Advances in Information Security and Privacy
The study presented in [10] highlights that anonymity is broken if an adversary can monitor the traffic at the bounds of the Tor circuit. [...]the authors propose an improvement of the protocol based on probabilistic encryption to effectively protect users’ privacy. 5. The authors propose a mechanis...
Saved in:
Published in | Applied sciences Vol. 12; no. 16; p. 7995 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
01.08.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The study presented in [10] highlights that anonymity is broken if an adversary can monitor the traffic at the bounds of the Tor circuit. [...]the authors propose an improvement of the protocol based on probabilistic encryption to effectively protect users’ privacy. 5. The authors propose a mechanism to ensure the integrity of the data and programs of databases based on the provisions of the relational database theory, the Row Level Security technology, the potential of the modern blockchain model, and the capabilities of the database management system on the platform of which databases with the universal basis of relations are implemented. Ensuring the reliability and integrity of the personal data processing request records of a data subject to enable its utilization according to the GDPR requirements is the challenge investigated in [15]. In this paper, the authors propose a notarization framework using a private blockchain to allow the data subject to delegate requests to process personal data. |
---|---|
Bibliography: | SourceType-Scholarly Journals-1 content type line 14 ObjectType-Editorial-2 ObjectType-Commentary-1 |
ISSN: | 2076-3417 2076-3417 |
DOI: | 10.3390/app12167995 |