-Cambridge Analytica data scandal, has come to symbolize the kinds of data abuse associated with many social media and sharing economy platforms.[1] On such platforms, individuals have relatively little control and privacy over their data Their information is very likely to be used without authorization for purposes other than the one for which the individual originally shared it with a platform. In the context of blockchains, cryptographic tokens represent programmable assets or access rights, often managed by smart contracts and an underlying distributed ledger. They are accessible only by the person who has the private key, which is kept secret and which should only be used by that entity. Tokenization has giving rise to a new form of economics, ‘tokenomics,’ and to new services and markets based on ‘verified information.’[14,15]

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.