Skip to main content

Decentralised Privacy: A Distributed Ledger Approach

Handbook of Smart Materials, Technologies, and Devices

Abstract

Our world due to the technological progress became fast-paced and is constantly evolving, thus changing every single day. Consequently, the most valuable asset on earth is not gold or oil anymore but data. Big data companies try to take advantage of this situation and maximise their profits using people’s data. It is common to offer free of charge services to collect vast amounts of data that most of the times are considered personal and sensitive. On the other hand, their users, everyday and ordinary people without any technological background, take the opportunity to communicate with their friends and family freely and use their services without hesitation and second thoughts. But, if we take a step back and observe these free of charge services, the first concern that comes out of our mind is how all these companies are profitable since they offer a free product/platform/service. Most of the times, big data companies sell their users’ data to advertisers to offer personalised ads. There is an innovative technology that can securely store the aforementioned data but also enable its monetisation to the actual producers of it, the people. This technology is the blockchain and its variants.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Abramson W, Hall AJ, Papadopoulos P, Pitropakis N, Buchanan WJ (2020) A distributed trust framework for privacy-preserving machine learning. In: International conference on trust and privacy in digital business. Springer, pp 205–220

    Google Scholar 

  • Al Omar A, Rahman MS, Basu A, Kiyomoto S (2017) Medibchain: a blockchain based privacy preserving platform for healthcare data. In: International conference on security, privacy and anonymity in computation, communication and storage. Springer, pp 534–543

    Google Scholar 

  • Albeyatti A (2018) White paper: medicalchain. MedicalChain self-publication

    Google Scholar 

  • Ali M, Nelson J, Shea R, Freedman MJ (2016) Blockstack: a global naming and storage system secured by blockchains. In: 2016 {USENIX} annual technical conference ({USENIX} {ATC} 16), pp 181–194

    Google Scholar 

  • Alrawi O, Lever C, Antonakakis M, Monrose F (2019) Sok: security evaluation of home-based IoT deployments. In: IEEE S&P, pp 208–226

    Google Scholar 

  • Alvarez M (2017) Security trends in the healthcare industry. Somers: IBM, pp 2–18

    Google Scholar 

  • Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference. ACM, p 30

    Google Scholar 

  • Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N (2010) Building a dynamic reputation system for DNS. In: USENIX security symposium, pp 273–290

    Google Scholar 

  • Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: using blockchain for medical data access and permission management. In: 2016 2nd international conference on open and big data (OBD). IEEE, pp 25–30

    Google Scholar 

  • Bach L, Mihaljevic B, Zagar M (2018) Comparative analysis of blockchain consensus algorithms. In: 2018 41st international convention on information and communication technology, electronics and microelectronics (MIPRO). IEEE, pp 1545–1550

    Google Scholar 

  • Baliga A (2017) Understanding blockchain consensus models. Persistent 4:1–14. Available online at: https://www.persistent.com/wp-content/uploads/2017/04/WP-Understanding-Blockchain-Consensus-Models.pdf. Accessed on 01 Aug 2021

  • Bernstein D (2014) Containers and cloud: from lxc to docker to kubernetes. IEEE Cloud Comput 1(3):81–84

    Article  Google Scholar 

  • Bilge L, Kirda E, Kruegel C, Balduzzi M (2011) Exposure: finding malicious domains using passive DNS analysis. In: NDSS, pp 1–17

    Google Scholar 

  • Carlozo L (2017) What is blockchain? J Account 224(1):29

    Google Scholar 

  • Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of blockchain-based applications: current status, classification and open issues. Telematics Inform 36:55–81

    Article  Google Scholar 

  • Chaudhry N, Yousaf MM (2018) Consensus algorithms in blockchain: comparative analysis, challenges and opportunities. In: 2018 12th international conference on open source systems and technologies (ICOSST). IEEE, pp 54–63

    Google Scholar 

  • Chokhani S, Ford W, Sabett R, Merrill C, Wu S (1999) Rfc 2527: Internet x. 509 public key infrastructure certificate policy and certification practices framework. Internet Engineering Task Force (IETF), RFC

    Google Scholar 

  • Christou O, Pitropakis N, Papadopoulos P, McKeown S, Buchanan WJ (2020) Phishing url detection through top-level domain analysis: a descriptive approach. arXiv preprint arXiv:2005.06599

    Google Scholar 

  • Commission FT et al (2012) Protecting consumer privacy in an era of rapid change: recommendations for businesses and policymakers. Federal Trade Commission, Washington, DC

    Google Scholar 

  • Coventry L, Branley D (2018) Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113:48–52

    Article  Google Scholar 

  • Dhillon V, Metcalf D, Hooper M (2017) Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you. Springer, Apress

    Book  Google Scholar 

  • Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops). IEEE, pp 618–623

    Google Scholar 

  • Dubovitskaya A, Urovi V, Vasirani M, Aberer K, Schumacher MI (2015) A cloud-based ehealth architecture for privacy preserving data integration. In: IFIP international information security and privacy conference. Springer, pp 585–598

    Google Scholar 

  • Elvy S-A (2017) Paying for privacy and the personal data economy. Columbia Law Rev 117:1369

    Google Scholar 

  • Govil J, Govil J (2007) 4g mobile communication systems: turns, trends and transition. In: 2007 international conference on convergence information technology (ICCIT 2007). IEEE, pp 13–18

    Google Scholar 

  • Guo R, Shi H, Zhao Q, Zheng D (2018) Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access 6:11676–11686

    Article  Google Scholar 

  • Hölbl M, Kompara M, Kamišalić A, Nemec Zlatolas L (2018) A systematic review of the use of blockchain in healthcare. Symmetry 10(10):470

    Article  Google Scholar 

  • Ichikawa D, Kashiyama M, Ueno T (2017) Tamper-resistant mobile health using blockchain technology. JMIR mHealth uHealth 5(7):e111

    Article  Google Scholar 

  • Ivan D (2016) Moving toward a blockchain-based method for the secure storage of patient records. In: ONC/NIST use of blockchain for healthcare and research workshop. ONC/NIST Gaithersburg, pp 1–11

    Google Scholar 

  • Kalodner HA, Carlsten M, Ellenbogen P, Bonneau J, Narayanan A (2015) An empirical study of namecoin and lessons for decentralized namespace design. In: WEIS. Citeseer

    Google Scholar 

  • Kambourakis G, Moschos T, Geneiatakis D, Gritzalis S (2007) Detecting DNS amplification attacks. In: International workshop on critical information infrastructures security. Springer, pp 185–196

    Google Scholar 

  • Kelly C, Pitropakis N, McKeown S, Lambrinoudakis C (2020) Testing and hardening iot devices against the mirai botnet. In: 2020 international conference on cyber security and protection of digital services (cyber security). IEEE, pp 1–8

    Google Scholar 

  • Khalil I, Yu T, Guan B (2016) Discovering malicious domains through passive DNS data graph analysis. In: Proceedings of the 11th ACM on Asia conference on computer and communications security. ACM, pp 663–674

    Google Scholar 

  • Kidmose E, Lansing E, Brandbyge S, Pedersen JM (2018) Detection of malicious and abusive domain names. In: 2018 1st international conference on data intelligence and security (ICDIS). IEEE, pp 49–56

    Google Scholar 

  • Kokolakis S (2017) Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput Secur 64:122–134

    Article  Google Scholar 

  • Kountouras A, Kintis P, Lever C, Chen Y, Nadji Y, Dagon D, Antonakakis M, Joffe R (2016) Enabling network security through active DNS datasets. In: International symposium on research in attacks, intrusions, and defenses. Springer, pp 188–208

    Google Scholar 

  • Kravchenko P (2016) Ok, I need a blockchain, but which one. Medium. Available online at: https://medium.com/@pavelkravchenko/ca75c1e2100

  • Kuo T-T, Kim H-E, Ohno-Machado L (2017) Blockchain distributed ledger technologies for biomedical and health care applications. J Am Med Inform Assoc 24(6):1211–1220

    Article  Google Scholar 

  • Lemieux P (2013) Who is satoshi nakamoto? Regulation 36(3):14

    MathSciNet  Google Scholar 

  • Lever C, Walls R, Nadji Y, Dagon D, McDaniel P, Antonakakis M (2016) Domain-z: 28 registrations later measuring the exploitation of residual trust in domains. In: 2016 IEEE symposium on security and privacy (SP). IEEE, pp 691–706

    Google Scholar 

  • Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017a) Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing. IEEE Press, pp 468–477

    Google Scholar 

  • Liang X, Zhao J, Shetty S, Liu J, Li D (2017b) Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: 2017 IEEE 28th annual international symposium on personal, indoor, and mobile radio communications (PIMRC). IEEE, pp 1–5

    Google Scholar 

  • Liu J, Li B, Chen L, Hou M, Xiang F, Wang P (2018) A data storage method based on blockchain for decentralization DNS. In: 2018 IEEE third international conference on data science in cyberspace (DSC). IEEE, pp 189–196

    Google Scholar 

  • Nakamoto S et al (2008) Bitcoin: a peer-to-peer electronic cash system

    Google Scholar 

  • Nguyen G-T, Kim K (2018) A survey about consensus algorithms used in Blockchain. J Inform Process Syst 14(1):101–128

    Google Scholar 

  • Papadopoulos P, Abramson W, Hall AJ, Pitropakis N, Buchanan WJ (2021) Privacy and trust redefined in federated machine learning. Mach Learn Knowl Extract 3(2):333–356

    Article  Google Scholar 

  • Papadopoulos P, Pitropakis N, Buchanan WJ, Lo O, Katsikas S (2020) Privacy-preserving passive DNS. Computers 9(3):64

    Article  Google Scholar 

  • Patel V (2019) A framework for secure and decentralized sharing of medical imaging data via blockchain consensus. Health Inform J 25(4):1398–1411

    Article  Google Scholar 

  • Piredda P, Ariu D, Biggio B, Corona I, Piras L, Giacinto G, Roli F (2017) Deepsquatting: learning-based typosquatting detection at deeper domain levels. In: Conference of the Italian association for artificial intelligence. Springer, pp 347–358

    Google Scholar 

  • Pitropakis N, Katsikas S, Lambrinoudakis C (2020) Cloud security, privacy and trust baselines. In: Cloud computing security: foundations and challenges, CRC Press, p 45–64

    Google Scholar 

  • Ranjan S (2012) Detecting DNS fast-flux anomalies. US Patent 8,260,914

    Google Scholar 

  • Roehrs A, da Costa CA, da Rosa Righi R (2017) Omniphr: a distributed architecture model to integrate personal health records. J Biomed Inform 71:70–81

    Article  Google Scholar 

  • Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698

    Article  Google Scholar 

  • Selvi J, Rodriguez RJ, Soria-Olivas E (2019) Detection of algorithmically generated malicious domain names using masked n-grams. Expert Syst Appl 124:156–163

    Article  Google Scholar 

  • Shulman H (2014) Pretty bad privacy: pitfalls of DNS encryption. In: WPES, pp 191–200

    Google Scholar 

  • Smart W (2018) Lessons learned review of the wannacry ransomware cyber attack. Dept Health Soc Care England UK Lond 1(20175):10–1038

    Google Scholar 

  • Solove DJ (2011) Nothing to hide: the false tradeoff between privacy and security. Yale University Press, New Haven/London

    Google Scholar 

  • Spring JM, Huth CL (2012) The impact of passive DNS collection on end-user privacy. Securing and Trusting Internet Names

    Google Scholar 

  • Stamatellis C, Papadopoulos P, Pitropakis N, Katsikas S, Buchanan WJ (2020) A privacy-preserving healthcare framework using hyperledger fabric. Sensors 20(22):6587

    Article  Google Scholar 

  • Stewart J (2003) DNS cache poisoning–the next generation

    Google Scholar 

  • Stolfo SJ, Bellovin SM, Hershkop S, Keromytis AD, Sinclair S, Smith SW (2008) Insider attack and cyber security: beyond the hacker, vol 39. Springer Science & Business Media, Boston

    Book  Google Scholar 

  • Thakkar P, Nathan S, Viswanathan B (2018) Performance benchmarking and optimizing hyperledger fabric blockchain platform. In: 2018 IEEE 26th international symposium on modeling, analysis, and simulation of computer and telecommunication systems (MASCOTS). IEEE, pp 264–276

    Google Scholar 

  • Tian K, Jan ST, Hu H, Yao D, Wang G (2018) Needle in a haystack: tracking down elite phishing domains in the wild. In: Proceedings of the Internet measurement conference 2018. ACM, pp 429–442

    Google Scholar 

  • Voigt P, Von dem Bussche A (2017) The EU general data protection regulation (GDPR). A practical guide, 1st edn. Springer International Publishing, Cham

    Google Scholar 

  • Wang W, Hoang DT, Xiong Z, Niyato D, Wang P, Hu P, Wen Y (2018) A survey on consensus mechanisms and mining management in blockchain networks. arXiv preprint arXiv:1805.02707, pp 1–33

    Google Scholar 

  • Weimer F (2005) Passive DNS replication. In: FIRST conference on computer security incident, p 98

    Google Scholar 

  • Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Pap 151(2014):1–32

    Google Scholar 

  • Xia Q, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017) Medshare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5:14757–14767

    Article  Google Scholar 

  • Xu J, Fan J, Ammar MH, Moon SB (2002) Prefix-preserving ip address anonymization: measurement-based security evaluation and a new cryptography-based scheme. In: 10th IEEE international conference on network protocols, 2002. Proceedings. IEEE, pp 280–289

    Google Scholar 

  • Yang H, Yang B (2017) A blockchain-based approach to the secure sharing of healthcare data. In Proceedings of the Norwegian Information Security Conference. Nisk J, Oslo, Norway, 11–15

    Google Scholar 

  • Yeh C-L (2018) Pursuing consumer empowerment in the age of big data: a comprehensive regulatory framework for data brokers. Telecommun Policy 42(4):282–292

    Article  Google Scholar 

  • Yu Z, Xue D, Fan J, Guo C (2020) DNSTSM: DNS cache resources trusted sharing model based on consortium blockchain. IEEE Access 8:13640–13650

    Article  Google Scholar 

  • Zdrnja B, Brownlee N, Wessels D (2007) Passive Monitoring of DNS Anomalies. Detection of Intrusions and Malware, and Vulnerability Assessment Springer Berlin Heidelberg, Berlin, Heidelberg 129–139

    Google Scholar 

  • Zhang R, Xue R, Liu L (2019) Security and privacy on blockchain. ACM Comput Surv (CSUR) 52(3):1–34

    Article  Google Scholar 

  • Zheng Z, Xie S, Dai H-N, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Pavlos Papadopoulos or Nikolaos Pitropakis .

Editor information

Editors and Affiliations

6 Supplementary Material

6 Supplementary Material

Hyperledger Fabric community provides a range of tutorials and supplementary material on their website (https://hyperledger-fabric.readthedocs.io/en/latest/tutorials.html) and their GitHub repository (https://github.com/hyperledger/fabric-samples). Additionally, there is a range of case studies focused on the adoption and development of Hyperledger Fabric as a whole (https://www.hyperledger.org/learn/case-studies).

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive licence to Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Papadopoulos, P., Pitropakis, N., Buchanan, W.J. (2021). Decentralised Privacy: A Distributed Ledger Approach. In: Hussain, C.M., Di Sia, P. (eds) Handbook of Smart Materials, Technologies, and Devices. Springer, Cham. https://doi.org/10.1007/978-3-030-58675-1_58-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58675-1_58-1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58675-1

  • Online ISBN: 978-3-030-58675-1

  • eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering

Publish with us

Policies and ethics

Chapter history

  1. Latest

    Decentralized Privacy: A Distributed Ledger Approach
    Published:
    14 January 2022

    DOI: https://doi.org/10.1007/978-3-030-58675-1_58-2

  2. Original

    Decentralised Privacy: A Distributed Ledger Approach
    Published:
    26 November 2021

    DOI: https://doi.org/10.1007/978-3-030-58675-1_58-1