Abstract
Our world due to the technological progress became fast-paced and is constantly evolving, thus changing every single day. Consequently, the most valuable asset on earth is not gold or oil anymore but data. Big data companies try to take advantage of this situation and maximise their profits using people’s data. It is common to offer free of charge services to collect vast amounts of data that most of the times are considered personal and sensitive. On the other hand, their users, everyday and ordinary people without any technological background, take the opportunity to communicate with their friends and family freely and use their services without hesitation and second thoughts. But, if we take a step back and observe these free of charge services, the first concern that comes out of our mind is how all these companies are profitable since they offer a free product/platform/service. Most of the times, big data companies sell their users’ data to advertisers to offer personalised ads. There is an innovative technology that can securely store the aforementioned data but also enable its monetisation to the actual producers of it, the people. This technology is the blockchain and its variants.
References
Abramson W, Hall AJ, Papadopoulos P, Pitropakis N, Buchanan WJ (2020) A distributed trust framework for privacy-preserving machine learning. In: International conference on trust and privacy in digital business. Springer, pp 205–220
Al Omar A, Rahman MS, Basu A, Kiyomoto S (2017) Medibchain: a blockchain based privacy preserving platform for healthcare data. In: International conference on security, privacy and anonymity in computation, communication and storage. Springer, pp 534–543
Albeyatti A (2018) White paper: medicalchain. MedicalChain self-publication
Ali M, Nelson J, Shea R, Freedman MJ (2016) Blockstack: a global naming and storage system secured by blockchains. In: 2016 {USENIX} annual technical conference ({USENIX} {ATC} 16), pp 181–194
Alrawi O, Lever C, Antonakakis M, Monrose F (2019) Sok: security evaluation of home-based IoT deployments. In: IEEE S&P, pp 208–226
Alvarez M (2017) Security trends in the healthcare industry. Somers: IBM, pp 2–18
Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference. ACM, p 30
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N (2010) Building a dynamic reputation system for DNS. In: USENIX security symposium, pp 273–290
Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: using blockchain for medical data access and permission management. In: 2016 2nd international conference on open and big data (OBD). IEEE, pp 25–30
Bach L, Mihaljevic B, Zagar M (2018) Comparative analysis of blockchain consensus algorithms. In: 2018 41st international convention on information and communication technology, electronics and microelectronics (MIPRO). IEEE, pp 1545–1550
Baliga A (2017) Understanding blockchain consensus models. Persistent 4:1–14. Available online at: https://www.persistent.com/wp-content/uploads/2017/04/WP-Understanding-Blockchain-Consensus-Models.pdf. Accessed on 01 Aug 2021
Bernstein D (2014) Containers and cloud: from lxc to docker to kubernetes. IEEE Cloud Comput 1(3):81–84
Bilge L, Kirda E, Kruegel C, Balduzzi M (2011) Exposure: finding malicious domains using passive DNS analysis. In: NDSS, pp 1–17
Carlozo L (2017) What is blockchain? J Account 224(1):29
Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of blockchain-based applications: current status, classification and open issues. Telematics Inform 36:55–81
Chaudhry N, Yousaf MM (2018) Consensus algorithms in blockchain: comparative analysis, challenges and opportunities. In: 2018 12th international conference on open source systems and technologies (ICOSST). IEEE, pp 54–63
Chokhani S, Ford W, Sabett R, Merrill C, Wu S (1999) Rfc 2527: Internet x. 509 public key infrastructure certificate policy and certification practices framework. Internet Engineering Task Force (IETF), RFC
Christou O, Pitropakis N, Papadopoulos P, McKeown S, Buchanan WJ (2020) Phishing url detection through top-level domain analysis: a descriptive approach. arXiv preprint arXiv:2005.06599
Commission FT et al (2012) Protecting consumer privacy in an era of rapid change: recommendations for businesses and policymakers. Federal Trade Commission, Washington, DC
Coventry L, Branley D (2018) Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113:48–52
Dhillon V, Metcalf D, Hooper M (2017) Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you. Springer, Apress
Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops). IEEE, pp 618–623
Dubovitskaya A, Urovi V, Vasirani M, Aberer K, Schumacher MI (2015) A cloud-based ehealth architecture for privacy preserving data integration. In: IFIP international information security and privacy conference. Springer, pp 585–598
Elvy S-A (2017) Paying for privacy and the personal data economy. Columbia Law Rev 117:1369
Govil J, Govil J (2007) 4g mobile communication systems: turns, trends and transition. In: 2007 international conference on convergence information technology (ICCIT 2007). IEEE, pp 13–18
Guo R, Shi H, Zhao Q, Zheng D (2018) Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access 6:11676–11686
Hölbl M, Kompara M, Kamišalić A, Nemec Zlatolas L (2018) A systematic review of the use of blockchain in healthcare. Symmetry 10(10):470
Ichikawa D, Kashiyama M, Ueno T (2017) Tamper-resistant mobile health using blockchain technology. JMIR mHealth uHealth 5(7):e111
Ivan D (2016) Moving toward a blockchain-based method for the secure storage of patient records. In: ONC/NIST use of blockchain for healthcare and research workshop. ONC/NIST Gaithersburg, pp 1–11
Kalodner HA, Carlsten M, Ellenbogen P, Bonneau J, Narayanan A (2015) An empirical study of namecoin and lessons for decentralized namespace design. In: WEIS. Citeseer
Kambourakis G, Moschos T, Geneiatakis D, Gritzalis S (2007) Detecting DNS amplification attacks. In: International workshop on critical information infrastructures security. Springer, pp 185–196
Kelly C, Pitropakis N, McKeown S, Lambrinoudakis C (2020) Testing and hardening iot devices against the mirai botnet. In: 2020 international conference on cyber security and protection of digital services (cyber security). IEEE, pp 1–8
Khalil I, Yu T, Guan B (2016) Discovering malicious domains through passive DNS data graph analysis. In: Proceedings of the 11th ACM on Asia conference on computer and communications security. ACM, pp 663–674
Kidmose E, Lansing E, Brandbyge S, Pedersen JM (2018) Detection of malicious and abusive domain names. In: 2018 1st international conference on data intelligence and security (ICDIS). IEEE, pp 49–56
Kokolakis S (2017) Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput Secur 64:122–134
Kountouras A, Kintis P, Lever C, Chen Y, Nadji Y, Dagon D, Antonakakis M, Joffe R (2016) Enabling network security through active DNS datasets. In: International symposium on research in attacks, intrusions, and defenses. Springer, pp 188–208
Kravchenko P (2016) Ok, I need a blockchain, but which one. Medium. Available online at: https://medium.com/@pavelkravchenko/ca75c1e2100
Kuo T-T, Kim H-E, Ohno-Machado L (2017) Blockchain distributed ledger technologies for biomedical and health care applications. J Am Med Inform Assoc 24(6):1211–1220
Lemieux P (2013) Who is satoshi nakamoto? Regulation 36(3):14
Lever C, Walls R, Nadji Y, Dagon D, McDaniel P, Antonakakis M (2016) Domain-z: 28 registrations later measuring the exploitation of residual trust in domains. In: 2016 IEEE symposium on security and privacy (SP). IEEE, pp 691–706
Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017a) Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing. IEEE Press, pp 468–477
Liang X, Zhao J, Shetty S, Liu J, Li D (2017b) Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: 2017 IEEE 28th annual international symposium on personal, indoor, and mobile radio communications (PIMRC). IEEE, pp 1–5
Liu J, Li B, Chen L, Hou M, Xiang F, Wang P (2018) A data storage method based on blockchain for decentralization DNS. In: 2018 IEEE third international conference on data science in cyberspace (DSC). IEEE, pp 189–196
Nakamoto S et al (2008) Bitcoin: a peer-to-peer electronic cash system
Nguyen G-T, Kim K (2018) A survey about consensus algorithms used in Blockchain. J Inform Process Syst 14(1):101–128
Papadopoulos P, Abramson W, Hall AJ, Pitropakis N, Buchanan WJ (2021) Privacy and trust redefined in federated machine learning. Mach Learn Knowl Extract 3(2):333–356
Papadopoulos P, Pitropakis N, Buchanan WJ, Lo O, Katsikas S (2020) Privacy-preserving passive DNS. Computers 9(3):64
Patel V (2019) A framework for secure and decentralized sharing of medical imaging data via blockchain consensus. Health Inform J 25(4):1398–1411
Piredda P, Ariu D, Biggio B, Corona I, Piras L, Giacinto G, Roli F (2017) Deepsquatting: learning-based typosquatting detection at deeper domain levels. In: Conference of the Italian association for artificial intelligence. Springer, pp 347–358
Pitropakis N, Katsikas S, Lambrinoudakis C (2020) Cloud security, privacy and trust baselines. In: Cloud computing security: foundations and challenges, CRC Press, p 45–64
Ranjan S (2012) Detecting DNS fast-flux anomalies. US Patent 8,260,914
Roehrs A, da Costa CA, da Rosa Righi R (2017) Omniphr: a distributed architecture model to integrate personal health records. J Biomed Inform 71:70–81
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698
Selvi J, Rodriguez RJ, Soria-Olivas E (2019) Detection of algorithmically generated malicious domain names using masked n-grams. Expert Syst Appl 124:156–163
Shulman H (2014) Pretty bad privacy: pitfalls of DNS encryption. In: WPES, pp 191–200
Smart W (2018) Lessons learned review of the wannacry ransomware cyber attack. Dept Health Soc Care England UK Lond 1(20175):10–1038
Solove DJ (2011) Nothing to hide: the false tradeoff between privacy and security. Yale University Press, New Haven/London
Spring JM, Huth CL (2012) The impact of passive DNS collection on end-user privacy. Securing and Trusting Internet Names
Stamatellis C, Papadopoulos P, Pitropakis N, Katsikas S, Buchanan WJ (2020) A privacy-preserving healthcare framework using hyperledger fabric. Sensors 20(22):6587
Stewart J (2003) DNS cache poisoning–the next generation
Stolfo SJ, Bellovin SM, Hershkop S, Keromytis AD, Sinclair S, Smith SW (2008) Insider attack and cyber security: beyond the hacker, vol 39. Springer Science & Business Media, Boston
Thakkar P, Nathan S, Viswanathan B (2018) Performance benchmarking and optimizing hyperledger fabric blockchain platform. In: 2018 IEEE 26th international symposium on modeling, analysis, and simulation of computer and telecommunication systems (MASCOTS). IEEE, pp 264–276
Tian K, Jan ST, Hu H, Yao D, Wang G (2018) Needle in a haystack: tracking down elite phishing domains in the wild. In: Proceedings of the Internet measurement conference 2018. ACM, pp 429–442
Voigt P, Von dem Bussche A (2017) The EU general data protection regulation (GDPR). A practical guide, 1st edn. Springer International Publishing, Cham
Wang W, Hoang DT, Xiong Z, Niyato D, Wang P, Hu P, Wen Y (2018) A survey on consensus mechanisms and mining management in blockchain networks. arXiv preprint arXiv:1805.02707, pp 1–33
Weimer F (2005) Passive DNS replication. In: FIRST conference on computer security incident, p 98
Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Pap 151(2014):1–32
Xia Q, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017) Medshare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5:14757–14767
Xu J, Fan J, Ammar MH, Moon SB (2002) Prefix-preserving ip address anonymization: measurement-based security evaluation and a new cryptography-based scheme. In: 10th IEEE international conference on network protocols, 2002. Proceedings. IEEE, pp 280–289
Yang H, Yang B (2017) A blockchain-based approach to the secure sharing of healthcare data. In Proceedings of the Norwegian Information Security Conference. Nisk J, Oslo, Norway, 11–15
Yeh C-L (2018) Pursuing consumer empowerment in the age of big data: a comprehensive regulatory framework for data brokers. Telecommun Policy 42(4):282–292
Yu Z, Xue D, Fan J, Guo C (2020) DNSTSM: DNS cache resources trusted sharing model based on consortium blockchain. IEEE Access 8:13640–13650
Zdrnja B, Brownlee N, Wessels D (2007) Passive Monitoring of DNS Anomalies. Detection of Intrusions and Malware, and Vulnerability Assessment Springer Berlin Heidelberg, Berlin, Heidelberg 129–139
Zhang R, Xue R, Liu L (2019) Security and privacy on blockchain. ACM Comput Surv (CSUR) 52(3):1–34
Zheng Z, Xie S, Dai H-N, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
6 Supplementary Material
6 Supplementary Material
Hyperledger Fabric community provides a range of tutorials and supplementary material on their website (https://hyperledger-fabric.readthedocs.io/en/latest/tutorials.html) and their GitHub repository (https://github.com/hyperledger/fabric-samples). Additionally, there is a range of case studies focused on the adoption and development of Hyperledger Fabric as a whole (https://www.hyperledger.org/learn/case-studies).
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive licence to Springer Nature Switzerland AG
About this entry
Cite this entry
Papadopoulos, P., Pitropakis, N., Buchanan, W.J. (2021). Decentralised Privacy: A Distributed Ledger Approach. In: Hussain, C.M., Di Sia, P. (eds) Handbook of Smart Materials, Technologies, and Devices. Springer, Cham. https://doi.org/10.1007/978-3-030-58675-1_58-1
Download citation
DOI: https://doi.org/10.1007/978-3-030-58675-1_58-1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58675-1
Online ISBN: 978-3-030-58675-1
eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering
Publish with us
Chapter history
-
Latest
Decentralized Privacy: A Distributed Ledger Approach- Published:
- 14 January 2022
DOI: https://doi.org/10.1007/978-3-030-58675-1_58-2
-
Original
Decentralised Privacy: A Distributed Ledger Approach- Published:
- 26 November 2021
DOI: https://doi.org/10.1007/978-3-030-58675-1_58-1