Advances in Information Security and Privacy

The study presented in [10] highlights that anonymity is broken if an adversary can monitor the traffic at the bounds of the Tor circuit. [...]the authors propose an improvement of the protocol based on probabilistic encryption to effectively protect users’ privacy. 5. The authors propose a mechanis...

Full description

Saved in:
Bibliographic Details
Published inApplied sciences Vol. 12; no. 16; p. 7995
Main Authors Lax, Gianluca, Russo, Antonia
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.08.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The study presented in [10] highlights that anonymity is broken if an adversary can monitor the traffic at the bounds of the Tor circuit. [...]the authors propose an improvement of the protocol based on probabilistic encryption to effectively protect users’ privacy. 5. The authors propose a mechanism to ensure the integrity of the data and programs of databases based on the provisions of the relational database theory, the Row Level Security technology, the potential of the modern blockchain model, and the capabilities of the database management system on the platform of which databases with the universal basis of relations are implemented. Ensuring the reliability and integrity of the personal data processing request records of a data subject to enable its utilization according to the GDPR requirements is the challenge investigated in [15]. In this paper, the authors propose a notarization framework using a private blockchain to allow the data subject to delegate requests to process personal data.
Bibliography:SourceType-Scholarly Journals-1
content type line 14
ObjectType-Editorial-2
ObjectType-Commentary-1
ISSN:2076-3417
2076-3417
DOI:10.3390/app12167995